East Asian Cinema in the UK

Total Page:16

File Type:pdf, Size:1020Kb

East Asian Cinema in the UK Film Distribution in the Age of the Internet: East Asian Cinema in the UK Virginia Crisp Goldsmiths College, University of London for the degree of PhD in Media and Communications 1 I hereby declare that the work presented herein is entirely my own ………………………….. Virginia Crisp, April, 2012 2 Acknowledgements Special thanks go to my supervisor, Professor Chris Berry, for all of his support through the process of developing this thesis. Heartfelt thanks go to my Mum for reading extracts of my work and for believing in me throughout my studies. I would like to thank all of my colleagues at Middlesex University, but particular thanks go to Sarah Baker, James Graham and Ben Little for their endless encouragement. Thanks also go to Andy Goffey, Jo Littler and Farah Mendlesohn, who have all supported my research in different ways. I would also like to give a special mention to Jim Pipkin, Pam Pipkin, Tony Murphy, Sue Murphy and Bunny Veglio for listening to, and encouraging, the bizarre ideas of an irritating child. I would particularly like to thank Gavin, without his love, patience and support I would never have got this far. The final thesis is dedicated to my parents. 3 Abstract This thesis provides an integrated analysis of formal and informal distribution networks for East Asian Cinema in the UK through interviews and ethnographic-style research. It examines what motivates and shapes the acquisition decisions of distributors in these contexts and how these motivations might conflict, interact with, or complement one another. Whilst existing literature has focused on formal distribution and ‘piracy’ as distinct phenomena, this thesis considers both in conjunction with each other and also uncovers the distinct social contexts of each environment. Through anti-piracy discourse, the positions and priorities of ‘pirates’ and the ‘industry’ are repeatedly constructed as unequivocally distinct and oppositional. However, on the basis of my research, I argue that these seemingly opposed groups -- professional distributors and filesharers -- are more similar than we might imagine. The connections between the online and offline distributors can be noted in a number of ways. First, the actions of distributors within formal and informal networks involve complex social and cultural interactions rather than purely economic considerations. Second, an individual’s position in a socially imagined ‘knowledge community’ is perceived to be more significant than economic interest in motivating the activities of distributors within both formal and informal channels. Third, by applying Molteni and Ordanini’s principle of socio-network effects, I argue that distributors online and offline are engaged in a symbiotic relationship where each party can be said to benefit socially and culturally, if not necessarily economically, from the actions of each other. Overall, this thesis argues that social contexts of distribution in formal and informal settings shape the distribution process. Indeed, rather than just representing the movement of an economic commodity, the act of film distribution also mediates and facilitates the social and professional relationships of distributors across both sectors. 4 Table of Contents List of Figures ..................................................................................................... 5 1. Introduction..................................................................................................... 6 2. Literature Review......................................................................................... 23 3. Methodology................................................................................................. 56 4. The ‘Imagined’ East Asian Film Fan Community.................................... 74 5. Formal Networks of Distribution: Tartan and Third Window Films ..... 120 6. Informal Distribution Networks: Sharing in the Community ................. 154 7. ‘I’ll Scratch your Back…’: Symbiotic Relationships............................... 177 8. Conclusion .................................................................................................. 199 Appendices ..................................................................................................... 219 List of Figures Figure 1. Member Categorisation by Total Forum Posts.…………………………….…..97 Figure 2. Member Categorisation by Total Forum Posts (excluding lurkers)……..……98 Figure 3. Member Categorisation by Total Forum Posts (excluding lurkers) as a Proportion of Total Membership………………………..…………………………..….……99 Figure 4. The Online Distribution Cycle……………………………………………..….….167 5 1. Introduction This thesis asks how both formal and informal distribution networks for East Asian1 films in the UK function and interact. The basis for such an examination is the proposition that the social and cultural context of ‘film’ must be examined in conjunction with the economic in order to produce a holistic understanding of how films circulate transnationally. To examine the dissemination of East Asian film in the UK as a case study two UK distribution companies that specialise in East Asian films and two filesharing forums that are similarly dedicated to circulating East Asian cinema were selected for analysis. Interviews and ethnographic-style online research facilitated the examination of two more focused questions. First, what motivates and shapes the acquisition decisions of distributors in both formal and informal contexts? Second, in what manner, if any, can the motivations of both parties be seen to conflict, interact, or complement one another? Although