Online Content Study: Changes in the Distribution, Discovery and Consumption of Lawful and Unauthorised Online Content MC 359 (Lot 3 Label 9 and Label 13)

Total Page:16

File Type:pdf, Size:1020Kb

Online Content Study: Changes in the Distribution, Discovery and Consumption of Lawful and Unauthorised Online Content MC 359 (Lot 3 Label 9 and Label 13) Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content MC 359 (Lot 3 Label 9 and Label 13) Final report For OFCOM 50090 – November 2015 IDATE Project Manager Vincent BONNEAU +33 (0)4 67 14 44 53 [email protected] " About IDATE and DigiWorld Institute Founded in 1977, IDATE has gained a reputation as a leader in tracking telecom, Internet and media markets, thanks to the skills of its teams of specialised analysts. Now, with the support of more than 40 member companies – which include many of the digital economy’s most influential players – the newly rebranded DigiWorld Institute has entered into a new stage of its development, structured around three main areas of activity: • IDATE Research, an offer of market intelligence publications • IDATE Consulting, time-tested analysis • DigiWorld Institute, a think tank on the digital economy. Copyright IDATE 2015, CS 94167, 34092 Montpellier Cedex 5, France All rights reserved. None of the contents of this publication may be reproduced, stored in a retrieval system or transmitted in any form, including electronically, without the prior written permission of IDATE. IDATE, DigiWorld, DigiWorld Institute and DigiWorld Yearbook are the international registered trademarks of IDATE. Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content Contents 1. Executive summary ......................................................................................................... 7 2. Introduction ................................................................................................................... 13 2.1. Evolution of lawful content offerings ........................................................................................................... 13 2.2. Enforcement options against unauthorised content solutions.................................................................. 15 2.3. Contents of this report ................................................................................................................................... 15 3. Attractiveness of unauthorised content ...................................................................... 16 3.1. Anatomy of online content solutions ........................................................................................................... 16 3.2. Main unauthorised content discovery and indexing techniques ............................................................... 17 3.2.1. Search engines ................................................................................................................................................ 17 3.2.2. Social media ..................................................................................................................................................... 18 3.2.3. External index repositories ............................................................................................................................... 20 3.2.4. Internal indexes ................................................................................................................................................ 21 3.2.5. Other mechanisms for content discovery ......................................................................................................... 23 3.2.6. Synthesis of content discovery techniques ....................................................................................................... 24 3.3. Main unauthorised content consumption techniques ................................................................................ 24 3.3.1. Main delivery modes for illegal consumption .................................................................................................... 24 3.3.2. Emerging solutions ........................................................................................................................................... 26 3.3.3. Social media as a tool for illegal live streaming consumption ........................................................................... 30 3.3.4. Other solutions ................................................................................................................................................. 32 3.3.5. Synthesis of content consumption techniques ................................................................................................. 33 3.4. Lawful content as the source for unauthorised content ............................................................................. 33 3.4.1. Content protection solutions ............................................................................................................................. 33 3.4.2. Techniques used to circumvent content protection .......................................................................................... 36 3.5. Barriers to unauthorised content offerings development .......................................................................... 38 3.5.1. Detection of unauthorised activities and circumvention techniques.................................................................. 38 3.5.2. Blocking of unauthorised activities and circumvention techniques ................................................................... 52 3.5.3. Other risks and issues that could deter users from unauthorised activities ...................................................... 54 4. Attractiveness of lawful content offerings .................................................................. 57 4.1. Business environment ................................................................................................................................... 57 4.1.1. Business models of lawful content offerings ..................................................................................................... 57 4.1.2. Rights ownership: impacts on availability of content in legal offerings ............................................................. 59 4.1.3. Availability of legal offerings ............................................................................................................................. 61 4.2. The transition to cloud ................................................................................................................................... 62 4.2.1. Generic personal cloud .................................................................................................................................... 63 4.2.2. Media personal cloud ....................................................................................................................................... 63 4.2.3. Digital Rights Lockers ....................................................................................................................................... 63 4.3. Technical limits (restrictions) which discourage lawful consumption ...................................................... 65 4.4. Synthesis ........................................................................................................................................................ 68 www.idate.org © IDATE 2015 3 Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content 5. Evolution of content consumption............................................................................... 69 5.1. Current consumption of lawful and unauthorised content......................................................................... 69 5.2. Likely scenario of evolution .......................................................................................................................... 74 5.3. Prospective consumption of lawful and unauthorised content ................................................................. 77 5.4. Breakdown of illegally consumed files per unauthorised channel ............................................................ 79 6. Glossary ......................................................................................................................... 81 www.idate.org © IDATE 2015 4 Online Content Study: Changes in the distribution, discovery and consumption of lawful and unauthorised online content Tables & Figures Table 1: Comparison of delivery techniques .......................................................................................................... 26 Table 2: Main innovative social applications offering video streaming service ...................................................... 30 Table 3: Example of DRM removal software programs ......................................................................................... 36 Table 4: Wrap-up on detection methods ................................................................................................................ 41 Table 5: Example of anonymous or encrypted solutions no longer maintained ..................................................... 50 Table 6: Main blocking techniques ......................................................................................................................... 52 Table 7: Main circumvention techniques ................................................................................................................ 52 Table 8: Categories of content and scope of products and services covered ........................................................ 57 Table 9: Competitiveness synthesis: ....................................................................................................................
