Home » Security » Recent Articles:

Six Strikes Copyright Enforcement Getting Ready to Launch: Torrents Are Primary Target

AT&T will begin sending out anti-piracy warning notices to subscribers caught downloading copyrighted content from torrent sites starting Nov. 28.

The new anti-piracy measures are part of a joint agreement between the Motion Picture Association of America (MPAA), the Recording Industry Association of America (RIAA), and five major national ISPs to help curtail content theft.

TorrentFreak obtained internal AT&T training documents that outline how AT&T will deal with customers suspected of illicit downloading. After a series of warnings, AT&T intends to block access to websites suspected of copyright infringement until a customer successfully completes a course on online copyright law. Eventually, those caught repeatedly downloading pirated movies and music could face legal action after AT&T turns over the identities of suspect customers. Gone from early draft proposals are suggestions that ISPs will throttle or suspend service altogether for repeat violators.

Late reports indicate that other ISPs participating in the copyright enforcement action — Cablevision, Comcast, Time Warner Cable and Verizon — will also launch their own programs on the same date.

Most at risk are customers who frequent peer-to-peer file sharing sites. Tracking BitTorrent traffic is a priority for the newly-launched Center for Copyright Information (CCI) — a joint venture run by the ISPs in coordination with the MPAA and RIAA.

While not all peer-to-peer file traffic consists of illicit swapping of copyrighted works, some high profile torrent sites are among the first choices for consumers looking for free movies or music. CCI believes its Copyright Alert System (CAS) is primarily an educational tool for consumers who may not realize they are stealing copyrighted content. With its “six warnings” policy, CCI wants consumers to take action to protect themselves, their Internet accounts, and home networks well before any legal action is taken.

The latest implementation of the Copyright Alert System has watered down some of its earlier provisions, which could have put a customer’s Internet account at risk of being speed throttled or canceled. For now, consumers will receive six warnings about any suspected copyright infringement:

  • The first three strikes carry no consequences and are intended to serve as informational warnings that the downloading of copyrighted content may be taking place;
  • The fourth and fifth strikes will trigger forced browser redirects to a copyright education page and an online course on copyright law that must be successfully completed before the customer can once again visit suspect websites;
  • Strike six means AT&T (and presumably other ISPs) will turn over the IP addresses of repeat offenders and comply with any subsequent court orders requesting the identity of the customer for possible legal action. AT&T does not say it will terminate the customer’s account, but does remind customers to be mindful of its Acceptable Use Policy, which does allow them to terminate service for illegal acts.

Edward Stroz

Consumers caught allegedly downloading copyrighted content can protest their innocence, but a $35 refundable filing fee is required to begin the arbitration process. If a consumer proves the files downloaded were not illegally obtained or that their account was flagged in error, they can have the warning canceled and get their filing fee refunded. But there are no penalties for CCI, its copyright tracking arm run by MarkMonitor, or the ISP if the copyright tracking system gets it wrong.

Critics of the copyright enforcement scheme claim it delivers too many benefits for CCI and its industry backers and insufficient protection for consumers misidentified during copyright infringement dragnets.

For-profit copyright tracking companies have made false allegations in the past, forcing CCI to hire an “independent and impartial technical expert” to verify the accuracy and security of the tracking technology used. CCI hired the firm of Stroz Friedberg as their expert.

Critics charge Stroz Friedberg is actually a recording industry lobbying firm, who worked with the RIAA for five years, earning $637,000.

Eric Friedberg

“It’s a disappointing choice, particularly in light of CCI’s professed desire to build public confidence in CAS and the fairness of its processes,” University of Idaho Law Professor Annemarie Bridy told TorrentFreak. “It would have been refreshing to see an academic computer scientist or some other truly independent party appointed to fill that important role.”

Bridy calls CCI’s Copyright Alert System lacking in transparency and stacked in favor of copyright holders, not consumers.

Stroz Friedberg’s appointment has also raised eyebrows among others that suggest their past lobbying violates the spirit of a Memorandum of Understanding signed by all parties requiring “independent and impartial” oversight.

