Malicious Bots : an Inside Look Into the Cyber‑Criminal Underground of the Internet / Ken Dunham and Jim Melnick

Total Page:16

File Type:pdf, Size:1020Kb

Malicious Bots : an Inside Look Into the Cyber‑Criminal Underground of the Internet / Ken Dunham and Jim Melnick An Inside Look into the Cyber-Criminal Underground of the Internet KEN DUNHAM JIM MELNICK Boca Raton London New York CRC Press is an imprint of the Taylor & Francis Group, an informa business AN AUERBACH BOOK Auerbach Publications Taylor & Francis Group 6000 Broken Sound Parkway NW, Suite 300 Boca Raton, FL 33487-2742 © 2009 by Taylor & Francis Group, LLC Auerbach is an imprint of Taylor & Francis Group, an Informa business No claim to original U.S. Government works Printed in the United States of America on acid-free paper 10 9 8 7 6 5 4 3 2 1 International Standard Book Number-13: 978-1-4200-6903-7 (Hardcover) This book contains information obtained from authentic and highly regarded sources. Reasonable efforts have been made to publish reliable data and information, but the author and publisher can- not assume responsibility for the validity of all materials or the consequences of their use. The authors and publishers have attempted to trace the copyright holders of all material reproduced in this publication and apologize to copyright holders if permission to publish in this form has not been obtained. If any copyright material has not been acknowledged please write and let us know so we may rectify in any future reprint. Except as permitted under U.S. Copyright Law, no part of this book may be reprinted, reproduced, transmitted, or utilized in any form by any electronic, mechanical, or other means, now known or hereafter invented, including photocopying, microfilming, and recording, or in any information storage or retrieval system, without written permission from the publishers. For permission to photocopy or use material electronically from this work, please access www.copy- right.com (http://www.copyright.com/) or contact the Copyright Clearance Center, Inc. (CCC), 222 Rosewood Drive, Danvers, MA 01923, 978-750-8400. CCC is a not-for-profit organization that pro- vides licenses and registration for a variety of users. For organizations that have been granted a photocopy license by the CCC, a separate system of payment has been arranged. Trademark Notice: Product or corporate names may be trademarks or registered trademarks, and are used only for identification and explanation without intent to infringe. Library of Congress Cataloging-in-Publication Data Dunham, Ken. Malicious bots : an inside look into the cyber-criminal underground of the internet / Ken Dunham and Jim Melnick. p. cm. Includes bibliographical references and index. ISBN 978-1-4200-6903-7 (alk. paper) 1. Computer crimes--Case studies. 2. Internet. I. Melnick, Jim. II. Title. HV6773.D86 2008 364.16’8--dc22 2008010309 Visit the Taylor & Francis Web site at http://www.taylorandfrancis.com and the Auerbach Web site at http://www.auerbach-publications.com Dedication We give thanks to God, who makes all things possible: For all have sinned, and come short of the glory of God. Romans 3:23 For the wages of sin is death; but the gift of God is eternal life through Jesus Christ our Lord. Romans 6:23 God demonstrates His own love for us, in that while we were yet sinners Christ died for us! Romans 5:8 If you confess with your mouth Jesus as Lord, and believe in your heart that God raised Jesus from the dead, you shall be saved; for with the heart man believes, resulting in righteousness, and with the mouth he confesses, resulting in salvation. Romans 10:9–10 To our families, we thank you for your unconditional love and support, making this book possible. iii Contents Preface ............................................................................................................ix Acknowledgments and Permissions ...............................................................xi About the Authors .......................................................................................xiii 1 Introduction to Bots ...............................................................................1 2 Thr34t Security Krew and the TK Worm ...............................................7 2.1 The Investigation of the Thr34t Krew .................................................9 La n Ce M u e lle r 2.1.1 First DYn Dn S a ccount (BestIce) ........................................12 2.1.2 Second DYn Dn S a ccount (Phreeze) ...................................16 2.1.3 Third DYn Dn S a ccount (D00M) .......................................19 2.1.4 Seth Fogie .............................................................................21 2.1.5 Help with a dditional Technical Details ................................23 2.1.6 a Trip a cross the Pond..........................................................23 2.1.7 Sitexec ...................................................................................25 2.1.8 DiSice....................................................................................26 2.1.9 Xan iTH ...............................................................................28 2.1.10 Sitexec ...................................................................................30 2.1.11 Second Search Warrant Sweep ..............................................30 2.1.12 Jadaka ...................................................................................30 2.1.13 Mr40 .....................................................................................31 2.1.14 Thr34t Krew Investigation: Concluding Comments .............31 3 Demonstration: How a Hacker Launches a Botnet Attack ..................33 3.1 Step 1: Find, Modify, and Build a Bot ..............................................33 3.2 Step 2: Customize the Binary for a ttack ..........................................35 3.3 Step 3: Launch the a ttack ................................................................37 3.4 Step 4: Managing the Botherd ..........................................................37 3.5 Step 5: Payloads, with an e mphasis on “Pay”....................................39 i ◾ Contents 4 Introduction to the Use of Botnets in Criminal Activity .....................41 4.1 Timeline ...........................................................................................41 4.2 Bots: a Pathway to Criminalization of the Information a ge ........... 