Computer Crime for Law Enforcement Professionals – a Glossary

6718984211_d587a5cc45

One would be hard-pressed to come up with a segment more under-prepared for their challenge than law enforcement professionals faced with the task of policing the world of computing. Detective work was much simpler when everybody and his mother didn’t have a computer. Herein, some basic terms to get you started.

HACKER: The meaning of the word hacker has been corrupted from its original intention. Originally, it meant somebody who was very good at programming. The members of the MIT labs, AT&T Bell labs, and Xerox Parc originally referred to themselves as ‘hackers’, in much the same way that a ranch worker would use the title ‘cowboy’. Not everybody who calls themselves ‘hacker’ today is admitting to criminal activity. Nevertheless, there has been much awareness of how the term has changed, so that now a security professional working in computers may designate their specialty with a hat color system: e. g. a ‘white hat hacker’ programs security and encryption software, a ‘black hat hacker’ practices overcoming security and encryption, etc. Outside of the security field, the term hacker has fallen widely out of use.

CRACKER: What the public actually means when they say ‘hacker’. A cracker breaks into networks and servers for all variety of crimes requiring access, ranging from identity theft to setting up a botnet. Contrary to the popular Hollywood image, a cracker in fact is not particularly adept at programming or computers in general, but is merely exploiting a widely-known (in the underground) security hole in a given system usually using a simple tool downloaded from a “hacking” website. A cracker is no more a computer wizard than a car thief is a master mechanic. In fact, the nature of breaking into computers and breaking into houses and cars is almost identical.

CYBERSTALKING: The most common complaint you will be dealing with in street police work. People will use the Internet to stalk and harass their intended victim. The tools for discovering personal details of someone are widely available on the web. It is suggested that you try to use online “people finder” services to see how much information there is available about yourself, for starters.

It is quite easy to find out last known address from a name, a name and location from a website address, a location and service provider for an IP address, personal details for a chat room screen nick or email address, and so on. A dedicated stalker will use every service at their disposal, compiling information from various sources until they at least have a way to contact their target, if not steal their target’s identity.

PIRACY: This can be anything from the ‘ripping’ (breaking copy protection) of commercial software which is then posted online for resale or ratio-download (called ‘warez’) to the copying and distribution of media (CDs, DVD movie, etc.). If you thought the war on drugs was out of hand, you’ll have a similar feeling about Internet piracy. There is effectively nothing that can be done to cure the problem, only half-measures to stifle it. The issue is mired in the international business and laws of the world, the hazy issue of how far copyright extends under what circumstances, the various definitions of fair use, and the blundering incompetency of such entities as the RIAA, which is more likely to harass innocent grandmothers (who accidentally received an unauthorized tune in their electronic greeting card) than go after a real pirate.

Furthermore, digital protections against piracy do nothing to stop real pirates, but are great for preventing you from watching the DVD movie that you paid for on your PC. It may be ten years yet before the world gets a handle on this. In the mean time, take piracy accusations with a grain of salt, and only pursue an investigation if you know the suspect is actually running a large-scale piracy operation for profit.

IDENTITY THEFT: Related to the above entry on cyber stalking, this has a different motive. Instead of the perpetrator having a personal grudge against the victim, this is for profit. Mainly credit card numbers and bank data are targeted, and then sold internationally for sums of money. The means of stealing the data can be anything from ‘dumpster diving’ for receipts and discarded paperwork, to theft of computers containing customer databases to online scams to con gullible users into surrendering personal data. A huge underground, international market exists for this activity, and it is even said that identity theft drives “the new mafia”.

PHISHING: The number-one method of online identity theft. Phishing is a very basic process: you just build a web site that looks just like a bank web site, spam emails to potential bank customers with a link to the fake site and some kind of story about how they need to come to it and re-enter their data (frequently the story is that the bank’s site crashed and they have to update their financial records), then record the data and sell it to the stolen identity market. A large segment of the population is shockingly trusting of phishing scams.

‘419’: This is the most common variety of online confidence scheme. Instead of posing as a bank site, the perpetrator poses as any variety of fanciful characters and tells a story hoping to get money out of the victim. The classic ‘419’ scam is to pose as a foreign price who has a huge amount of money they need to store, and offers to give some to the victim. The victim is then gradually coerced through subsequent online correspondence to send the perpetrator money for some made-up reason like ‘processing fees’.

