(Online Infringement) Bill 2015 (Cth) 16 April 2015

Total Page:16

File Type:pdf, Size:1020Kb

(Online Infringement) Bill 2015 (Cth) 16 April 2015 Music Rights Australia's submissions in response to the Copyright Amendment (Online Infringement) Bill 2015 (Cth) 16 April 2015 Contents 1 About Music Rights Australia 2 2 Executive Summary 2 3 Why Australia needs an injunction to disable access to infringing online locations 2 4 Threshold limitations 3 4.1 The primary purpose to infringe, or to facilitate the infringement of, copyright 4 4.2 Service 4 4.3 Matters to be taken into account 5 5 Other limitations imposed by the Bill 8 5.1 Who can bring an application? 8 5.2 Limitation to carriage service providers 8 5.3 Costs 8 5.4 Jurisdiction 9 Annexure A - ARIA Charts Analysis – March & April 2015 10 Annexure B - Comparison of international website blocking laws 12 Annexure C - Website Blocking Cases in the United Kingdom 20 page 1 1 About Music Rights Australia Music Rights Australia (MRA) is an organisation that protects the creative interests of artists within the Australian music community. MRA represents over 70,000 songwriters and music publishers through their association with the Australasian Mechanical Copyright Owners' Society (AMCOS) and the Australasian Performing Right Association (APRA),1 and more than 125 record labels - both independent and major - through the Australian Recording Industry Association (ARIA).2 2 Executive Summary MRA thanks the Legal and Constitutional Affairs Committee of the Commonwealth Senate for the opportunity to comment on the Copyright Amendment (Online Infringement) Bill 2015 (Cth) (the Bill). MRA strongly supports the Government's introduction of a specific injunction to disable access to an infringing online location, which is not dependent on establishing a carriage service provider's liability for copyright infringement or authorisation of copyright infringement. While recognising the Government’s desire to ensure that the new section 115A addresses a specific problem, MRA has concerns that the provisions, as currently drafted, will not enable the proposed injunction to operate as a truly effective and efficient means of preventing online copyright infringement. In particular, MRA submits that the prerequisites which must be met before an injunction is granted should not be more onerous than those which apply in other jurisdictions where a similar remedy is available, and that the Courts' discretion to grant the injunction in any given case should not be unnecessarily fettered by an overly prescriptive set of factors which the Court must take into account. 3 Why Australia needs an injunction to disable access to infringing online locations The scale and reach of websites, streaming services and other online locations which infringe or facilitate the infringement of copyright is undoubtedly a global problem from which Australia is not immune. The IFPI Digital Music Report 2015 estimates that 20 per cent of fixed- line internet users worldwide regularly access services offering copyright infringing music3. “IFPI estimates that in 2014 there were four billion music downloads via BitTorrent alone, the vast majority of which were infringing, and this does not take into account other channels such as cyber lockers, linking sites and social networks”4. In March and April 2015, MRA reviewed the top five sites which stream illegal content or make it available for download as identified in TorrentFreak’s most popular torrent websites 20155 and, using the ARIA Australian Album chart and the ARIA Australian Artists Singles chart as guides, took snapshots of those sites and found the following Australian artists’ music on each of the sites (see Annexure A). All of the artists’ music made available on the illegal sites referred to in Annexure A was available to consumers on licensed online music services or in music stores. In Australia, there are over 30 online licensed music services which offer music to consumers where, when and how they wish to experience it, at a range of price points including free on some advertising supported services.6 1 See www.apraamcos.com.au. 2 See www.aria.com.au. 3 IFPI Digital Music Report 2015 p38 4 ibid 54 Vanibid Der Sar, Ernesto.Top Most Popular Torrent Sites of 2015 , TorrentFreak, https://torrentfreak.com/top-popular-torrent-sites- 5 Van Der Sar, Ernesto.Top Most Popular Torrent Sites of 2015 , TorrentFreak, https://torrentfreak.com/top-popular-torrent-sites- 2015-150104 6 www.digialcontentguide.com.au; www.pro-music.org. page 2 Licensed music is available to consumers any way they wish to experience it, yet sites like The Pirate Bay and KickassTorrents continue to operate and offer music for which they are not licensed. Those sites generate money for their operators from the advertising which appears on them. A study in 2014 titled Good Money Gone Bad: Digital Thieves and the Hijacking of the Online Ad Business, by the Digital Citizens Alliance, found that the top 30 sites in the US which stream illegal content, or make it available for download, made on average USD4.4 million each year and