these two parties have such a dominant role in the dissemination of film texts and are inextricably connected, there is a lack of research in studies of film distribution and/or piracy that directly examines the nature of the relationship between them. The existing literature on distribution also tends to focus on the dominance of Hollywood and there is a need for more work on the role of ‘independent’ distribution networks in general. Furthermore, previous studies of filesharing have been too narrow. They have been particularly preoccupied with establishing whether filesharing is damaging or beneficial to the industry. I argue that such a focus assumes that filesharing is in some manner a homogenous activity underpinned by a unified set of motivations, and that it results in a similarly predictable set of outcomes. The field is also weighted toward studies that attempt to establish what motivates filesharers so that they can be forced or persuaded to halt their activities.2 These dual preoccupations dominate the discussion, leaving a need for more work on the social and cultural aspects of filesharing, which have hitherto been examined in only a few interesting, but regrettably scarce, studies.3 Finally, many academic and popular discussions surrounding digital piracy focus on the 1 The term East Asian cinema is used within this thesis to describe films originating from Mainland China, Hong Kong, Taiwan, Korea and Japan. Both the autonomous and professional distributors tend to use the term Asian cinema to describe the films from these nations. However, for the sake of clarity and to differentiate such films from those produced in other Asian countries such as India and Pakistan, the term East Asian film in used within this thesis. 2 For example see Jeffrey S. Podoshen, “Why Take Tunes? An Exploratory Multinational Look at Student Downloading,” Journal of Internet Commerce 7, no. 2 (2008); Twila Wingrove, Angela L. Korpas and Victoria Weisz, “Why Were Millions of People not Obeying the Law?: Motivational Influences on Non-compliance with the Law in the Case of Music Piracy,” Psychology, Crime and Law, 17, no. 3 (2011): 1. 3 For example see Mark Cenite, Michelle Wanzheng Wang, Chong Peiwen and Germaine Shimin Chan, “More Than Just Free Content: Motivations of Peer-to-Peer File Sharers,” Journal of Communication Inquiry 33 (2009); Ian Condry, “Cultures of Music Piracy: An Ethnographic Comparison of the US and Japan," International Journal of Cultural Studies 7, no. 3 (2004). 6 supposedly antagonistic relationship between filesharers and the cultural industries; within such discourse the positions and priorities of each group are repeatedly constructed as unequivocally distinct and oppositional. This thesis seeks to go beyond such a narrow and polarised discussion by questioning whether this construction is an accurate portrayal of either the filesharers or the professionals. In response to the questions that form the backbone of this thesis, I propose that these seemingly oppositional groups, professional distributors and filesharers, are more similar than we might imagine, and furthermore, are engaged in a symbiotic relationship. The connections between the online and offline distributors can be noted in a number of ways. First, the actions of distributors within formal and informal networks involve complex social and cultural interactions rather than purely economic considerations (as discussed in chapters five and six). Second, an individual’s position in a socially imagined4 ‘knowledge community’5 is more significant than economic interest in motivating the activities of distributors within both formal and informal channels. Whilst the professionals tend to confine their understanding of their ‘community’ to only include others within the film industry (as demonstrated in chapter five), the online distributors broaden their understanding so their community is able to transcend the subscribed
Recommended publications
  • Oddly Placed Cooperative Burdens in the Online World Anjanette H
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Northwestern University Illinois, School of Law: Scholarly Commons Northwestern Journal of Technology and Intellectual Property Volume 11 | Issue 5 Article 4 2013 Intermediaries’ Precarious Balance Within Europe: Oddly Placed Cooperative Burdens in the Online World Anjanette H. Raymond Indiana University, Kelley School of Business Recommended Citation Anjanette H. Raymond, Intermediaries’ Precarious Balance Within Europe: Oddly Placed Cooperative Burdens in the Online World, 11 Nw. J. Tech. & Intell. Prop. 359 (2013). https://scholarlycommons.law.northwestern.edu/njtip/vol11/iss5/4 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN J O U R N A L OF TECHNOLOGY AND INTELLECTUAL PROPERTY Intermediaries’ Precarious Balance Within Europe: Oddly Placed Cooperative Burdens in the Online World Anjanette H. Raymond April 2013 VOL. 11, NO. 5 © 2013 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2013 by Northwestern University School of Law Volume 11, Number 5 (April 2013) Northwestern Journal of Technology and Intellectual Property Intermediaries’ Precarious Balance Within Europe: Oddly Placed Cooperative Burdens in the Online World By Anjanette H. Raymond* The Newzbin cases mark a clear shift in the responsibility that European based internet service providers must take in protecting intellectual property rights. Previously, that burden laid primarily with rights holders. Today, however, legislative bodies and courts in both the European Union and the United States have shifted the expectation of protections to a shared burden amongst internet service providers (ISPs) and rights holders.