Recommended publications
  • Testimony of Authors Guild President Scott Turow Before the Senate
    My name is Scott Turow. I’m the president of the Authors Guild, the largest society of published authors in the U.S., representing more than 8,500 book authors and freelance writers. Our members represent the broad sweep of American authorship, including literary and genre fiction, nonfiction, trade, academic, and children’s book authors, textbook authors, freelance journalists and poets.1 Guild members have won countless honors and all major literary awards, including the Nobel Prize for Literature.2 The Authors Guild promotes the professional interests of authors: we’re advocates for effective copyright protection, fair contracts, and free expression. It’s a pleasure and an honor to be here this morning. I’d like especially to thank this committee for recognizing the severity of the problem we all face and getting the ball rolling with COICA in the fall, which recognized this central and unavoidable truth: any serious attempt to address online piracy must address the third-party enablers of infringement. Anything that doesn’t address those enablers is, frankly, a pretend solution to a real problem. Our Copyright Policy Inadvertently Encourages Investments in Technologies and Services That Promote Trafficking in Stolen Books, Music, and Movies After 300 years as one of history's greatest public policy successes, copyright is coming undone. As we meet here this morning, our well-intended policy toward copyright online is 1 The Guild had its beginnings as the Authors League of America, which was founded in 1912 by a group of book authors (including Theodore Roosevelt, who served as the League’s founding vice president), short story writers, freelance journalists and a smattering of dramatists.
    [Show full text]
  • Cisco SCA BB Protocol Reference Guide
    Cisco Service Control Application for Broadband Protocol Reference Guide Protocol Pack #60 August 02, 2018 Cisco Systems, Inc. www.cisco.com Cisco has more than 200 offices worldwide. Addresses, phone numbers, and fax numbers are listed on the Cisco website at www.cisco.com/go/offices. THE SPECIFICATIONS AND INFORMATION REGARDING THE PRODUCTS IN THIS MANUAL ARE SUBJECT TO CHANGE WITHOUT NOTICE. ALL STATEMENTS, INFORMATION, AND RECOMMENDATIONS IN THIS MANUAL ARE BELIEVED TO BE ACCURATE BUT ARE PRESENTED WITHOUT WARRANTY OF ANY KIND, EXPRESS OR IMPLIED. USERS MUST TAKE FULL RESPONSIBILITY FOR THEIR APPLICATION OF ANY PRODUCTS. THE SOFTWARE LICENSE AND LIMITED WARRANTY FOR THE ACCOMPANYING PRODUCT ARE SET FORTH IN THE INFORMATION PACKET THAT SHIPPED WITH THE PRODUCT AND ARE INCORPORATED HEREIN BY THIS REFERENCE. IF YOU ARE UNABLE TO LOCATE THE SOFTWARE LICENSE OR LIMITED WARRANTY, CONTACT YOUR CISCO REPRESENTATIVE FOR A COPY. The Cisco implementation of TCP header compression is an adaptation of a program developed by the University of California, Berkeley (UCB) as part of UCB’s public domain version of the UNIX operating system. All rights reserved. Copyright © 1981, Regents of the University of California. NOTWITHSTANDING ANY OTHER WARRANTY HEREIN, ALL DOCUMENT FILES AND SOFTWARE OF THESE SUPPLIERS ARE PROVIDED “AS IS” WITH ALL FAULTS. CISCO AND THE ABOVE-NAMED SUPPLIERS DISCLAIM ALL WARRANTIES, EXPRESSED OR IMPLIED, INCLUDING, WITHOUT LIMITATION, THOSE OF MERCHANTABILITY, FITNESS FOR A PARTICULAR PURPOSE AND NONINFRINGEMENT OR ARISING FROM A COURSE OF DEALING, USAGE, OR TRADE PRACTICE. IN NO EVENT SHALL CISCO OR ITS SUPPLIERS BE LIABLE FOR ANY INDIRECT, SPECIAL, CONSEQUENTIAL, OR INCIDENTAL DAMAGES, INCLUDING, WITHOUT LIMITATION, LOST PROFITS OR LOSS OR DAMAGE TO DATA ARISING OUT OF THE USE OR INABILITY TO USE THIS MANUAL, EVEN IF CISCO OR ITS SUPPLIERS HAVE BEEN ADVISED OF THE POSSIBILITY OF SUCH DAMAGES.