the illegal sites reviewed as a part of the study made USD227 million in revenue.7 The Government has recognised that there are obvious difficulties with taking direct enforcement actions against individual infringers and with taking direct enforcement actions against infringing online locations. These difficulties not only arise when the online location is operated outside Australia (as the Explanatory Memorandum to the Bill acknowledges) but also where the operator of the online location cannot be identified or located despite reasonable efforts, and where the conduct of the online location may fall short of "authorisation" of copyright infringement but nevertheless would constitute "facilitation" of copyright infringement (e.g. where the online location provides programs or other tools that facilitate the infringement of copyright but does not directly provide access to infringing content). More efficient and cost-effective mechanisms for addressing the problem of online copyright infringement are clearly needed. Orders requiring intermediaries to block access to infringing online locations, if properly implemented are becoming a widely accepted means of addressing both current infringements and stemming future infringements. Website blocking orders of the type proposed under section 115A are already available in a large number of jurisdictions around the world. Annexure B lists the corresponding legislative provisions in the United Kingdom, Singapore, Ireland, Norway and Austria. A separate table in Annexure B lists the corresponding legislative provisions in Italy, France and Spain. The international experience has demonstrated the effectiveness of such orders. As the IFPI Digital Music Report 20158 reports: “Action by ISPs to block users’ access to copyright infringing websites has become an increasingly accepted way of effectively helping to tackle digital piracy. ISPs in 19 countries have been ordered to block access to more than 480 copyright infringing websites…. Website blocking has proved effective where applied. While blocking an individual site does not have a significant impact on overall traffic to unlicensed services, once a number of leading sites are blocked then there is a major impact. In the three years since The Pirate Bay and numerous other sites were blocked in the UK there has been a 45 per cent decline (from 20.4m in April 2012 to 11.2m in April 2014) in visitors from the UK to all BitTorrent sites, whether blocked by ISPs or not. In Italy , where courts have ordered the blocking of 24 BitTorrent sites , there has been a decline of 25.6 per cent in the number of overall BitTorrent downloads in the country in two years from January 2013”. 4 Threshold limitations MRA recognises that the decision to grant an injunction in any particular case needs to balance the interests of all stakeholders, but is concerned that section 115A as currently drafted imposes a number of threshold limitations which may have unintended consequences and prevent the relief being as effective as it has proved elsewhere. 7 Digital Citizens Alliance, http://www.digitalcitizensalliance.org/cac/alliance/content.aspx?page=FollowTheProfit. 8IFPI, Digital Music Report 2015 p 39. page 3 4.1 The primary purpose to infringe, or to facilitate the infringement of, copyright Proposed section 115A(1)(c) requires rights holders to prove that the primary purpose of the online location is to infringe, or to facilitate the infringement of copyright. MRA submits that it would be extremely difficult in practice for rights holders to meet the threshold in respect of any particular online location. It is conceivable, for instance, that an online location may develop or adjust its business model and practices so that while it continues to engage in serious and extensive copyright infringement (or the facilitation of such) it also engages in a sufficient amount of legitimate business (such as the sharing of a small quantity of non-infringing content) so that it would not fall within the scope of section 115A. While the same wording exists in the corresponding Singaporean legislation, there whether the primary purpose of the online location is to commit or facilitate copyright infringement is only one of the matters the court is to have regard to and to give such weight as it considers appropriate, not a prerequisite to obtaining the injunction (see Annexure B). The requirement does not apply in any of the other jurisdictions which are referred to in Annexure B. It is worth considering that, had an application for an injunction been brought under section 115A in relation to the website MP3s4FREE.COM which was the subject of Cooper v Universal Music Australia Pty Ltd9, the condition precedent in section 115A(1)(c) would not have been satisfied, as the Court found that it only had "a principal purpose" of enabling infringing copies of the downloaded sound recordings to be made. Therefore the Court would not have been empowered to block access to the website under section 115A, although it was able to make orders restraining the ongoing operation of the website under section 115(2).