This is also known as the ‘advance fee fraud’. The variations range as far as human imagination permits, and includes posing as a lottery authority notifying the victim that they’ve ‘won’, a lawyer notifying the victim of an inheritance from a distant relative, soap-opera-like kidnapping plots where the victim is persuaded that they’re rescuing a victim by paying a ransom, and highly fanciful plots worthy of a novel. In some countries, profits from ‘419’ scams actually count as a sizable portion of their gross domestic product!

BOTNET: This involves infecting the target computer with a virus whose purpose is to take over the target computer, turning it into the criminal’s puppet. These are always large-scale operations, with a global network of “zombie” computers operating at the criminal’s whim, who then unites the machines in a botnet and uses it to perpetrate another crime such as spamming, attacks against web servers, identity theft, and so on. The “master” of a botnet is sometimes referred to as a ‘herder’. The victim is never aware that their computer has become part of these zombie networks. This is again a part of the international cyber-crime scene.

Freelance writer for over eleven years.

Security Uniforms Formal Wear Uniform Scrubs

1020-20120118 Save the LOL Cats
internet piracy
Image by Chris Piascik
Daily Drawing #1019: Save the LOL Cats – bit.ly/x4o9JX #SOPA

Related Internet Piracy Articles

Illegal Music Downloads And The Law

31588699_546744b58a

Ever since broadband was set up and made readily available to the general public, illegal music downloads have gone through the roof. Today, approximately 95% of all downloads are illegal and some 6.5m broadband users illegally download music on a daily basis.

Earlier this year, the music industry decided that enough was enough and that this multi million pound purge needed to stop. Discussions with John Hutton (The Business Secretary), Andy Burnham (The Culture Secretary) and major internet service providers (ISPs) resulted in tough new proposals governing the illegal download scene.

At this point, it is perhaps worth outlining the law when it comes to downloading music. The Copyright, Designs and Patents Act 1988 (CDPA) is the current UK copyright law and gives the creators of literary, dramatic, musical and artistic works the right to control the ways in which their material may be used. These rights cover broadcast and public performance, copying, adapting, issuing, renting and lending copies to the public. By downloading music files illegally, you are in breech of the copying part of this law.

ISPs have been pressurised into clamping down on persistent illegal downloaders and in June of this year, Virgin Broadband (one of the largest ISPs in the UK) agreed to take steps towards culling downloads. Virgin expect to send out more than 12,000 letters over the course of the summer to internet users warning them to stop their illegal downloads or face restrictions on their service.

So what does this mean for internet downloaders? Well, Virgin are keen not to punish their users, they would rather ‘educate’ them on the wrongs of downloading illegally. Sounds like a cop out and a good way round enforcing the law, but they might not have much choice on this in a year’s time.

Huttin and Burnham, along with bosses from the music industry want tighter rules surrounding illegal downloads. One of the proposals includes placing a 30 GBP annual charge on people who want to download files. This would give users unlimited access to download files from anywhere on the net, without the worry of facing up to law. 30 GBP may not sound a lot, but as Peter Jenner stated; “If you get enough people paying a small amount of money you can turn around the wheels of the music industry.” The funds from these fees are worth almost 1.2bn GBP and would be channelled back to the industry and distributed proportionally back to the relative rights holders.

Obviously looking for the toughest penalties for repeat offenders, industry bosses are calling for a ‘three strikes and you’re out’ policy, similar to the scheme currently employed in France. Persistent offenders would be warned and banned if they didn’t stop. Other proposals include preventative filters which stop the possibility of any illegal download activity or, illegal downloaders’ details being given directly to the music industry for punishment.

Sites like Napster brought illegal downloads to the masses and were relatively untouched by officials for many years until they realised just how much impact illegal downloads were having on the music industry. In 2001, the company were forced to shut down after being found guilty of copyright infringement laws.

Today, Napster is a legitimate trading company and sells downloads instead of offering them for free. iTunes are the biggest players in this market and dominate the scene with a 70% share of legal music downloads. It took less than five years to reach 1bn downloads, and keen to show that legal downloads are the way forward, the company rewarded the downloader, Alex Ostrovsky, with a brand new iMac, ten iPods and a 10,000 USD (5,700 GBP) iTunes voucher. Not a bad return on his 99p investment.

In 2006, the download market really came up trumps when Gnarles Berkley had a hit with Crazy. The song hadn’t even been released on CD when it hit the top spot in the UK charts after Zane Lowe championed the song on his New Music Show.