“CCI’s choice of a former RIAA lobbying firm makes it clear that the copyright owner parties to the Memorandum of Understanding were more interested in appointing someone they trust than in appointing someone the public can trust,” Bridy adds.

Network World columnist Steven Vaughan-Nichols worries this is just the beginning of another copyright enforcement overreach:

The name of their game is to monitor your network traffic, with the help of your friendly ISP. Their justification for this is the usual made-up “facts” that content theft leads to “more than 373,000 jobs, $16 billion in lost wages, and $2.6 billion in lost taxes.” Yeah, I’m also sure someone downloading copyrighted porn leads to cats and dogs living together.

One reason I can’t buy into all this is that, as TorrentFreak points out, the Center’s expert who vouches that this all works is none other than Stroz Friedberg, a former RIAA lobbyist. Oh yeah, he doesn’t have bias for paranoid copyright protection companies.

What this means for you is that if your ISP is AT&T, Cablevision, Comcast, Time Warner, or Verizon, they’ll be watching your use of BitTorrent and letting CCI decide if you deserve some warnings, an end to your Internet service, or a full-out lawsuit.

[…] The RIAA, the MPAA, and other copyright “protectors” have never done anything for content creators. They’re all about protecting the businesses stuck with old, broken, pre-digital business models. Even that wouldn’t be so bad, except historically they’ve always vastly over-reacted.

We all know the stories of some poor slob who’s been slammed with tens of thousands of damages for downloading a song. What you may not know is that all the powers that be have to do is to claim something is copyrighted, whether it is or not, and multiple websites can be closed in minutes or your entire digital library can be destroyed.

Does that sound like paranoid fantasy? I wish.

[…] Oh yeah, I feel really sure that the CCI and friends are going to do a good job. Welcome to the new copyright world, same as the old, where you’re always considered guilty rather than that quaint idea of being considered innocent before proven otherwise.

CCI admits sophisticated pirates will probably never get caught by its Copyright Alert System, because most of them are moving to secured Virtual Private Network (VPN) technology that effectively masks their identities. TorrentFreak notes sales for VPN’s are skyrocketing, many headquartered far away from the reach of the United States in exotic, subpoena-proof locations like Cyprus, the Seychelles, Romania, and Ukraine.

[flv width=”640″ height=”500″]http://www.phillipdampier.com/video/RT Thom Hartmann Copyright Alert System 3-20-12.flv[/flv]

RT’s Thom Hartmann presided over a debate about online copyright theft control measures proposed earlier this year by the entertainment industry and Internet Service Providers. Appearing with Hartmann are David Seltzer, Attorney & Mark Bledsoe. (March 20, 2012) (12 minutes)

Nasty iPhone 5 Wi-Fi Bug Eats Your Wireless Data Allowance and Brings Overage Fees

Apple’s iPhone 5 Wi-Fi bug is showing up on several wireless networks.

Wireless companies with usage caps are in the money — your money — if you happen to own Apple’s iPhone 5. A serious bug afflicting the phone’s ability to connect and hold a Wi-Fi connection when using certain wireless security protocols is chewing up customers’ data allowances and exposing them to overlimit fees, even when they think the phone is connected to a free use Wi-Fi network.

So far, Verizon Wireless has confirmed the problem is impacting their customers, but our readers report problems with AT&T and Sprint iPhones as well.

“Under certain circumstances, iPhone 5 may use Verizon cellular data while the phone is connected to a Wi-Fi network,” said Torod Neptune, a spokesman for Verizon. “Apple has a fix that is being delivered to Verizon customers right on their iPhone 5. Verizon Wireless customers will not be charged for any unwarranted cellular data usage.”

Stop the Cap! reader John Pozniewicz thinks that is nice of Verizon, and wonders when AT&T will start dealing with the nearly $100 in overage fees he has already run up on similarly afflicted iPhone 5 smartphones he bought just last week.

“As best as I can tell, the problem seems to relate to the type of Wi-Fi security protocol your router has enabled,” Pozniewicz reports. “Many in the Apple community forums and I both agree the most likely culprit is AES encryption.”