    [Show full text]
  • Vysoké Učení Technické V Brně Detekcia Seedboxov V Sieti Bittorrent
    VYSOKÉ UČENÍ TECHNICKÉ V BRNĚ BRNO UNIVERSITY OF TECHNOLOGY FAKULTA INFORMAČNÍCH TECHNOLOGIÍ FACULTY OF INFORMATION TECHNOLOGY ÚSTAV INFORMAČNÍCH SYSTÉMŮ DEPARTMENT OF INFORMATION SYSTEMS DETEKCIA SEEDBOXOV V SIETI BITTORRENT DETECTION OF SEEDBOXES INBITTORRENT NETWORK BAKALÁŘSKÁ PRÁCE BACHELOR’S THESIS AUTOR PRÁCE MARTIN GRNÁČ AUTHOR VEDOUCÍ PRÁCE Ing. LIBOR POLČÁK, Ph.D. SUPERVISOR BRNO 2018 Abstrakt Bakalárska práca sa venuje problematike sledovania a detekcie seedboxov v sieti BitTorrent za pomoci technológie netflow. V teoretickej časti je predstavená a popísaná architektúra P2P, základy a kľúčové pojmy architektúry BitTorrent a teoretická definícia seedboxu. Taktiež sú tu rozobrané metódy pomocou ktorých sa dá detekovať sieťová komunikácia a ďalej je uvedená analýza seedboxov v sieti a hľadanie ich charakteristík. Na základe týchto znalostí a sledovaní je navrhnutá sada nástrojov, ktoré napomáhajú ich detekcií. V praktickej časti je predstavená implementácia týchto nástrojov a výsledky ich testovania. Abstract Bachelor’s thesis is focused on issues with monitoring and detection of seedboxes in Bit- Torrent network with help of netflow technology. In the theoretical part of this thesis is introduced and described P2P architecture, basics and key terms of BitTorrent architec- ture and theoretical definition of seedbox. There are also described specific methods which can be used for detection of network communication and next there is described process of seedbox analysis in network and process of finding its characteristics. On base of this kno- wledge and observations is designed a set of tools,which help with detection of seedboxes. In the practical part of this work is presented implementation of these tools and results of testing these tools. Kľúčové slová BitTorrent, seedbox, detekcia, netflow, analýza, sieťová prevádzka, P2P, netflow Keywords BitTorrent, seedbox, detection, netflow, analysis, network traffic, P2P, netflow Citácia GRNÁČ, Martin.
    [Show full text]
  • Causes, Effects and Solutions of Piracy in the Computer Software Market
    Review of Economic Research on Copyright Issues, 2006, vol. 4(1), pp. 63-86 CAUSES,EFFECTSANDSOLUTIONSOFPIRACYINTHE COMPUTER SOFTWARE MARKET AMY MARSHALL Abstract. Much literature has been devoted to exploring the protection of computer programs. The decreasing effectiveness of copyright and patents has been extensively examined and alternative forms of protection, both phys- ical and market-based, have been laid out. A large proportion of writings is dedicated to describing the significant network externalities that exist in thesoftwaremarket,andtheeffect that these have on the optimal level of protection. A large number of surveys have been undertaken to analyse the characteristics of software pirates and their incentives to pirate. This paper attempts to provide an overview of this literature. 1. Introduction The widespread incidence of unauthorised use and copying of computer software has had a devastating impact on the software industry in recent years. Significantly costly time and effort is invested by software programmers in developing a program and with software piracy preventing these developers from recouping remuneration from users, the incentives existing to produce new software may not be sufficient enough for any further development, causing the industry to stagnate. This would be costly to not only computer programmers but also to the government who would miss out on a significant amount of taxation revenue and society as a whole, whose software choices would be diminished. The traditional protector of intellectual property is copyright, defining the rights of ownership of creators and allowing for the enforcement of these rights. The basis behind copyright law is to provide the means for a creator to receive sufficient remuneration for development to occur.