So will pressure from the industry actually have any effect on downloads? ISPs have already cleared themselves of any wrong doing as they are merely ‘conduits’ of information – they don’t personally hold the files.

Illegal downloads will inevitably continue as new methods of file sharing are discovered and employed. At the end of the day, rules are there to be broken and problems are there to be solved. As long as CDs cost as much as they do, downloaders will see no reason to stop what they are doing. If a CD costs less than 1GBP to produce, the question remains: Why are we charged the earth to purchase them?

Samantha is an expert Research and Theatre consultant. Her current interests are UK shortbreaks including LEGOLAND Windsor and Alton Towers.

Pirate
internet piracy
Image by jurvetson
Seen all over the Internet Cafés of Croatia. Yar!
(Photo by Emily Melton, our intrepid international photojournalist. =)

Just got back from Utah myself.

P.S. This image has spooky powers. When I loaded it into iPhoto, the thumbnails became corrupted and when I uploaded to Flickr, my Safari browser crashed. Beware, all ye who enter here….

Downloading Movies To Zune

2306082998_63dd649eb4

Every Zune owner would loves downloading movies, music, and games to their Zune. However, the cost of downloading a lot of music, movies, and games for Zune adds up fast and can become real expensive. Another thing is that popular file formats such as AVI, MPEG 1, MPEG 2 do not work for Zune. This is not a problem, because oyu can download a conversion software on the internet fro free, which will convert any file into a file format your Zune recognizes.

Accessing free videos, music and game applications can be a headache if you don’t know your way around the internet, and even more so if you are not hip to the online lingo for getting free stuff. There are some popular ways of getting free downloads for your Zune player, that can be very dangerous at the same time. P2P sites are popular because they are generally easy to use, and allow direct person-to-person sharing of files. However, because of this, you leave yourself completely vulnerable to viruses, spyware, and other things that are not good for your computer or your Zune player.

Torrent sites are becoming more and more popular amongst internet savvy pirates , these days. Essentially, what a “torrent” is, is a small file, containing a link to all of the information needed for a particular download, whether it be music, or movies. Torrents are safer than direct p2p sharing, but both systems are completely illegal in the United States. Penalties for internet piracy can be as severe as ten years federal imprisonment, and very hefty fines as high as one hundred thousand dollars per offense, depending on the case. All in all, it isn’t a very good idea to use a p2p client, or torrents, considering that not only can this be damaging to your downloading device (i.e. Zune player), but you can also be federally prosecuted for as little as one file. It just simply is not worth it.

So what do I recommend? The best option to get your hands on unlimited zune movies, music, and games is to join a zune membership site. You will have to pay a small fee. The reason for this is that there are people behind these sites that maintain it, provide cusotmer support etc. As soon as you have paid your membership fee, which is around $ 50 for a lifetime membership, you may download as many Zune movies, music, and games as you can handle. Downloads already come in the right format, so there is no need spending hours converting files.

The biggest Zune download site hosts over six million music files, alone. They also provide downloads of all available media players for free, just in case. Customer service is prompt, courteous, and there are rarely technical issues with the site. All around, the best place to find free movies, games, and music of any genre, for your Zune!

To learn about the best Zune download sites visit Zune Downloads Free. You could start downloading unlimited Zune movies, Zune music, and Zune games within minutes from now.

peace & ecommerce, a global system view
internet piracy
Image by Wonderlane
China is a likely winner of the information age supply chain through ecommerce
Peace and Ecommerce, A Global Systems View

By Linda Lane, MSIM, 2008
Policy, Law, and Ethics in Information Management, University of Washington

The Research Diary
Education justifies everything.
Attending a required Masters class “Policy, Law, and Ethics in Information Management” it was only ethical to admit that I worked three months drafting and publishing policy documents for Microsoft, which was now our current class assignment, to research Web based privacy policies and other related documents such as terms of use, conditions of use, code of conduct and learn more about them, with a diary of examples in the wild, and related materials. The educational idea is that we would then be able to contribute meaningfully to creating policy statements, and understand their underlying implications to end users and companies. But I had already done this work professionally, so it would be of questionable value for me to do the coursework on the same topic as if I had never done it before.