Sprint customer Halle Thompson also wrote Stop the Cap! yesterday reporting her Sprint iPhone 5 was unable to hold its Wi-Fi connection either, forcing her to deal with Sprint’s slow 3G network, even when at home.

“Thank goodness Sprint doesn’t have a usage limit and overage fees or they would own my house by now, because I use my phone for everything,” Thompson says.

Thompson switched off her router’s wireless security and the problem disappeared, but now her Internet connection is open to everyone in her apartment complex. Pozniewicz spent the weekend experimenting with wireless security protocols and quickly found AES caused his Wi-Fi connection to become unstable.

If your readers are having the same problems I am, here is a workaround that will keep your router reasonably secure and accessible until the pointy heads at Apple figure out this disaster:

Recommended Security Settings:

  • WPA only (least secure)
  • WPA2 only
  • WPA or WPA2 with TKIP
Not recommended:
  • AUTO – AES
  • WPA or WPA2 with AES enabled
  • WPA or WPA2 with both TKIP and AES enabled

Verizon Wireless has told customers it will credit back any overage fees incurred as a result of the bug, but only if they ask. Customers should also demand Verizon reset their allowance or at least note their account regarding the problem. Customers should request credit for overlimit fees for both September and October, because early reports indicate the software update designed to fix this problem has not worked in all cases.

Pozniewicz is having much less success with AT&T which so far has refused all comment on the debacle and has been unwilling to issue any service credits for overages. Pozniewicz is upset, noting he has only had his iPhone 5 for a week and it has already cost him and his company an extra $100.

“I am extremely careful about only using Wi-Fi for anything that will consume a lot of data, but my only clue there was a problem was when I noticed how slowly my so-called ‘Wi-Fi’ connection was performing at home and work and that is when I discovered it was not actually using Wi-Fi at all,” Pozniewicz says. “What is insidious about this is that the Wi-Fi connection is still showing on the phone display, even when I am actually using AT&T’s network.”

Thompson reports her phone does seem to initially connect to Wi-Fi, but then loses the connection seconds or minutes later, eventually switching to Sprint’s 3G or 4G cellular networks. Sprint’s unlimited data plan makes the issue just an inconvenience. For Pozniewicz’s company, which has a contract for a dozen iPhones 5’s with AT&T, the overlimit fees are really adding up. His employees are also quickly burning through their own monthly data allowances.

“AT&T is a pack of vampires and they don’t care about anything other than my money, even after talking to two supervisors, one of which implied I was either lying about the problem or an idiot,” he said.

Here is how iPhone 5 customers can check their data usage: Select Settings, then General, then Usage, then Cellular Usage to see what your phone reports you have used thus far. If the numbers seem wildly out of whack, contact your wireless carrier and let them know you may be afflicted with the iPhone 5 bug and have them note your account for future credit for any subsequent overlimit fees.

Verizon customers should have already received a software update in an effort to correct the problem. You can verify this by following these steps:

  1. Select Settings, then General, then About.
  2. Wait for the message “Carrier Settings Updated,” then touch OK.
  3. Allow the update (if any) to install.
  4. If your phone does not automatically restart after the update is complete, turn the phone off and then on again to complete the update.

[flv width=”640″ height=”380″]http://www.phillipdampier.com/video/iPhone 5 Wifi connection issue.flv[/flv]

iPhone 5’s Wi-Fi problems documented by YouTube user “,” who found changing the security protocol on his router seemed to resolve the problem.  (2 minutes)

More Than a Dime’s Worth of Difference Between GOP/Dems on Telecom Policy

On important issues for the online community, there are some substantial differences between the Democratic and Republican parties, particularly regarding Net Neutrality.

A review of the yas and nays in both party platforms (and past history in Congress) shows your vote can make a difference when Washington ultimately deals with privacy, network traffic, piracy, cybersecurity, and broadband expansion.