    [Show full text]
  • Science, Mathematics & Computing Division
    SCIENCE, MATHEMATICS & COMPUTING DIVISION senior projects spring 2021 Ultrasonic Pollution: A New Kind of Noise Pollution Cillian Ahearn Advisor: Bruce Robertson All organisms use verbal communication to gain information about their surroundings, in order to hunt, feed their chicks, and call or warn one another. This communication is increasingly masked by anthropogenic noise pollution, but that might not be the only type of noise pollution to exist. Recently, there has been a rise into the research of organisms that use ultrasound, but virtually none into anthropogenic ultrasound and whether or not it has the possibility to mask ultrasonic vocalizations. As such, my study hopes to fill in this gap of knowledge by doing an exploratory study in a city, Hartford, CT, where I identified sources of man-made ultrasound, as well as their frequency ranges. These ranges were then compared against ultrasonic vocalizations of mice, Richardson’s ground squirrels, and tomato plants. My study found that the more narrow a biological frequency range is, the more at risk it is to be fully masked. This implicates ultrasound as a potential new source of noise pollution that should be mitigated as part of conservation efforts to preserve the environment. Road to a Resilient Financial Sector: Impacts of the Dodd-Frank Act on Systemic Risk Muhammad Ali Advisors: Steven Simon & Guatam Sethi The U.S. financial sector has been plagued by crises in the last few decades. The Dodd-Frank Act was the most substantial set of reforms in recent history aimed at making the financial sector more resilient and stable than before.
    [Show full text]
  • Antifragile White Paper Draft 3.Pages
    Piracy as an Antifragile System tech WP 01/2015 July 2015 Executive Summary Attacks on the piracy economy have thus far been unsuccessful. The piracy community has not only shown resilience to these attacks, but has also become more sophisticated and resilient as a result of them. Systems that show this characteristic response to ex- ternal stressors are defined as antifragile. Traditional centralized attacks are not only ineffective against such systems, but are counter-productive. These systems are not impervious to attacks, however. Decentralized attacks that warp the connections between nodes destroy the system from within. Some system-based attacks on piracy have been attempted, but lacked the technology required to be effec- tive. A new technology, CustosTech, built on the Bitcoin blockchain, attacks the system by turning pirates against each other. The technology enables and incentivizes anyone in the world to anonymously act as an informant, disclosing the identity of the first in- fringer – the pirate uploader. This internal decentralized attack breaks the incentive structures governing the uploader-downloader relationship, and thus provides a sus- tainable deterrent to piracy. Table of Contents Introduction to Antifragility 1 Features of Antifragile Systems 1 Piracy as an Antifragile System 2 Sophisticated Pirates 3 Popcorn Time 5 Attacking 5 Antifragile Systems 5 Attacking Piracy 5 Current Approaches 6 New Tools 6 How it Works 7 Conclusion 7 White paper 01/2015 Introduction to Antifragility Antifragility refers to a system that becomes bet- ter, or stronger, in response to shocks or attacks. Nassim Taleb developed the term1 to explain sys- tems that were not only resilient, but also thrived under stress.
    [Show full text]
  • Downloading Copyrighted Materials
    What you need to know before... Downloading Copyrighted Materials Including movies, TV shows, music, digital books, software and interactive games The Facts and Consequences Who monitors peer-to-peer file sharing? What are the consequences at UAF The Motion Picture Association of America for violators of this policy? (MPAA), Home Box Office, and other copyright Student Services at UAF takes the following holders monitor file-sharing on the Internet minimum actions when the policy is violated: for the illegal distribution of their copyrighted 1st Offense: contents. Once identified they issue DMCA Loss of Internet access until issue is resolved. (Digital Millennium Copyright Act) take-down 2nd Offense: notices to the ISP (Internet Service Provider), in Loss of Internet access pending which the University of Alaska is considered as resolution and a $100 fee assessment. one, requesting the infringement be stopped. If 3rd Offense: not stopped, lawsuit against the user is possible. Loss of Internet access pending resolution and a $250 fee assessment. What is UAF’s responsibility? 4th, 5th, 6th Offense: Under the Digital Millennium Copyright Act and Loss of Internet access pending resolution and Higher Education Opportunity Act, university a $500 fee assessment. administrators are obligated to track these infractions and preserve relevent logs in your What are the Federal consequences student record. This means that if your case goes for violators? to court, your record may be subpoenaed as The MPAA, HBO and similar organizations are evidence. Since illegal file sharing also drains becoming more and more aggressive in finding bandwidth, costing schools money and slowing and prosecuting alleged offenders in criminal Internet connections, for students trying to use court.