The instructor of the class, Glenn Von Tersch is that valuable-to-me teacher because he is a rare working professional in the field in which he instructs, he’s an intellectual property lawyer working in California, teaching in person in Seattle, and in my lingo, a local boy made good. Von Tersch assigned me to present information on freedom of speech, a topic I fell in love with, and wanted to research more. But for my final research I needed something else.

One of my favorite things to discuss in job interviews, or with anyone in earshot, is that I believe that the networked spread of ecommerce over the Web, filtering into even the poorest nations will aid in understanding through communication; that ecommerce leads to peace. In effect I believed that ecommerce contributes in a direct way to peace because it provides the fuel to grow and maintain the Internet. Also it seemed obvious that people and countries that are invested in and perform transactions with each other are less likely to go war against their own interests. Von Tersch said, “These topics you are interested in have more research value than freedom of speech, because 1st amendment rights have been heavily legislated, written about, and researched.” He mentioned something called “The McDonald’s Effect”, how having a McDonald’s outlet or franchise appears to contribute to peace between countries. So peace and ecommerce became my topic.

What I did not expect to discover is in human society war is considered the norm and peace the exception. I did not expect to learn about how ugly the 3rd world poverty creating monster of WTO became according to one economist, even though I live in Seattle where the initial protests were. I was surprised to know how Reganomics theory hangs on, like an old B-grade movie on late night TV, because someone somewhere in the supply chain makes money. I did not expect to find that privacy and intellectual rights are so tightly interwoven, or how they relate to conflict, security, potential world dominance and growth.

I had no way to guess that I would enjoy the study of economics – statistical, yes, nicely so, but dull no; as a global topic it is juicy-rotten, full of international spies, botched security, with rogue pirate computer chips, and unintended consequences.

Who can accurately predict how patterns of global economics relate to peace, privacy, property rights, policies and their outcome in the one breath away from today, the next 20-40 years? Who would think that China – the nation, McDonalds – the corporation, and Chicago crack dealers and their foot soldiers share so much in common when you view their information through these fascinating multi-dimensional facets?

One must be educated to search effectively for information. My knowing about the nature of search is not just intellectual knowledge; this is conditionalized through my own experience of failure to produce relevant search results within massive library databases.

My education began with a simple query on the Web “peace + ecommerce” which returned from Google “Theses on the Balkan War,” by Mike Haynes, from the International Socialism Journal, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” , effectively laying the blame for war on the US and Western capitalist nations and on any one claiming to be fighting a war with good intentions. I read it, thinking I would not see this relate to my project – also surprising very similar material was presented in the global economic books I read later .

As mentioned the pursuit of ‘education justifies anything’, like looking at any results, so I also clicked on an article entitled “Dinosaur Extinction linked to change in Dinosaur Culture” I read it, and it made sense that something like author Daniel Quinn’s theory of “The Law of Limited Competition” is an operant factor in global markets today, with war being genocide, and countries struggling to win economically laying waste to the very place they live. A notable example is Beijing, the air pollution capital of the world struggling to host the Olympic Games this year. I stored that URL for future reference. The theory and the reality imply that in the race to catch up and compete in global economics, the Chinese are killing themselves off before they arrive at their desired goal.

Then I queried in several of the University of Washington interconnected and extensive library databases on the same thing “peace + ecommerce” and found in all of them, zero returns, “0 Results”. My teacher was surprised and advised me to extrapolate and offer conjecture on what was likely, if few sources were available. I notified a friend studying economics who emailed related articles. Very frustrated I tried related queries and turned up articles on the economies of war . How perverse, I thought. I contacted a librarian through the online tool and chatted with her, explaining my quest. She suggested I query on “economics and public policy”. “How is public policy related to peace and ecommerce?” I asked. “Try Conflict Resolution” she replied.

Thus the reason I couldn’t find ‘peace’ is because the term used, in educated facet writers’ metadata which is designed to expose information to search, is ‘conflict resolution’ or ‘conflict prevention’. Oddly the social implication is that war is the norm. Maybe peace doesn’t exist anywhere. A reason I used ‘ecommerce’ instead of ‘global economics’ is due to consulting in that field for technology firms. Searching again returned few meaningful results — the user interface was strange, very slow, and clunky. I longed for Google .