Net Neutrality – “Preserving the free and open Internet”: Prohibits providers from discriminating against different types of network traffic for profit or control

  • Democrats: Yas
  • Republicans: Nay

While the Democratic platform specifically states, “President Obama is strongly committed to protecting an open Internet,” one “that fosters investment, innovation, creativity, consumer choice, and free speech,” Republicans have treated Net Neutrality as anathema to the free market. Although virtually every Republican member of Congress has voted against Net Neutrality or publicly opposed the concept, some Democrats have as well, particularly those who have received significant financial contributions from the largest phone and cable companies lobbying against the policy.

Net Neutrality has not proved to be a major issue in Congress this year, with most of the recent battles taking place at the Federal Communications Commission. FCC chairman Julius Genachowski applauded a ‘third way’ for Net Neutrality, staking out a middle-of-the-road policy that pleased few outside of the FCC. It largely leaves the concept a “suggestion” for wireless carriers. Replete with loopholes and enforcement issues, even wired providers like Comcast have run around the policy for their own benefit.

Network Privacy – Full disclosure when websites track your browsing habits, and how online companies protect your private information

  • Democrats: Yas, provisionally
  • Republicans: Yas, provisionally

Net privacy is a topic many consumers hear about the most when a website gets hacked and private customer information is stolen in the process. But a growing number of consumers are also concerned about what websites are doing with their information and how their web visits are being tracked for advertising purposes. Large online companies like Facebook and Google have a vested interest in keeping this space as unregulated as possible to maintain lucrative revenue earned selling demographic information to advertisers. But consumers may not want advertisers to know the websites they visit, and members of both political parties have expressed growing interest in taming who gets their hands on your private stuff. Republicans are primarily concerned about tracking by government agencies, Democrats are more concerned with for-profit use of customer data.

The Republican platform abhors government intrusion into private liberty — primarily a reference to certain forms of surveillance. But the GOP platform is silent on enhancing privacy rights of consumers. The Obama Administration has been calling for a “Privacy Bill of Rights” that permits consumers to opt out of web tracking cookies and other tracking technology. Democrats separately want companies to do a better job disclosing and explaining how private information is being used. But Congress, under heavy lobbying to avoid the issue, never acted on the administration’s request.

Expanding Broadband: Finding New Wireless Spectrum and Improved Rural Access

  • Democrats: Yas on both
  • Republicans: Yas on one, vacillating  on the other

While neither party fully embraces their respective platforms while governing, their stated positions often reflect political positioning when new laws are contemplated.

The Democrats tout both their National Broadband Plan and the Obama Administration’s commitment to find Internet access for 98 percent of the country and expand spectrum available to meet the growing demands for wireless data. The Democratic platform touted President Obama’s proposal to promote wireless broadband as a possible rural Internet solution.

Republicans also want more wireless spectrum to be auctioned off as soon as possible. They also believe the solution to rural broadband is additional deregulation to stimulate private investment and a private marketplace solution. But they are short on specifics about how that can happen in areas deemed too unprofitable to serve.

Democrats are generally more tolerant of public and private broadband expansion projects and stimulus funding for expanded Internet access. The Obama Administration has overhauled the Universal Service Fund to help underwrite rural broadband expansion, a notion Republicans often oppose as unnecessary taxpayer or ratepayer-financed subsidization.

Online Piracy – Stopping those illegal file transfers of copyrighted content and Chinese-manufactured counterfeit DVDs sold by street peddlers.

  • Democrats: Yas
  • Republicans: Yas

Both parties are pointing fingers at China for supplying an endless quantity of counterfeit merchandise sold in flea markets, online, and by street peddlers in large cities. An enormous sum of Hollywood’s lobby money, and the presence of former Sen. Chris Dodd (D-Conn.) as head of the Motion Picture Assn. of America guarantees a Washington audience receptive to the industry’s arguments. Members of Congress from both political parties representing entertainment nerve centers in California and New York have adopted piracy legislation largely as written by industry lobbyists.

But there are limits. The Obama Administration ended up opposing the overreaching Stop Online Piracy Act because it failed to balance intellectual property rights with online privacy for consumers.