    [Show full text]
  • Fator Wins Hearts and Laughs with His Signature Las Vegas Show Arriving on DVD, Digital HD and Video on Demand February 18 from Lionsgate Home Entertainment
    ”His celebrity impressions will blow you away!” - Oprah Winfrey A One-Of-A-Kind Experience Fator Wins Hearts And Laughs With His Signature Las Vegas Show Arriving On DVD, Digital HD and Video on Demand February 18 From Lionsgate Home Entertainment LAS VEGAS – January 13, 2014 – Laugh harder than you have all year when Terry Fator: Live In Concert arrives on DVD (plus Digital UltraViolet) exclusively at Walmart and Redbox on Feb. 18, 2014 from Lionsgate Home Entertainment. The film will be available on Digital HD and Video on Demand everywhere the same day. The follow-up to Fator's multi-platinum DVD debut, Terry Fator: Live From Las Vegas, Terry Fator: Live In Concert captures the “America’s Got Talent” winner bringing a full cast of characters to life. Called “one of the best entertainers in the world,” by Simon Cowell, the multi-talented singer, comedian and impressionist’s performance spans genres and generations. Terry Fator: Live In Concert sees Fator tackling Broadway, Bieber and The Four Seasons - and that's with just one of his puppets. Familiar characters Emma Taylor, the little girl with the big voice, and Winston, the impersonating turtle, are joined by new faces Monty Carlo, the lounge singer, and Berry Fabulous, the hip-hop diva, in the totally rewritten and revamped Vegas show featuring comedic banter and amazing vocal impressions of musical superstars such as Garth Brooks, Dean Martin, Aretha Franklin, Lady Gaga and more. According to Fator, “This DVD is my heart and soul. I wrote the show and am so excited for everyone to see the best of what I do.
    [Show full text]
  • Online Piracy and Consumer Affect to Pay Or Not to Pay
    Online Piracy and Consumer Affect To pay or not to pay Master Thesis Psychology: Consumer Behavior Matthias W. Kampmann Online Piracy and Consumer Affect 1 Running head: ONLINE PIRACY AND CONSUMER AFFECT Online Piracy and Consumer Affect: To pay or not to pay Matthias W. Kampmann University of Twente Master Thesis Psychology: Consumer Behavior Instructors: Dr. M. Galetzka & Dr. P.W. de Vries June 2010 Online Piracy and Consumer Affect 2 Abstract Online music piracy is a growing problem for the economy. Yet research on the underlying processes that govern online music piracy behavior is limited. This study addresses this shortcoming by combining insights from research on appraisal theory and consumer reactance into a conceptual framework. The results of an online survey study with N = 160 participants indicate that a price increase that leads to more profits for the music industry instead of more profits for young artists is seen as less fair and music files are perceived to have less value. Price affect could however not be confirmed as a significant predictor of consumer behavior. Ethical beliefs did not moderate the appraisal process but they have a strong negative influence on online piracy behavior. An adjusted model explains 35% of variance in the online piracy intention measure. Theoretical and managerial implications and possibilities for future research are discussed. Online Piracy and Consumer Affect 3 Online Piracy and Consumer Affect: To pay or not to pay Digital piracy has been a byproduct of the digitalized world since the early days of personal computers (Gopal, Sanders, Bhattacharjee, Agrawal, & Wagner, 2004). With the rise of the internet digital piracy has shifted from illegal copies of physical goods like floppy disks, CDs or DVDs towards the theft of intangible goods like music files, video files and computer software (Wall, 2005).