Then I remembered the “McDonald’s Effect” our teacher mentioned, and quickly I located a reference on the Web, but it was deeply nested in a staggering number of oddly worded articles. I stopped without uncovering where the concept originated. The next night I searched again, and found the author Thomas Friedman and his related books. I briefly scanned all the related Wikipedia articles. I realized quickly that to become educated enough on my two topics, I had to some understanding of economics. This is because even to scrape by enough to search among the many interrelated topics one needs to know the central facet . Very esoteric topics require specialized language and deep knowledge of the subject.

More searches turned up substantial evidence that China lags behind other nations in ecommerce.

For years I worked in ecommerce designing interfaces (for Microsoft 2003 and Amazon 2007-2008), and working with supply chain software (as a director of an ecommerce company). But because I didn’t realize that one could understand it better, and that it is not as dull as computer science and its requisite cash register receipts , I never tried.

The "McDonald’s Effect" is named after "The Golden Arches Theory of Conflict Prevention" created by the author Thomas Friedman’s slightly in cheek comments and his book, “The Lexus and the Olive Tree” (the update now titled "The Lexus and the Olive Tree: Understanding Globalization").

Those books lead me to order Amazon ecommerce overnight book delivery, and I read, ‘The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman’, ‘Freakonomics: A Rogue Economist Explores the Hidden Side of Everything’ , ‘Making Globalization Work’ which reports that there is hope in the world for peace. The Nobel Prize winning author helps the reader extrapolate based on significant knowledge of statistics and global economic analysis through his personal, professional, and academic connections.

Common Name Academic Name Book Title
McDonalds Effect Golden Arches Theory of Conflict Prevention,
aka democratic peace theory Lexus and the Olive Tree

Dell Theory The Dell Theory of Conflict Prevention The World is Flat, A Brief History of the Twenty-First Century

peace conflict prevention
ecommerce global economics

"In his book, The Lexus and the Olive Tree, Thomas L. Friedman proposed The Golden Arches Theory of Conflict Prevention, observing that no two countries with a McDonald’s franchise had ever gone to war with one another, a version of the democratic peace theory."

"The Dell Theory stipulates: No two countries that are both part of a major global supply chain, like Dell’s, will ever fight a war against each other as long as they are both part of the same global supply chain."
———————————————————————
Readings
The World Is Flat 3.0: A Brief History of the Twenty-first Century by Thomas Friedman
Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

From Friedman’s conversation with Google’s director of operations in China, Kai-Fu Lee, p. 181 entire paragraph ”In time individuals will have the power to find anything in the world at any time on all kinds of devices – and that will be enormously empowering.”

The Quiet Crisis, entire pages 368, 369, chapter on research in China, beating out American innovation in research. “The Chinese government gave Microsoft the right to grant post-docs.” “They work through their holidays because their dream is to get to Microsoft.”
“What are those?” She said the researchers get them from Microsoft every time they invent something that gets patented. How do you say Ferrari in Chinese.”

p. 370 “… whether we are going to implement or China is going to beat us to our own plan.” Council on Creativeness, regarding the Innovate America report, comment to Friedman by Deborah Wince-Smith.

Introduction p. X, Thomas Friedman, “Of course the world is not flat. But it isn’t round anymore either. I have been using the simple notion of flatness to describe how more people can plug, play, compete, connect, and collaborate with more equal power than ever before – which is what is happening in the world. … the essencial impact of all the technological changes coming together in the world today. … My use of the word flat doesn’t mean equal (as in ‘equal incomes’) and never did. It means equalizing.”

The Lexus and the Olive Tree: Understanding Globalization by Thomas Friedman

Forward to the Anchor Edition, Thomas Friedman, “… my Golden Arches Theory – that no two countries that both have McDonald’s have ever fought a war again each other since the each got their McDonald’s.”

p. 7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?”

p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nickleson. “Son we live in a world that has walls…”

p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

p. 19 “What is information arbitrage? Arbitrage is a market terms. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

Chapter 3, p. 29. The Lexus and the Olive Tree
Photo: Jerusalem, December 29, 1998: Simon Biton places his cellular phone up to the Western Wall so a relative in France can say a prayer at the holy site. (Photo: Menahem Kahana, Agence France-Presse) [caused my spontaneous tears]

p. 47 “advertising jingle “Let us put a bank in your home” … office … newspaper … bookstore … brokerage firm … factory … investment firm … school in our homes.”

The World Is Flat?: A Critical Analysis of New York Times Bestseller by Thomas Friedman by Ronald Aronica and Mtetwa Ramdoo

Freakonomics [Revised and Expanded]: A Rogue Economist Explores the Hidden Side of Everything by Steven D. Levitt and Stephen J. Dubner

Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

Making Globalization Work by Joseph E. Stiglitz
My favorite – the entire book was used to write this paper.