Recommended publications
  • Seedboxes Cc Forum
    Seedboxes Cc Forum It's simple to get started with, and incredibly functional. Never had problems using. cc Mobile Apps for ios and android user. cc German- English Dictionary: Translation for Sumpf. Ellenkező esetben a webhely funkcionalitása korlátozott. Ask questions regarding our services or generic seedbox related tasks. Gradstein & Celis, M. 2021, 19:09 Replies: 3 [Wait for Plugin Update] Pornhub plugin - only HLS - duplicate problem. Seedbucket was developed in-house by Seedboxes. eu e as velocidades de UP e DOWN são muitos boas mas a limitação de tráfego complica. OB Config for seedboxes. Seedbox & Hosting. A lot slower to post updates though. 2011-05-18: Added a link to a post on HP’s support forum where the post helped a bit. A good starting place for additional information about Rapidleech is the Wiki and the official forum. cc, byte-sized-hosting. ---Description---Tellytorrent is an Indian private tracker for Indian movies & series with a collection of BD50, 4kUHD, DVD9, NetFlix DL & Amazon DL- Source. cc often offers special discounts – called “promo codes” on its website. We have not put down all the specifications but you can read more about them in this post. The Raspberry Pi 4 dropped and it's a major update for the flagship single-board computer. On September 2, 2009, isoHunt announced the launch of a spinoff site, hexagon. 53GHz HyperThreading),. cc - Quality and affordable seedbox with premium bandwidth Seedboxes. Sdedi propose des solutions Seedbox uniques et innovantes : un espace disque illimité, un réseau de 10 Gigas, une app seedbox mobile et plus encore, à partir de 2,99 euros.
    [Show full text]
  • Digital Citizens Alliance
    GOOD MONEY STILL GOING BAD: DIGITAL THIEVES AND THE HIJACKING OF THE ONLINE AD BUSINESS A FOLLOW-UP TO THE 2013 REPORT ON THE PROFITABILITY OF AD-SUPPORTED CONTENT THEFT MAY 2015 A safer internet is a better internet CONTENTS CONTENTS ......................................................................................................................................................................................................................ii TABLE OF REFERENCES ..................................................................................................................................................................................iii Figures.........................................................................................................................................................................................................................iii Tables ...........................................................................................................................................................................................................................iii ABOUT THIS REPORT ..........................................................................................................................................................................................1 EXECUTIVE SUMMARY ..................................................................................................................................................................................... 2 GOOD MONEY STILL GOING BAD ........................................................................................................................................................3
    [Show full text]
  • GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business a Report on the Profitability of Ad-Supported Content Theft
    GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business A Report on the Profitability of Ad-Supported Content Theft February 2014 www.digitalcitizensalliance.org/followtheprofit CONTENTS Contents .............................................................................................................................................................i Table of References .....................................................................................................................................ii Figures .........................................................................................................................................................................................ii Tables ...........................................................................................................................................................................................ii About this Report ..........................................................................................................................................1 Executive Summary .................................................................................................................................... 3 Three Key Relevant Growth Trends .................................................................................................... 4 Methodology .................................................................................................................................................. 4 Sites Studied ..........................................................................................................................................................................
    [Show full text]
  • France Torrent
    1 / 2 France Torrent Survivor ... ﻣﺸﺎﻫﺪﺓ ﺍﻟﻤﻮﺍﺳﻢ ﺟﻤﻴﻊ Au Service De La France ﺍﻟﻤﻮﺍﺳﻢ ﺟﻤﻴﻊ Former French national champion Nacer Bouhanni says he has been subjected to a torrent of racist abuse over the past week.. by JI Theule · 2012 · Cited by 95 — ... debris-flow and bedload transport in the Manival Torrent, SE France ... monitoring in the active Manival debris-flow torrent in the French Alps .... Designated Survivor AU S04E24 HDTV x264-FQM EZTV torrent download - download for .... Former French cycling champion Nacer Bouhanni is speaking out about the torrent of racist insults he's received over the past week, many of .... ... dating site wordpress theme kostenloser download torrent yaogeznkfw at ... strategy for living heritage safeguarding) Paris, France 19-Mar-2021.. Institut de France. ... T411 - Torrent411 - Les Pages Jaunes du Torrent Francais, Torrent 411 French Torrent Tracker, T411 Tracker Torrent Fr, Débloquer T411, .... ... and full resume, check my about page. Feel free to get in touch at [email protected]. ... FrameNet Workshop 2020. Marseille, France: ELRA, p. 23-30.. View deals for Hotel restaurant le Torrent, including fully refundable rates with free cancellation. ... Lieu dit Nebita, Santo-Pietro-di-Venaco, 20250, France.. PIMSLEUR Pimsleur French Conversational Course - Level 1 Lessons 1-16 CD: ... Free Lesson Pimsleur English For French Speakers Torrent >> DOWNLOAD. In a string of Tuesday morning tweets, President Donald Trump tore into French President Emmanuel Macron, appeared to mock France for both .... by J Tarabeux · 2014 · Cited by 65 — Affiliations. 1 1] Service de Génétique Oncologique, Institut Curie, Paris, France [2] INSERM U830, Centre de Recherche de l'Institut Curie, ...