    [Show full text]
  • Online Software Piracy of the Last Millennium.Sxw
    Online Software Piracy of the Last Millennium By Ben Garrett aka Ipggi Ever since there has been the ability to store data on a personal computer and commercial software for sale, there has been the existence of pirating. Pirating, cracking and even pirate scenes go all the way back to the late seventies, and maybe even earlier. By the early eighties some machines (such as the BBC Macro in Europe) where so riddled with pirates that the programming companies gave up. They discontinued producing and porting software for the affected computers because there was simply no money to be made. This article has been written with only the PC scene in mind. Table of Contents 1. The IBM PC Scene Beginnings Page 1 2. Bulletin Board Systems And Couriers 2 3. The Death of the Bulletin Board System and the Rise of the Internet 4 4. Software Suppliers 5 5. Text Files 5 6. Scene Art 6 7. The Emergence of Europe 6 8. The Death of the Floppy Disk 6 9. Evolution to the ISO scene 7 10.Bibliography 8 1. The IBM PC Scene Beginnings With the large amount of 8-bit computers around during the early eighties, otherwise known as the Golden Age. And then with the subsequence scenes that followed, most people will agree that the Commodore 64 scene was the greatest at the time. But the Commodore 64 1 wasn't the first computer system to have an organised international pirate scene. It was probably the Apple II users in the very late seventies 2 that can be credited with creating the first remnant of a pirate scene that would be familiar in todays internet warez world.
    [Show full text]
  • United States Court of Appeals for the Ninth Circuit
    Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 1 of 114 Docket No. 10-55946 In the United States Court of Appeals for the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson PETITION FOR PANEL REHEARING AND REHEARING EN BANC BY APPELLANTS GARY FUNG AND ISOHUNT WEB TECHNOLOGIES, INC. IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 2 of 114 TABLE OF CONTENTS page Index of Authorities ..….....….....….....….....….....….....….....….....…....…... ii I. The Panel Decision Applies Erroneous Legal Standards to Find ..…... 1 Fung Liable on Disputed Facts and to Deny Him a Trial by Jury II. The Panel Decision and the District Court Opinion Combine to ……... 5 Punish Speech that Should Be Protected by the First Amendment III. The Panel Decision Expands the Grokster Rule in Multiple Ways ….. 7 that Threaten the Future of Technological Innovation A. The “Technological Background” set forth in the Panel ……….
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • Warez All That Pirated Software Coming From?
    Articles http://www.informit.com/articles/printerfriendly.asp?p=29894 Warez All that Pirated Software Coming From? Date: Nov 1, 2002 By Seth Fogie. Article is provided courtesy of Prentice Hall PTR. In this world of casual piracy, many people have forgotten or just never realized where many software releases originate. Seth Fogie looks at the past, present, and future of the warez industry; and illustrates the simple fact that "free" software is here to stay. NOTE The purpose of this article is to provide an educational overview of warez. The author is not taking a stance on the legality, morality, or any other *.ality on the issues surrounding the subject of warez and pirated software. In addition, no software was pirated, cracked, or otherwise illegally obtained during the writing of this article. Software piracy is one of the hottest subjects in today's computerized culture. With the upheaval of Napster and the subsequent spread of peer-to-peer programs, the casual sharing of software has become a world-wide pastime. All it takes is a few minutes on a DSL connection, and KazaA (or KazaA-Lite for those people who don't want adware) and any 10-year-old kid can have the latest pop song hit in their possession. As if deeply offending the music industry isn't enough, the same avenues taken to obtain cheap music also holds a vast number of software games and applications—some worth over $10,000. While it may be common knowledge that these items are available online, what isn't commonly known is the complexity of the process that many of these "releases" go through before they hit the file-sharing mainstream.