Web Resources
Please view attached Appendix www.crito.uci.edu/pubs/2004/ChinaGECIII.pdf regarding the reasons one study concludes that hold China back in ecommerce.

[1] Waiting until the time is right, one is good at something, or has collected all the facts, without making any attempts isn’t effective. I had to begin someplace even if it is incomplete so I started with the World Wide Web. “If something is worth doing well, at all, it is also worth doing poorly.” I am not sure where that quote came from but I read it in an article where someone presented their reasoning.

[2] You never know where something will come from in free rights actions or what it will mean later. For example the person at the center of the Alaskan “Bong hits For Jesus” case, Frederick Morse, now teaches English to Chinese students in China. As an adult it appears he has his head on straight in his wish to help others communicate, more so that those he fought in court.

From the CNN news article, published June 26, 2007, “In dissent, Justice John Paul Stevens said, "This case began with a silly nonsensical banner, (and) ends with the court inventing out of whole cloth a special First Amendment rule permitting the censorship of any student speech that mentions drugs, so long as someone could perceive that speech to contain a latent pro-drug message." He was backed by Justices David Souter and Ruth Bader Ginsburg.” www.cnn.com/2007/LAW/06/25/free.speech/index.html/ downloaded March 13, 2008

[3] Pentagon attack last June stole an "amazing amount" of data” Joel Hruska Published: March 06, 2008 – 07:13PM CT arstechnica.com/news.ars/post/20080306-pentagon-attack-la… from “blueton tips us to a brief story about recent revelations from the Pentagon which indicate that the attack on their computer network in June 2007 was more serious than they originally claimed. A DoD official recently remarked that the hackers were able to obtain an "amazing amount" of data.

We previously discussed rumors that the Chinese People’s Liberation Army was behind the attack. “CNN has an article about Chinese hackers who claim to have successfully stolen information from the Pentagon.” Quoting Ars Technica: "The intrusion was first detected during an IT restructuring that was underway at the time. By the time it was detected, malicious code had been in the system for at least two months, and was propagating via a known Windows exploit. The bug spread itself by e-mailing malicious payloads from one system on the network to another." Via email from Jeremy Hansen on slashdot.org/

[4] “Chinese backdoors "hidden in router firmware" Matthew Sparkes, News [Security], Tuesday 4th March 2008 3:17PM, Tuesday 4th March 2008 www.pcpro.co.uk/news/173883/chinese-backdoors-hidden-in-r… The UK’s communication networks could be at risk from Chinese backdoors hidden in firmware, according to a security company.

SecureTest believes spyware could be easily built into Asian-manufactured devices such as switches and routers, providing a simple backdoor for companies or governments in the Far East to listen in on communications.

"Organisations should change their security policies and procedures immediately," says Ken Munro, managing director of SecureTest. "This is a very real loophole that needs closing. The government needs to act fast."

"Would they buy a missile from China, then deploy it untested into a Western missile silo and expect it to function when directed at the Far East? That’s essentially what they’re doing by installing network infrastructure produced in the Far East, such as switches and routers, untested into government and corporate networks."

Late last year MI5 sent a letter to 300 UK companies warning of the threat from Chinese hackers attempting to steal sensitive data. Reports at the time suggested that both Rolls Royce and Royal Dutch Shell had been subjected to "sustained spying assaults".

The issue has been debated by government for some time. In 2001, the then foreign secretary Robin Cook, warned that international computer espionage could pose a bigger threat to the UK than terrorism.

[5] Chip Piracy Might End With Public Key Cryptography. A Web Exclusive from Windows IT Pro Mark Joseph Edwards, Security News, InstantDoc #98491, Windows IT Pro “A group of researchers from two universities have proposed a way to prevent chip piracy. The technique uses public key cryptography to lock down circuitry.

In a whitepaper published this month, Jarrod A. Roy and Igor L. Markov (of the University of Michigan) and Farinaz Koushanfar (of Rice University) outline the problem and details of how their proposed technology will help solve it.

Chip designers sometimes outsource manufacturing and that opens the door to piracy, should someone copy the design plans. The copied plans are then used to created ‘clone’ chips for a wide range of devices, including computers, MP3 players, and more.