44 4.3 Bots: The Integrated Business Solution for Criminals .......................45 4.4 “Botmasters” Who Were Caught ..................................................... 46 4.4.1 International Botnet Task Force Conferences ........................47 4.4.2 Operation “Bot r oast” I and II .............................................47 4.5 How Big Do Botnets n eed to Be to Pose a Serious Threat? ..............48 4.6 Peering Inside the Ir C Botnet ..........................................................50 4.7 Post-Ir C-Based Bots ........................................................................50 4.7.1 Botnet a ttack Statistics .........................................................52 4.8 Botnet Features and the Criminal e nterprise ....................................54 4.8.1 a Modular a pproach to Botnets: a Major a id to Criminals ..............................................................................54 4.8.2 Granular Spreading Capabilities ...........................................55 4.8.3 a “Service Bot” .....................................................................55 4.8.4 The Degradation Feature of Botnets and Its Impact on Criminal a ctivity ..................................................................56 4.9 Botherds Through the e yes of a Criminal Mind ...............................57 4.10 Criminal Vectors u tilizing Bots .......................................................57 4.10.1 Theft of Sensitive Information ...............................................57 4.10.2 DDoS a ttacks and e xtortion ................................................58 4.10.3 Bot for r ent or Hire ............................................................. 60 4.10.4 Spam .....................................................................................63 4.11 Spam Bots and Criminalization ........................................................65 4.11.1 Pump-and-Dump Fraud ...................................................... 66 4.11.2 Covert Communications .......................................................67 4.11.3 Click Fraud and a ffiliate a buse ............................................68 4.11.4 a dware a buse .......................................................................69 4.11.5 Taking Out the Competition ................................................70 5 Botnets and the eCrime Cycle: The iSIGHT Partners’ Approach.........71 6 Technical Introduction to Bots ............................................................75 6.1 Common Ports .................................................................................75 6.2 Command and Control Strategies ....................................................76 6.2.1 Ir C C&C .............................................................................76 6.2.2 Peer-to-Peer C&C .................................................................79 6.2.3 Web-Based C&C ................................................................. 80 6.2.4 u se of e ncryption or Obfuscation ........................................ 84 6.2.5 Types of Distributed Denial of Service (DDoS) a ttacks .......85 6.2.6 Introduction to Selected Bots ................................................86 6.2.6.1 a goBot ..................................................................89 Contents ◾ ii 6.2.6.2 SDBot ...................................................................91
Recommended publications
  • DETECTING BOTS in INTERNET CHAT by SRITI KUMAR Under The
    DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR (Under the Direction of Kang Li) ABSTRACT Internet chat is a real-time communication tool that allows on-line users to communicate via text in virtual spaces, called chat rooms or channels. The abuse of Internet chat by bots also known as chat bots/chatterbots poses a serious threat to the users and quality of service. Chat bots target popular chat networks to distribute spam and malware. We first collect data from a large commercial chat network and then conduct a series of analysis. While analyzing the data, different patterns were detected which represented different bot behaviors. Based on the analysis on the dataset, we proposed a classification system with three main components (1) content- based classifiers (2) machine learning classifier (3) communicator. All three components of the system complement each other in detecting bots. Evaluation of the system has shown some measured success in detecting bots in both log-based dataset and in live chat rooms. INDEX WORDS: Yahoo! Chat room, Chat Bots, ChatterBots, SPAM, YMSG DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR B.E., Visveswariah Technological University, India, 2006 A Thesis Submitted to the Graduate Faculty of The University of Georgia in Partial Fulfillment of the Requirements for the Degree MASTER OF SCIENCE ATHENS, GEORGIA 2010 © 2010 Sriti Kumar All Rights Reserved DETECTING BOTS IN INTERNET CHAT by SRITI KUMAR Major Professor: Kang Li Committee: Lakshmish Ramaxwamy Prashant Doshi Electronic Version Approved: Maureen Grasso Dean of the Graduate School The University of Georgia December 2010 DEDICATION I would like to dedicate my work to my mother to be patient with me, my father for never questioning me, my brother for his constant guidance and above all for their unconditional love.