    [Show full text]
  • Download Vaulin KAT Complaint & Affidavit
    AO 91 (Rev. 11/11) Criminal Complaint AlJSAs William E. Ridgway and Devlin K Su Senior Coun 1 R an K. Dicke (CCIPS) UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS FILED EASTERN DIVISION JUL - 8 2016 UNITED STATES OF AMERICA THOMAS G. BRUTON CASE NUMBER: CLERK, U.S. DISTRICT COURT V. UNDER SEAL ARTEM VAULIN, 16CR 43,8 also known as "tirm" MAGISTRATE JUDGE GILBER1 CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. Count One From at least as early as in or about November 2008, to on or about July 8, 2016, in the Northern District of Illinois, Eastern Division, and elsewhere, Artem Vaulin, also known as "tirm," defendant herein, conspired with others to: (1) willfully infringe, for purposes of commercial advantage and private financial gain, at least ten copies and phonorecords of one or more copyrighted works with a total retail value of more than $2,500 during a 180-day period, in violation of Title 17, United States Code, Section 506(a)(l)(A) and Title 18, United States Code, Section 2319(b)(l); and (2) willfully infringe, for purposes of commercial advantage and private financial gain, a copyright by distribution of a work being prepared for commercial distribution, by making it available on a computer network accessible to members of the public, when defendant knew and should have known that that work was intended for commercial distribution, in violation of Title 17, United States Code, Section 506(a)(l)(C) and Title 18, United States Code, Section 2319(d)(2), all in violation of Title 18, United States Code, Section 371.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • United Kingdom
    FREEDOM ON THE NET 2014 United Kingdom 2013 2014 Population: 64.1 million Internet Freedom Status Free Free Internet Penetration 2013: 90 percent Social Media/ICT Apps Blocked: No Obstacles to Access (0-25) 2 2 Political/Social Content Blocked: No Limits on Content (0-35) 6 6 Bloggers/ICT Users Arrested: No Violations of User Rights (0-40) 15 16 TOTAL* (0-100) 23 24 Press Freedom 2014 Status: Free * 0=most free, 100=least free Key Developments: May 2013 – May 2014 • Filtering mechanisms, particularly child-protection filters enabled on all household and mobile connections by default, inadvertently blocked legitimate online content (see Limits on Content). • The Defamation Act, which came into effect on 1 January 2014, introduced greater legal protections for intermediaries and reduced the scope for “libel tourism,” while proposed amendments to the Contempt of Court Act may introduce similar protections for intermediaries in relation to contempt of court (see Limits on Content and Violations of User Rights). • New guidelines published by the Director of Public Prosecutions in June 2013 sought to limit offenses for which social media users may face criminal charges. Users faced civil penalties for libel cases, while at least two individuals were imprisoned for violent threats made on Facebook and Twitter (see Violations of User Rights). • In April 2014, the European Court of Justice determined that EU rules on the mass retention of user data by ISPs violated fundamental privacy and data protection rights. UK privacy groups criticized parliament for rushing through “emergency” legislation to maintain the practice in July, while failing to hold a public debate on the wider issue of surveillance (see Violations of User Rights).
    [Show full text]
  • Copyright and DRM
    CHAPTER 22 Copyright and DRM The DeCSS case is almost certainly a harbinger of what I would consider to be the defining battle of censorship in cyberspace. In my opinion, this will not be fought over pornography, neo-Nazism, bomb design, blasphemy, or political dissent. Instead, the Armageddon of digital control, the real death match between the Party of the Past and Party of the Future, will be fought over copyright. — John Perry Barlow Be very glad that your PC is insecure — it means that after you buy it, you can break into it and install whatever software you want. What YOU want, not what Sony or Warner or AOL wants. — John Gilmore 22.1 Introduction Copyright, and digital rights management (DRM), have been among the most contentious issues of the digital age. At the political level, there is the conflict alluded to by Barlow in the above quotation. The control of information has been near the centre of government concerns since before William Tyndale (one of the founders of the Cambridge University Press) was burned at the stake for printing the Bible in English. The sensitivity continued through the estab- lishment of modern copyright law starting with the Statute of Anne in 1709, through the eighteenth century battles over press censorship, to the Enlight- enment and the framing of the U.S. Constitution. The link between copyright and censorship is obscured by technology from time to time, but has a habit of reappearing. Copyright mechanisms exist to keep information out of the hands of people who haven’t paid for it, while censors keep information out of the hands of people who satisfy some other criterion.