    [Show full text]
  • Modules Installation Development Bugs
    WEB OUTSIDE OF BROWSERS Overview News Applications Modules Installation Development Bugs Modules A module is an interface between a website and Weboob. Modules are stored in repositories and can be updated without upgrading Weboob. To check if there are new versions of modules, use this command: $ weboob-config update By default, only the default repository is enabled. You can add another one by editing the file ~/.config/weboob/sources.list. You can subscribe to the RSS feed to know when there are new modules updates available. Add a backend Weboob applications need backends to interact with websites. A backend is a configured module, usually with several parameters like your username, password, or other options. You can create multiple backends for a single module. You can use a console application or a graphical application to edit backends. Official modules 750g Adecco AgendaculturelAgendadulibre AlloCiné AlloResto Allrecipes Amazon Ameli Amelipro AmericanExpress Apec Apivie ArrêtSurImages Arte AttilaSub AudioAddict AuM AxaBanque BanqueAccord BanquePopulaire Barclays Batoto Bforbank Biplan Blablacar BNPorc Boursorama Bouygues BP BRED Btdigg BTMon CaisseDEpargne CanalPlus CanalTP CappedTV CarrefourBanque CCI ChampsLibres Chronopost CIC Citélis Citibank CMB CMSO ColisPrive Colissimo Cpasbien CrAgr CréditCoopératiCf réditDuNord CréditMutuel CuisineAZ Dailymotion Delubac Dhl DLFP Dpd DresdenWetter EatManga Ebonics EDF EHentai Entreparticuliers Europarl Explorimmo Feedly Fortunéo FourChan FranceTélévisionsFreegeoip FreeMobile Funmooc GanAssurances
    [Show full text]
  • Longévité Et Résilience De L'accès Illégal Aux Contenus Culturels Interroger Les Persistances Et Les Sorties De Carrières Pirates
    27 Longévité et résilience de l’accès illégal aux contenus culturels Interroger les persistances et les sorties de carrières pirates Par Anthony GALLUZZO Université de Saint-Étienne Depuis plus de vingt ans, le téléchargement illégal n’a cessé de se développer et de se diversifier, malgré les nombreuses mesures de lutte anti-piratage entreprises par les pouvoirs publics et les associations d’ayants droit. Cette longévité et cette résistance interpellent. Nous proposons dans cet article d’analyser l’évolution des pratiques du téléchargement illégal, à l’aune du concept beckerien de « carrière », qui permet d’interroger les continuités, les ruptures, les accélérations et les sorties qui rythment et structurent les parcours pirates. À partir d’une méthodologie basée sur les récits de vie, nous nous sommes entretenus avec des pratiquants des trois principales formes de piratage : le streaming, le téléchargement direct et le pair-à-pair. Nos résultats révèlent que le maintien de la carrière pirate nécessite un travail de la part du consommateur, qui peut être autant gêné que renforcé par les obstacles qu’on lui oppose. Nos résultats donnent lieu de discuter des trois ensembles de méthodes souvent employés dans la lutte contre le piratage : la déstabilisation, la dissuasion et la mise en valeur d’alternatives légales. Introduction Pendant la crise mondiale du Covid-19 en 2020, des leurs carrières pirates ? À quoi sont dus les entrées, pics de connexions à Internet ont été observés dans les accélérations, les ralentissements et les sorties de les régions du monde où ont été mises en place des carrières ? Peut-on repérer dans celles-ci des facteurs politiques de confinement.