    [Show full text]
  • World of Warcraft Online Manual
    Game Experience May Change During Online Play WOWz 9/11/04 4:02 PM Page 2 Copyright ©2004 by Blizzard Entertainment. All rights reserved. The use of this software product is subject to the terms of the enclosed End User License Agreement. You must accept the End User License Agreement before you can use the product. Use of World of Warcraft, is subject to your acceptance of the World of Warcraft® Terms of Use Agreement. World of Warcraft, Warcraft and Blizzard Entertainment are trademarks or registered trademarks of Blizzard Entertainment in the U.S. and/or other countries.Windows and DirectX are trademarks or registered trademarks of Microsoft Corporation in the U.S. and/or other countries. Pentium is a registered trademark of Intel Corporation. Power Macintosh is a registered trademark of Apple Computer, Inc. Dolby and the double-D symbol are trademarks of Dolby Laboratory. Monotype is a trademark of Agfa Monotype Limited registered in the U.S. Patent and Trademark ® Office and certain other jurisdictions. Arial is a trademark of The Monotype Corporation registered in the U.S. Patent and Trademark Office and certain other jurisdictions. ITC Friz Quadrata is a trademark of The International Typeface Corporation which may be registered in certain jurisdictions. All other trademarks are the property of their respective owners. Uses high-quality DivX® Video. DivX® and the DivX® Video logo are trademarks of DivXNetworks, Inc. and are used under license. All rights reserved. AMD, the AMD logo, and combinations thereof are trademarks of Advanced Micro Devices, Inc All ATI product and product feature names and logos, including ATI, the ATI Logo, and RADEON are trademarks and / or registered trademarks of ATI Technologies Inc.
    [Show full text]
  • AOL Offers Video Chat with No Log-In, Download 13 May 2011, by RACHEL METZ , AP Technology Writer
    AOL offers video chat with no log-in, download 13 May 2011, By RACHEL METZ , AP Technology Writer In a move to become more competitive in the fast- AV's release comes two days after Microsoft Corp. growing field of video chat, the team behind AOL said it would pay $8.5 billion for popular Internet Inc.'s AIM instant messenger rolled out the first phone service Skype, which allows people to make version of a free video chat service on Thursday free and cheap voice and video calls. that doesn't require users to log in or download any software. ©2011 The Associated Press. All rights reserved. This material may not be published, broadcast, Called AV, the service was created as a way to rewritten or redistributed. have quick, easy video chats, Jason Shellen, a leader of the AIM team, said. Though there are plenty of other voice and video chat offerings available for computers and smartphones, AV is unlike many with its decision to eschew both logins and software downloads. In order to start a chat, a user gets a unique link from AV and sends it to friends. Once a friend with a webcam clicks on the link, a chat window will pop up on the screen and show live video of the user who started the chat session and any other participants. Up to four people can be involved in a chat at once, Shellen said. The service has several features, such as the ability to type messages to individual users while video chatting - to send a link to a webpage, for example.