"Pirated chips are sometimes being sold for pennies, but they are exactly the same as normal chips," said Igor Markov, associate professor in the Department of Electrical Engineering and Computer Science at the University of Michigan. "They were designed in the United States and usually manufactured overseas, where intellectual property law is more lax. Someone copies the blueprints or manufactures the chips without authorization."

The groups propose the use of public key cryptography, which would be embedded into circuitry designs. Each chip would produce its own random identification number, which would be generated during an activation phase. Chips would not function until activated, and activation would take place in a manner somewhat similar to that seen with many applications in use today. Via email from Jeremy Hansen.Original source – EPIC: Ending Piracy of Integrated Circuits Jarrod A. Roy, Farinaz Koushanfar‡ and Igor L. Markov, The University of Michigan, Department of EECS, 2260 Hayward Ave., Ann Arbor, MI 48109-2121, Rice University, ECE and CS Departments, 6100 South Main, Houston, TX 77005 www.eecs.umich.edu/~imarkov/pubs/conf/date08-epic.pdf March 06, 2008

[6] Chapter 5 “Why do Drug Dealers Still Live with Their Moms?” p. 89 “So how did the gang work? An awful lot like most American businesses, actually, though perhaps none more so than McDonald’s. In fact, if you were to hold a McDonald’s organizational chart and a Black Disciples org chart side by side, you could hardly tell the difference.”

[7] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex.org.uk/isj83/haynes.htm/ accessed March 3, 2008.

[8] Readings p.7 “When I say that globalization has replaced the Cold War as the defining international system, what exactly do I mean?” p. 8 “The cold war system was symbolized by a single word, the wall … “You can’t handle the truth,” Says Nicholson. “Son we live in a world that has walls…”p. 8 “This Globalization system is also characterized by a single word: the Web. … we have gone from a system built around divisions and walls to a system built around integration and webs.”

“What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

[9] Shared by miles on Feb 13, 2006 3:39 pm that I located through a mail.google.com/mail/?ui=1&realattid=f_fdn935gd&a…
[10] “As it gears up to host the 2008 Olympic Games Beijing has been awarded an unwelcome new accolade: the air pollution capital of the world.Satellite data has revealed that the city is one of the worst environmental victims of China’s spectacular economic growth, which has brought with it air pollution levels that are blamed for more than 400,000 premature deaths a year” www.guardian.co.uk/news/2005/oct/31/china.pollution

[11] “What we call ‘war’ is not all bad,” according to Virginia Johnson a former governmental planning consultant, who reminded me, “Without conflict there is no life. You don’t want ‘perfect peace’ there is no movement. The human standard is actually what we broadly call ‘war’; because without conflict, change, motion, growth we would learn nothing, we would have nothing, we would be dead.” Personal conversation, March 14, 2008, Seattle, Washington

[12] Readings Larry Page, Google Co-Founder quoted by Thomas Friedman, p. 179, entire paragraph. “The more global Google’s user base becomes, the more powerful a flattener it becomes…”

[13] Ranganathan, faceted classification, Five Laws of Library Science, en.wikipedia.org/wiki/S._R._Ranganathan, www.boxesandarrows.com/view/ranganathan_for_ias Personality, Matter, Energy, Space, and Time. (PMEST)
Personality—what the object is primarily “about.” This is considered the “main facet.”
Matter—the material of the object
Energy—the processes or activities that take place in relation to the object
Space—where the object happens or exists
Time—when the object occurs

[14] www.crito.uci.edu/pubs/2004/ChinaGECIII.pdf

[15] I learned about supply chain management mainly from the supply chain wizard Marc Lamonica, Regional Chief Financial Officer at Sutter Connect, www.sutterconnect.org/, and our mutual friend Web entrepreneur and ecommerce product engineer Adam Kalsey, and Sacramento State University teacher Stuart Williams, of Blitzkeigsoftware.net, blitzkriegsoftware.net/StuartWilliams/default.asp

[16] Introduction to Computer software classes in the 1970s consisted of FORTRAN cash register receipt programming, which is by implication is what ecommerce actually does.

[17] Freakonomics is a must read book of comedy and connections.