    [Show full text]
  • Written Submission of the Recording Industry Association of America (RIAA) Before the United States International Trade Commission
    Written Submission of the Recording Industry Association of America (RIAA) before the United States International Trade Commission Global Digital Trade 3: The Business-to-Consumer Market, Key Foreign Trade Restrictions, and U.S. Competitiveness The Recording Industry Association of America (RIAA) is the trade organization that supports and promotes the creative and financial vitality of the major music companies. Its members are the music labels that comprise the most vibrant record industry in the world. RIAA members create, manufacture and/or distribute approximately 85 percent of all legitimate recorded music produced and sold in the United States. Our membership includes several hundred companies, many of which are small-to-medium-sized enterprises (SMEs) distributed by larger record labels. The RIAA welcomes the opportunity to provide this written submission to the United States International Trade Commission (the Commission) in response to 83 Fed. Reg. 3185 (January 23, 2018) with respect to Investigation No. 332-563, Global Digital Trade 3: The Business-to- Consumer Market, Key Foreign Trade Restrictions, and U.S. Competitiveness, for the purpose of preparing the second and third of three reports requested by the Office of the United States Trade Representative (USTR) on January 13, 2017 under section 332(g) of the Tariff Act of 1930 (19 U.S.C. §1332(g)). In addition to providing information responding to Parts 2 and 3 of the Commission’s investigation specifically, this written submission updates various aspect of the RIAA written submission, including the latest available data as well as analysis reflecting developments following RIAA’s filing with the Commission for its investigation no.
    [Show full text]
  • Windows Trust 4.5 12.05 Torrent
    Windows Trust 4.5 12.05 Torrent 1 / 4 Windows Trust 4.5 12.05 Torrent 2 / 4 3 / 4 Sorry – that page has been closed and donations can no longer be made to it. Looking for something awesome to support? Why not browse some of the other .... ... 2013 R2 SP1 Build 19.5.0.30 MULTiLANGUAGE-SolidSQUAD vlsi technology books free download pdf Torrent Windows Trust 4.5 12.05 --.. Windows Trust 4.5 12.05 Torrent Rapidshare DOWNLOAD (Mirror #1) c1731006c4 Download free demo of Neat Video . Premiere Elements .... Torrent Windows Trust 4.5 12.05 >>> http://urllie.com/xhqz1 windows trustedinstaller windows trust relationship windows trust self .... Windows XP/Vista/7/8/10 ... Posiada wbudowany kreator do tworzenia nowych plików w formacie .torrent, a także oferuje dostęp do zaawansowanych opcji .... Listen to Windows Trust 4.5 12.05 Torrent Rapidshare and 183 more episodes by Metal Fight Beyblade Psp Download English Torrent, free!. Windows Trust 4.5 12.05 Torrent Rapidshare > http://urlin.us/1rx6s. Spoiler: torrent Windows Trust 4.5 12.05 [fast mirror download] &nbsp .... qBittorrent is based on the Qt toolkit and libtorrent-rasterbar library. ... port forwarding support; Available on all platforms: Windows, Linux, macOS, FreeBSD, OS/ .... Windows Trust 4.5 12.05 and 183._. and 183 and ... Windows Trust 4.5 Fr Iso Torrent tinyurl.comll7nreh. simcity net activation library.dll-adds. Cute French Girl .... File Name : Windows Trust 4.5 12.05. Languages : French Size : 850 MB MD5 HASH : e4fa8689ac7bb1d131d2606cf47c920c CheckSumS : .... Video Bokep Perawan Indo 97ffa81d91. Rakta charitra 1 telugu mobilemovies download.
    [Show full text]
  • The Illicit Ecosystem of Digital Cultural Goods
    The illicit ecosystem of digital cultural goods The technical and economic models of sites and services that offer illegal streaming and downloading of cultural goods January 2019 Contents Summary of the study .................................................................................................................. 4 Framework of the study ............................................................................................................... 7 1 | Consumer practices and behaviours in terms of digital cultural goods in France ........................ 9 1 - 1 | The cultural goods industry in France .......................................................................................9 1 - 1 | Unlawful consumption practices of digital cultural contents ................................................. 11 2 | The illegal consumption ecosystem and its stakeholders ......................................................... 15 2 - 1 | Overview of the players .......................................................................................................... 17 2 - 2 | Trends within the ecosystem .................................................................................................. 19 3 | Central players ....................................................................................................................... 21 3 - 1 | Interactions between content hosting providers and referral sites ....................................... 22 3 - 2 | Content hosting providers .....................................................................................................
