09 July 2012

Declaration of Internet Freedom

si_declaration_internet_freedom_FP.jpgA few days ago, online leaders, including the EFF, Public Knowledge, Free Press, and the Mozilla Foundation, have issued a document titled “Declaration of Internet Freedom”.
The declaration stands for a free and open web and calls not to censor the Internet. Although the document doesn’t propose any specific policy, it hopes to put a line in the sand about what things should look like. Meanwhile, its principles were designed to be accepted by the political arena.The document was mainly sustained by liberal groups like the Free Press, but the declaration was also supported by a couple political figures, who encouraged Republicans to vote against SOPA and similar bills.In the meantime, not everyone is happy with this move – for instance, a coalition of right-of-center outfits delivered their own version with various sets of principles, which included “humility” and “the rule of law” – the list includes TechFreedom, the Competitive Enterprise Institute, and the National Taxpayers Union. They argued that the original document contained an “ambiguity which could pave the way for more government intervention”.However, if you take a closer look on both versions of the document, you would notice that they both highlight the importance of free expression, privacy and innovation. The question is how to apply those ideas. In fact, the real issue is the ambiguity of the documents, a feature which may prove fatal to the outfits’ plans. In addition, the Congress doesn’t seem to be going to vote against free speech or creativity, but it is less likely to support vague principles.So, to make a change the initiators must have a good plan focused on the political sector. You can recall Demand Progress’ campaign, which emphasized that the MegaUpload case had set a precedent, and pointed out that now such portals like Gmail and Flickr might be in danger as well.Demand Progress also filed an amicus brief (with more than 50,000 signatures) with a Virginia judge who managed the MegaUpload case. The matter is that solving the cyberlocker’s problem (and other troubles that may appear soon) would demand the legislation be modified, especially the 2008’s PRO-IP Act, because it enables federal government to seize domains, servers, and everything else they may need in a copyright violation case.

Advertising Sustains Online Piracy

Search giant Google, in co-operation with PRS for Music, has carried out a study titled “The 6 Business Models For Copyright Infringement”. So, what did they find out?
pirate+flag.jpg

The report revealed that a key source of revenues for the services “believed by the largest copyright owners to be massively facilitating copyright violation” is advertising. However, this will surely start a heated debate instead of calming things down.

The study was based on a research made by Detica and the information offered by the Premier League, FACT, UKIE and The Publishers Associations. The report classifies piracy portals into six groups: live TV gateways, embedded streaming, peer-to-peer groups, music transaction, subscription groups, and rewarded freemium.

Meanwhile, there are a couple of interesting discoveries about the music sector. One of them emphasizes the importance of advertising (funding 86% of P2P community portals). Another one reveals the importance of search engines for music transaction services, which means that their users usually find out about the portal through a search engine.

The study in question indicates that there are a lot of various business models for Internet infringement that can be tackled if the industries co-operate. The collected evidence suggests that one of the most efficient ways to do so is to follow the money, looking for those advertisers who prefer to earn money from such services and working with payment providers in order to make sure they realize how their services are used.

The head of the PRS for Music hopes the result of the study will reach the government of the United Kingdom and other countries. He says that the portals involved in copyright violation are mainly businesses with real costs and revenue sources, which receive subscription and advertising revenue. On the other hand, those services have to pay their server or hosting costs. The only problem is that they don’t pay the creators of the material on which their businesses depend.

As you can see, the business models of the copyright infringers are different, and the authorities now have the evidence to realize which policy levers they need to apply to solve the problem of piracy and deal with those strategies efficiently.

The Chinese Hacked Indian Navy Systems

According to the latest security reports, India has left contemplating its naval, as the Chinese hackers managed to take out the computer system on the National Navy’s Eastern Command.

The intruders managed to plant malware on the targeted system based near the city of Visakhaptnam. The malware in question sent sensitive information to specific IP addresses in China. Local media reported how the country’s first nuclear missile submarine, named INS Arihant, had been running trials at the facility and might have got the bug.

The malware was said to work the following way: it had created a hidden folder where it copied specific files and documents based on the keywords it had been programmed to identify. The folder remained hidden on the pen drives until those were put in the machines connected to the web. That’s when the bug silently sent the collected files to the specific IP addresses in China.

Thus far, it is unclear how much was stolen in the hacking raid. The experts also can’t say whether the malware in question operated like Stuxnet and needed to be installed within the system by a spook first. Meanwhile, India has already arrested six officers for procedural lapses that caused the breach. The authorities do not reveal whether any of the officers can later face spying charges.

The interesting part of the story is that the national navy stores sensitive information only in standalone machines that are never connected to the Internet. Moreover, these computers also can’t have any ports or access points to use flash drives or external storage devices. How the malware got into machines should be a mystery for the Indians…