The Democratic platform said the administration is “vigorously protecting U.S. intellectual property—our technology and creativity—at home and abroad through better enforcement and innovative approaches such as voluntary efforts by all parties to minimize infringement while supporting the free flow of information.”

Cybersecurity: Tech Terrorism and CyberWars

  • Democrats: Yas
  • Republicans: Yas

Cyberattacks from foreign entities on American computer systems and the Internet receive near-equal attention from both political parties. But the GOP still feels the current administration has not done enough, accusing the Obama Administration of insufficient vigilance that has “failed to curb malicious actions by our adversaries.” The Republican platform demands an overhaul of a 10-year-old law governing computer security and demands more collaboration between the government and the private sector on cyber-incursions.

Democrats defend their performance expressing a pledge to, “continue to take steps to deter, prevent, detect, and defend against cyber intrusions by investing in cutting-edge research and development, promoting cybersecurity awareness and digital literacy, and strengthening private-sector and international partnerships.”

Time Warner Cable & Comcast Dump 4G Clearwire-Partnered Mobile Broadband in Verizon Deal

Phillip Dampier August 30, 2012 Comcast/Xfinity, Competition, Consumer News, Wireless Broadband Comments Off on Time Warner Cable & Comcast Dump 4G Clearwire-Partnered Mobile Broadband in Verizon Deal

New Yorkers know the end of summer is upon us when the New York State Fair opens every year at the end of August in centrally-located Syracuse. But at this year’s fair, Time Warner Cable has also made it clear the season for its 4G mobile broadband service has also come to at least a temporary end.

Fierce Cable’s Steve Donohue noticed big changes at the cable company exhibit:

When I attended the New York State Fair outside of Syracuse last year, the Intelligo mobile hotspot–which Time Warner Cable offered to subscribers through a partnership with Clearwire –was one of the hottest pieces of technology that it had on display. Time Warner Cable said that it tripled the number of 4G wireless hotspots that it sold at the fair in 2011 compared to 2010. Here in Central New York, where subscribers don’t have access to the Wi-Fi networks that Time Warner Cable, Comcast and Cablevision offer in the New York area, apparently there was a significant demand for mobile hotspots.

‘Intelligone’

This year, the mobile broadband technology is all gone. Both Time Warner Cable and Comcast are no longer selling access to Clearwire’s 4G WiMAX service marketed under each cable company’s brand. Once it became clear they were partnering up with Verizon Wireless to sell each other’s products, the days of Clearwire were numbered.

Both cable companies are still supporting existing Clearwire mobile broadband customers, but for how long nobody is certain. Verizon Wireless’ products have not yet appeared on the western or central New York regional Time Warner Cable websites, but may be forthcoming soon.

Meanwhile, Time Warner’s push this year is on home automation and security. The company has been test marketing its IntelligentHome service in Rochester for quite awhile and has now expanded to other upstate areas. The service offers a respectable suite of traditional security products apps ranging from watching your pets over webcams to controlling your home’s heating and cooling system from remote locations.

In 2010, Time Warner Cable featured celebrity Mike O’Malley at the Fair to shake hands and sign autographs. This year, they have a player and “spokesmodel” from the Syracuse Crunch, a minor league pro hockey team. Time Warner Cable also hired a juggler on a unicycle to attract crowds to their pavilion.

Using Public Cell Phone Charging Stations Can Be a Security Risk

Phillip Dampier August 13, 2012 Consumer News, Video, Wireless Broadband Comments Off on Using Public Cell Phone Charging Stations Can Be a Security Risk

[flv width=”360″ height=”290″]http://www.phillipdampier.com/video/WCPO Cincinnati Video Charging phone on the go might be risky 8-9-12.mp4[/flv]

If you use a public cell phone charging station, your data could be at risk, warn security experts. A new breed of hackers are modifying the charging outlets found in airports, phone booths, and other public venues to capture your phone’s data while you charge. WCPO in Cincinnati shows you how it can be done.  (2 minutes)

Search This Site:

Contributions:

Recent Comments:

Your Account:

Stop the Cap!