    [Show full text]
  • Attacker Chatbots for Randomised and Interactive Security Labs, Using Secgen and Ovirt
    Hackerbot: Attacker Chatbots for Randomised and Interactive Security Labs, Using SecGen and oVirt Z. Cliffe Schreuders, Thomas Shaw, Aimée Mac Muireadhaigh, Paul Staniforth, Leeds Beckett University Abstract challenges, rewarding correct solutions with flags. We deployed an oVirt infrastructure to host the VMs, and Capture the flag (CTF) has been applied with success in leveraged the SecGen framework [6] to generate lab cybersecurity education, and works particularly well sheets, provision VMs, and provide randomisation when learning offensive techniques. However, between students. defensive security and incident response do not always naturally fit the existing approaches to CTF. We present 2. Related Literature Hackerbot, a unique approach for teaching computer Capture the flag (CTF) is a type of cyber security game security: students interact with a malicious attacker which involves collecting flags by solving security chatbot, who challenges them to complete a variety of challenges. CTF events give professionals, students, security tasks, including defensive and investigatory and enthusiasts an opportunity to test their security challenges. Challenges are randomised using SecGen, skills in competition. CTFs emerged out of the and deployed onto an oVirt infrastructure. DEFCON hacker conference [7] and remain common Evaluation data included system performance, mixed activities at cybersecurity conferences and online [8]. methods questionnaires (including the Instructional Some events target students with the goal of Materials Motivation Survey (IMMS) and the System encouraging interest in the field: for example, PicoCTF Usability Scale (SUS)), and group interviews/focus is an annual high school competition [9], and CSAW groups. Results were encouraging, finding the approach CTF is an annual competition for students in Higher convenient, engaging, fun, and interactive; while Education (HE) [10].
    [Show full text]
  • Users As Co-Designers of Software-Based Media: the Co-Construction of Internet Relay Chat
    Users as Co-Designers of Software-Based Media: The Co-Construction of Internet Relay Chat Guillaume Latzko-Toth Université Laval AbsTrAcT While it has become commonplace to present users as co-creators or “produsers” of digital media, their participation is generally considered in terms of content production. The case of Internet Relay Chat (IRC) shows that users can be fully involved in the design process, a co-construction in the sense of Science and Technology Studies (STS): a collective, simultaneous, and mutual construction of actors and artifacts. A case study of the early de - velopment of two IRC networks sheds light on that process and shows that “ordinary users” managed to invite themselves as co-designers of the socio-technical device. The article con - cludes by suggesting that IRC openness to user agency is not an intrinsic property of software- based media and has more to do with its architecture and governance structure. Keywords Digital media; Communication technology; Co-construction; Design process; Ordinary user résumé Il est devenu banal de présenter l’usager comme cocréateur ou « produtilisateur » des médias numériques, mais sa participation est généralement envisagée comme une production de contenus. Le cas d’IRC (Internet Relay Chat) montre que les usagers des médias à support logiciel peuvent s’engager pleinement dans le processus de conception, une co-construction au sens des Science and Technology Studies : une construction collective, simultanée et mutuelle des acteurs et des artefacts. Une étude de cas portant sur le développement de deux réseaux IRC éclaire ce processus et montre que les « usagers ordinaires » sont parvenus à s’inviter comme co-concepteurs du dispositif.
    [Show full text]
  • Massively Multiplayer Online Role Playing Game Chat Project
    [Massively Multiplayer Online Role Playing Game Chat] 175 Lakeside Ave, Room 300A Phone: (802)865-5744 Fax: (802)865-6446 1/21/2016 http://www.lcdi.champlain.edu Disclaimer: This document contains information based on research that has been gathered by employee(s) of The Senator Patrick Leahy Center for Digital Investigation (LCDI). The data contained in this project is submitted voluntarily and is unaudited. Every effort has been made by LCDI to assure the accuracy and reliability of the data contained in this report. However, LCDI nor any of our employees make no representation, warranty or guarantee in connection with this report and hereby expressly disclaims any liability or responsibility for loss or damage resulting from use of this data. Information in this report can be downloaded and redistributed by any person or persons. Any redistribution must maintain the LCDI logo and any references from this report must be properly annotated. Contents Introduction ............................................................................................................................................................................ 2 Background: ........................................................................................................................................................................ 2 Purpose and Scope: ............................................................................................................................................................. 3 Research Questions: ...........................................................................................................................................................