    [Show full text]
  • Digital Piracy on P2P Networks How to Protect Your Copyrighted Content
    Digital Piracy on P2P Networks How to Protect your Copyrighted Content Olesia Klevchuk and Sam Bahun MarkMonitor © 2014 MarkMonitor Inc. All rights reserved. Agenda . P2P landscape: history and recent developments . Detection and verification of unauthorized content on P2P sites . Enforcement strategies . Alternatives to enforcements 2 | Confidential P2P Landscape History and Recent Developments 3 | Confidential History of Digital Piracy Streaming Download to Streaming 1B+ Users . Music piracy enters mainstream with Napster . P2P brought software and video piracy . Shift to consumption of streaming content – TV and sports most impacted P2P Live 300 MM Streaming Users 50 MM Users Napster UseNet 25 MM Users 16 MM Users < 5 MM Today 1995 2000 2005 2010 2015 4 | Confidential First Generation of P2P From Napster to eDonkey2000 . Napster brought P2P to masses . Centralized server model made it possible to shutdown the network 5 | Confidential Second Generation of P2P Kazaa, Gnutella and Torrent Sites . Ability to operate without central server, connecting users remotely to each other . Difficult to shutdown . Attracted millions of users worldwide . Requires some technical ability, plagued with pop-up ads and malware 6 | Confidenti al New P2P piracy . No to little technical ability is required . Attractive, user-friendly interface . BitTorrent powered making enforcements challenging Popcorn Time BitTorrent powered streaming app . Allows you to watch thousands of movies instantaneously . In the U.S., software was downloaded onto millions of devices . Interface resembles that of popular legitimate streaming platforms 8 | Confidential P2P Adoption and Usage BitTorrent is among the most popular platforms online Twitter 307 million users Facebook 1.44 billion users Netflix 69 million subscribers BitTorrent 300 million users 9 | Confidential P2P Piracy Steady trend of a number of P2P infringements .
    [Show full text]
  • GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business a Report on the Profitability of Ad-Supported Content Theft
    GOOD MONEY GONE BAD Digital Thieves and the Hijacking of the Online Ad Business A Report on the Profitability of Ad-Supported Content Theft February 2014 www.digitalcitizensalliance.org/followtheprofit CONTENTS Contents .............................................................................................................................................................i Table of References .....................................................................................................................................ii Figures .........................................................................................................................................................................................ii Tables ...........................................................................................................................................................................................ii About this Report ..........................................................................................................................................1 Executive Summary .................................................................................................................................... 3 Three Key Relevant Growth Trends .................................................................................................... 4 Methodology .................................................................................................................................................. 4 Sites Studied ..........................................................................................................................................................................
    [Show full text]
  • Movie Tags & Meaning of It
    Movie Tags & meaning of it Original Sources CAM - A cam is a theater rip usually done with a digital video camera. A mini tripod is sometimes used, but a lot of the time this wont be possible, so the camera make shake. Also seating placement isn't always idle, and it might be filmed from an angle. If cropped properly, this is hard to tell unless there's text on the screen, but a lot of times these are left with triangular borders on the top and bottom of the screen. Sound is taken from the onboard microphone of the camera, and especially in comedies, laughter can often be heard during the film. Due to these factors picture and sound quality are usually quite poor, but sometimes we're lucky, and the theater will be fairly empty and a fairly clear signal will be heard. TELESYNC (TS) - A telesync is the same spec as a CAM except it uses an external audio source (most likely an audio jack in the chair for hard of hearing people). A direct audio source does not ensure a good quality audio source, as a lot of background noise can interfere. A lot of the times a telesync is filmed in an empty cinema or from the projection booth with a professional camera, giving a better picture quality. Quality ranges drastically, check the sample before downloading the full release. A high percentage of Telesyncs are CAMs that have been mislabeled. TELECINE (TC) - A telecine machine copies the film digitally from the reels. Sound and picture should be very good, but due to the equipment involved and cost telecines are fairly uncommon.
    [Show full text]