    [Show full text]
  • Sizing the Piracy Universe
    rFlS Sizing the piracy universe David Price Director of Piracy Analysis, NetNames September 2013 NetNames Piracy Analysis: Sizing the piracy universe Page 2 1 Executive Summary 1.1 Introduction This report draws data from a wide range of reliable sources to provide an estimate of the shape and size of the piracy universe. It is based upon an in-depth study of a range of ecosystems commonly used for the distribution of infringing content. Analysis demonstrates the number of unique internet users who employ each infringement method to obtain material as well as the overall proportion of internet bandwidth used by each ecosystem. In addition to original data collection by NetNames, the report draws on supplemental data from leading companies including Sandvine and Cisco. The report, which has been commissioned by NBCUniversal, was prepared by the Piracy Analysis team at NetNames, formerly known as Envisional. In January 2011, Envisional published the report An Estimate of Infringing Use of the Internet, an analysis focused on the use of internet bandwidth for the distribution of infringing content such as pirated films, television, music, and software.1 This new report includes an extended examination of bandwidth data that updates some of the findings from the 2011 publication. However, it takes a look at a broader range of considerations, including: a detailed examination of the number of users involved in a range of major internet ecosystems an evaluation of the level of infringement within each ecosystem an analysis of trends over time a look at business models and revenue generation used by sites that facilitate infringement a discussion of the rise of mobile and an analysis of the impact of enforcement efforts on infringement.
    [Show full text]
  • Filesharing Und Abmahnwesen
    Filesharing und Abmahnwesen Inaugural-Dissertation zur Erlangung der Doktorwürde der Hohen Juristischen Fakultät der Ludwig-Maximilians-Universität zu München vorgelegt von Lars-Oliver Eggersdorfer 2021 Referentin: Prof. Dr. Dr. h.c. Annette Kur Korreferent: Prof. Dr. Matthias Leistner Tag der mündlichen Prüfung: 26. Oktober 2020 Vorwort Die vorliegende Arbeit wurde von November 2016 bis Juli 2019 am Max- Planck-Institut für Innovation und Wettbewerb angefertigt. Die rechtlichen und tatsächlichen Entwicklungen bis einschließlich März 2021 wurden be- rücksichtigt. Ein eigenständig entwickeltes Thema eines extern Promovierenden stellt für eine Betreuerin stets ein großes Wagnis dar. Besonderer Dank gilt daher mei- ner Doktormutter Frau Professorin Annette Kur, die sich hierauf eingelassen hat und mir mit Ratschlägen und weiterführenden Hinweisen zur Seite stand. Herrn Professor Matthias Leistner danke ich für die Anfertigung des Zweit- gutachtens sowie die darin enthaltenen Impulse für die Veröfentlichung, Herrn Professor Ansgar Ohly für die Abnahme der mündlichen Prüfung. Weiterhin bedanke ich mich bei Herrn Professor Clement Petersen und Herrn Rechtsanwalt Pauli Sortti für die Erläuterungen zur Rechtslage in Dänemark bzw. Finnland. Caterina Schürch verdanke ich den letzten Schlif bei der Setzung der Arbeit in Latex. Meiner Frau Cora Stuhrmann für alles zu danken, würde den Rahmen des Vorworts sprengen. Ich beschränke mich daher auf Ihren Beitrag zur formalen Fertigstellung und Einreichung. Ihr und unserer Tochter Mathilda ist die vorliegende Arbeit gewidmet. Lars Eggersdorfer München, den 30. Juni 2021 Inhaltsübersicht § 1 Technische Vorfragen . 13 § 2 Die Behandlung des flesharing in der Praxis der Rechtspre- chung und der Gesetzgebung . 101 § 3 Das sogennante Abmahnwesen . 171 § 4 Dogmatische Bewertung der gegenwärtigen Rechtslage .
    [Show full text]
  • Digital Bait
    DIGITAL BAIT HOW CONTENT THEFT SITES AND MALWARE ARE EXPLOITED BY CYBERCRIMINALS TO HACK INTO INTERNET USERS’ COMPUTERS AND PERSONAL DATA DECEMBER 2015 TABLE OF CONTENTS INTRODUCTION AND SUMMARY .............................................................................................................1-2 OBJECTIVES AND METHODOLOGY ......................................................................................................3-5 Objectives ........................................................................................................................................................................ 3 Quantitative Study Methodology Overview .................................................................................. 3 Sample Design ........................................................................................................................................................... 3 Control Group Design ...........................................................................................................................................4 Data Collection ............................................................................................................................................................4 Data Availability ...........................................................................................................................................................4 Profile of a Crimeware Distribution Network ..................................................................................5 QUANTITATIVE
    [Show full text]