    [Show full text]
  • Update 5/24/12
    1 Update 5/24/12 © 2012 DECE, LLC – DECE CONFIDENTIAL 2 3. In-Market Status: Adoption As of May 7 • Rights: 3.03M • Averaging 81K new accounts per week since launch • Users: 2.46M • Past 4 weeks averaging 185K new accounts/week (past 7 days: 114K) • Accts: 2.42M • Users per acct = 1.015; Rights per acct = 1.28 (slowly inching up) 3500000 3000000 Rights Users 2500000 Accou nts 2000000 1500000 Ratio of incremental rights / incremental 1000000 accounts • Since launch – 500000 1.28 • Past month – 1.36 0 • Past week – 1.52 40849 40891 40942 40954 40962 40970 40980 40989 40997 41005 41015 41023 41031 40828 40869 40913 40949 40959 40967 40975 40983 40994 41002 41010 41018 41026 41034 © 2012 DECE, LLC – DECE CONFIDENTIAL 3 3. In-Market Status: Capabilities illustration Where can I use an UltraViolet title I own, vs. an iTunes one? (U.S.) iTunes/iCloud UltraViolet via the iTunes app PCs and Macs via multiple companies’ websites and apps only <4M installed base >50M installed base* Apple TV PS3 Philips Sony Xbox 360 RCA Sylvania Living Room Devices (game consoles, Blu- LG Samsung Toshiba ray Players, Internet TVs, other) Magnavox Sanyo Vizio Panasonic Sharp Only Apple products Apple products**… …AND tens of millions of other devices** iPhone iPhone Android phones from: Tablets from: * Via Vudu apps, as well as Flixster now shipping on some devices (Samsung, Sony) and available to Google TV devices via Android Market ** UltraViolet on mobile devices via Retailers’iPad apps (e.g. Flixster) and/oriPad mobile-optimized HTML5HTC sites (e.g. Vudu.com
    [Show full text]
  • Defense Against the Dark Arts of Copyright Trolling Matthew As G
    Loyola University Chicago, School of Law LAW eCommons Faculty Publications & Other Works 2018 Defense Against the Dark Arts of Copyright Trolling Matthew aS g Jake Haskell Follow this and additional works at: https://lawecommons.luc.edu/facpubs Part of the Civil Procedure Commons, and the Intellectual Property Law Commons Defense Against the Dark Arts of Copyright Trolling Matthew Sag &Jake Haskell * ABSTRACT: In this Article, we offer both a legal and a pragmaticframework for defending against copyright trolls. Lawsuits alleging online copyright infringement by John Doe defendants have accounted for roughly half of all copyright casesfiled in the United States over the past threeyears. In the typical case, the plaintiffs claims of infringement rely on a poorly substantiatedform pleading and are targeted indiscriminately at noninfringers as well as infringers. This practice is a subset of the broaderproblem of opportunistic litigation, but it persists due to certain unique features of copyright law and the technical complexity of Internet technology. The plaintiffs bringing these cases target hundreds or thousands of defendants nationwide and seek quick settlements pricedjust low enough that it is less expensive for the defendant to pay rather than to defend the claim, regardless of the claim's merits. We report new empirical data on the continued growth of this form of copyright trolling in the United States. We also undertake a detailed analysis of the legal andfactual underpinnings of these cases. Despite theirunderlying weakness, plaintiffs have exploited information asymmetries, the high cost of federal court litigation, and the extravagant threat of statutory damages for copyright infringement to leverage settlementsfrom the guilty and the innocent alike.
    [Show full text]
  • Piracy Landscape Study
    Piracy Landscape Study: Analysis of Existing and Emerging Research Relevant to Intellectual Property Rights (IPR) Enforcement of Commercial-Scale Piracy Prepared for the U.S. Patent and Trademark Office Solicitation Number: 1333BJ19Q00142004 Brett Danaher Michael D. Smith Rahul Telang Chapman University Carnegie Mellon University Carnegie Mellon University This Version: March 20, 2020 Table of Contents Executive Summary ...................................................................................................................... 3 1. The Piracy Ecosystem........................................................................................................... 4 1.1 Piracy of Physical Goods................................................................................................ 6 1.1.1 Manufacturing......................................................................................................... 7 1.1.2 Discovery ................................................................................................................ 7 1.1.3 Distribution ............................................................................................................. 8 1.1.4 Communication, Payment Processing and Fulfillment ......................................... 11 1.2 Piracy of Digital Goods ................................................................................................ 11 1.2.1 Sources.................................................................................................................. 12 1.2.2
    [Show full text]