    [Show full text]
  • The Summarization of Technical Internet Relay Chats
    Proceedings of the ACL conference. Ann Arbor, MI. July 2005. Digesting Virtual “Geek” Culture: The Summarization of Technical Internet Relay Chats Liang Zhou and Eduard Hovy University of Southern California Information Sciences Institute 4676 Admiralty Way Marina del Rey, CA 90292-6695 {liangz, hovy} @isi.edu used for analyzing the impact of virtual social in- Abstract teractions and virtual organizational culture on software/product development. This paper describes a summarization sys- The emergence of email thread discussions and tem for technical chats and emails on the chat logs as a major information source has Linux kernel. To reflect the complexity prompted increased interest in thread summariza- and sophistication of the discussions, they tion within the Natural Language Processing are clustered according to subtopic struc- (NLP) community. One might assume a smooth ture on the sub-message level, and imme- transition from text-based summarization to email diate responding pairs are identified and chat-based summarizations. However, chat through machine learning methods. A re- falls in the genre of correspondence, which re- sulting summary consists of one or more quires dialogue and conversation analysis. This mini-summaries, each on a subtopic from property makes summarization in this area even the discussion. more difficult than traditional summarization. In particular, topic “drift” occurs more radically than in written genres, and interpersonal and pragmatic 1 Introduction content appears more frequently. Questions about the content and overall organization of the sum- The availability of many chat forums reflects the mary must be addressed in a more thorough way formation of globally dispersed virtual communi- for chat and other dialogue summarization sys- ties.
    [Show full text]
  • A Double Horizon Defense Design for Robust Regulation of Malicious Traffic
    University of Pennsylvania ScholarlyCommons Departmental Papers (ESE) Department of Electrical & Systems Engineering August 2006 A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Ying Xu University of Pennsylvania, [email protected] Roch A. Guérin University of Pennsylvania, [email protected] Follow this and additional works at: https://repository.upenn.edu/ese_papers Recommended Citation Ying Xu and Roch A. Guérin, "A Double Horizon Defense Design for Robust Regulation of Malicious Traffic", . August 2006. Copyright 2006 IEEE. In Proceedings of the Second IEEE Communications Society/CreateNet International Conference on Security and Privacy in Communication Networks (SecureComm 2006). This material is posted here with permission of the IEEE. Such permission of the IEEE does not in any way imply IEEE endorsement of any of the University of Pennsylvania's products or services. Internal or personal use of this material is permitted. However, permission to reprint/republish this material for advertising or promotional purposes or for creating new collective works for resale or redistribution must be obtained from the IEEE by writing to [email protected]. By choosing to view this document, you agree to all provisions of the copyright laws protecting it. This paper is posted at ScholarlyCommons. https://repository.upenn.edu/ese_papers/190 For more information, please contact [email protected]. A Double Horizon Defense Design for Robust Regulation of Malicious Traffic Abstract Deploying defense mechanisms in routers holds promises for protecting infrastructure resources such as link bandwidth or router buffers against network Denial-of-Service (DoS) attacks. However, in spite of their efficacy against bruteforce flooding attacks, existing outer-basedr defenses often perform poorly when confronted to more sophisticated attack strategies.
    [Show full text]
  • Tomenet-Guide.Pdf
    .==========================================================================+−−. | TomeNET Guide | +==========================================================================+− | Latest update: 17. September 2021 − written by C. Blue ([email protected]) | | for TomeNET version v4.7.4b − official websites are: : | https://www.tomenet.eu/ (official main site, formerly www.tomenet.net) | https://muuttuja.org/tomenet/ (Mikael’s TomeNET site) | Runes & Runemastery sections by Kurzel ([email protected]) | | You should always keep this guide up to date: Either go to www.tomenet.eu | to obtain the latest copy or simply run the TomeNET−Updater.exe in your | TomeNET installation folder (desktop shortcut should also be available) | to update it. | | If your text editor cannot display the guide properly (needs fixed−width | font like for example Courier), simply open it in any web browser instead. +−−− | Welcome to this guide! | Although I’m trying, I give no guarantee that this guide | a) contains really every detail/issue about TomeNET and | b) is all the time 100% accurate on every occasion. | Don’t blame me if something differs or is missing; it shouldn’t though. | | If you have any suggestions about the guide or the game, please use the | /rfe command in the game or write to the official forum on www.tomenet.eu. : \ Contents −−−−−−−− (0) Quickstart (If you don’t like to read much :) (0.1) Start & play, character validation, character timeout (0.1a) Colours and colour blindness (0.1b) Photosensitivity / Epilepsy issues (0.2) Command reference
    [Show full text]
  • Feb 18 Customer Order Form
    #365 | FEB19 PREVIEWS world.com Name: ORDERS DUE FEB 18 THE COMIC SHOP’S CATALOG PREVIEWSPREVIEWS CUSTOMER ORDER FORM CUSTOMER 601 7 Feb19 Cover ROF and COF.indd 1 1/10/2019 11:11:39 AM SAVE THE DATE! FREE COMICS FOR EVERYONE! Details @ www.freecomicbookday.com /freecomicbook @freecomicbook @freecomicbookday FCBD19_STD_comic size.indd 1 12/6/2018 12:40:26 PM ASCENDER #1 IMAGE COMICS LITTLE GIRLS OGN TP IMAGE COMICS AMERICAN GODS: THE MOMENT OF THE STORM #1 DARK HORSE COMICS SHE COULD FLY: THE LOST PILOT #1 DARK HORSE COMICS SIX DAYS HC DC COMICS/VERTIGO TEEN TITANS: RAVEN TP DC COMICS/DC INK TEENAGE MUTANT NINJA ASCENDER #1 TURTLES #93 STAR TREK: YEAR FIVE #1 IMAGE COMICS IDW PUBLISHING IDW PUBLISHING TEENAGE MUTANT NINJA TURTLES #93 IDW PUBLISHING THE WAR OF THE REALMS: JOURNEY INTO MYSTERY #1 MARVEL COMICS XENA: WARRIOR PRINCESS #1 DYNAMITE ENTERTAINMENT FAITHLESS #1 BOOM! STUDIOS SIX DAYS HC DC COMICS/VERTIGO THE WAR OF LITTLE GIRLS THE REALMS: OGN TP JOURNEY INTO IMAGE COMICS MYSTERY #1 MARVEL COMICS TEEN TITANS: RAVEN TP DC COMICS/DC INK AMERICAN GODS: THE MOMENT OF XENA: THE STORM #1 WARRIOR DARK HORSE COMICS PRINCESS #1 DYNAMITE ENTERTAINMENT STAR TREK: YEAR FIVE #1 IDW PUBLISHING SHE COULD FLY: FAITHLESS #1 THE LOST PILOT #1 BOOM! STUDIOS DARK HORSE COMICS Feb19 Gem Page ROF COF.indd 1 1/10/2019 3:02:07 PM FEATURED ITEMS COMIC BOOKS & GRAPHIC NOVELS Strangers In Paradise XXV Omnibus SC/HC l ABSTRACT STUDIOS The Replacer GN l AFTERSHOCK COMICS Mary Shelley: Monster Hunter #1 l AFTERSHOCK COMICS Bronze Age Boogie #1 l AHOY COMICS Laurel & Hardy #1 l AMERICAN MYTHOLOGY PRODUCTIONS Jughead the Hunger vs.
    [Show full text]
  • Hardware Mechanisms for Distributed Dynamic Software Analysis
    Hardware Mechanisms for Distributed Dynamic Software Analysis by Joseph Lee Greathouse A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy (Computer Science and Engineering) in The University of Michigan 2012 Doctoral Committee: Professor Todd M. Austin, Chair Professor Scott Mahlke Associate Professor Robert Dick Associate Professor Jason Nelson Flinn c Joseph Lee Greathouse All Rights Reserved 2012 To my parents, Gail and Russell Greathouse. Without their support throughout my life, I would never have made it this far. ii Acknowledgments First and foremost, I must thank my advisor, Professor Todd Austin, for his help and guid- ance throughout my graduate career. I started graduate school with the broad desire to “research computer architecture,” but under Professor Austin’s watch, I have been able to hone this into work that interests us both and has real applications. His spot-on advice about choosing topics, performing research, writing papers, and giving talks has been an invaluable introduction to the research world. The members of my committee, Professors Robert Dick, Jason Flinn, and Scott Mahlke, also deserve special gratitude. Their insights, comments, and suggestions have immea- surably improved this dissertation. Together their expertise spans low-level hardware to systems software and beyond. This meant that I needed to ensure that any of my ideas were defensible from all sides. I have been fortunate enough to collaborate with numerous co-authors. I have often published with Professor Valeria Bertacco, who, much like Professor Austin, has given me invaluable advice during my time at Michigan. I am extremely lucky to have had the chance to work closely with Ilya Wagner, David Ramos, and Andrea Pellegrini, all of whom have continued to be good friends even after the high-stress publication process.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]