[18] Golden Arches, definition on Wikipedia, the free encyclopedia en.wikipedia.org/wiki/Golden_Arches, accessed March 13, 2008

[19] Readings “The World Is Flat 3.0: A Brief History of the Twenty-first Century” by Thomas Friedman, p. 421

[20] Readings p. 19 “What is information arbitrage? Arbitrage is a market term. Technically speaking, it refers to the simultaneous buying and selling of the same securities, commodities or foreign exchange in different markets to predict from unequal prices and unequal information. The successful arbitrageur is a trader that knows…”

[21] “Conservation groups say acid rain falls on a third of China’s territory and 70% of rivers and lakes are so full of toxins they can no longer be used for drinking water.” Satellite data reveals Beijing as air pollution capital of world, Jonathan Watts in Beijing The Guardian, Monday October 31 2005, www.guardian.co.uk/news/2005/oct/31/china.pollution

[22] “…After watching Jobs unveil the iPhone, Alan Kay, a personal computer pioneer who has worked with him, put it this way who has worked with him, put it this way: "Steve understands desire." … Fortune CNN Magazine March 5, 2008, money.cnn.com/2008/03/02/news/companies/elkind_jobs.fortu…
accessed March 5, 2008

[23] Mac Margolis, “How Brazil Reversed the Curse, Latin America used to suffer the deepest gap between rich and poor. Now it is the only region narrowing the divide. Upwardly Mobile: Middle-class Brazilians” www.newsweek.com/id/67850 NEWSWEEK Nov 12, 2007 Issue

[24] Mike Haynes, Theses on the Balkan War, “Capitalism is inherently a competitively expansionist and therefore conflict ridden system” Issue 83 of INTERNATIONAL SOCIALISM JOURNAL Published Summer 1999 Copyright © International Socialism, pubs.socialistreviewindex.org.uk/isj83/haynes.htm/ accessed March 3, 2008. “The optimism that the end of the Cold War might lead to a new world order has been shown to be false. The hope that it would release a peace dividend that would enable a new generosity in international relations has been belied by experience, as some of us sadly predicted it would.3 Though the arms burden has declined, there has been no outpouring of aid to Eastern Europe, no new ‘Marshall Plan’. The result has been that the burden of change has fallen on the broad masses of the population, wrecking lives across the old Soviet bloc in general and in one of its poorest components in south eastern Europe in particular. According to the World Bank, the number of people living in poverty (defined as having less than a day) in the former Soviet bloc has risen from 14 million in 1990 to 147 million in 1998.4 Worse still, the advanced countries have continued to reduce further the miserly sums they devote to aid to the even poorer areas of the world. The OECD countries are rhetorically committed to an aid target of 0.7 percent of their output. In 1990 they gave 0.35 percent, and by 1997 the figure had fallen to 0.22 percent, with the United States under this heading giving 0.09 percent of its output, a figure in startling contrast to the expenditure devoted to destruction.”5

[25] Readings p. 46 “There is a tale, “The ring of Gygnes,” … could any man resist the temptation of evil if he knew his acts could not be witnessed?”

[26] Readings p. 58 “Attendance at Klan meetings began to fall … of all the ideas Kennedy thought up to fight bigotry, this campaign was clearly the cleverest. … He turned the Klan’s secrecy against itself by making its private information public: he converted heretofore precious knowledge into ammunition for mockery.”

Some of the research in this paper on piracy, was provided by Jeremy Hansen of Seattle, Washington, USA. Mr. Hansen’s email regarding economics served to inform me on this topic. Teacher: Glenn Von Tersch.

The Emerging Dilemma Of Ebook Piracy

6766593647_8e9c2f2a61

We’ve all heard about the plagues that face the music and movie industry with respect to digital piracy. Ever since the advent of MP3s, free music has been abundantly available to those who choose to download their music at no cost.

By choosing to get the music for free, such as on a platform for sharing files or a torrent website, this definitely puts a hurting on the sales of a lot of artists. The same is true with the movie industry when the movies are recorded first by movie pirates before they upload them to the sharing platforms.

Most recently, it seems like this problem has spread to yet another medium. All of a sudden, e-books are now being shared via this means and it seems that the issue may be growing.

So many books are being put in digital form and it is quite easy to get them by going to a torrent or file sharing site and downloading them illegally without paying anything.

Tablet PCs and the Kindle are pretty popular digital mediums that enable the proliferation of the books through digital means.

This could potentially be a sharp blow to the publishing industry, and people should really consider their actions before taking part in such illegal activity.

Writers are only able to spend the time researching and writing their works because of the sales they can expect down the line. If the industry takes a hit, we may be left with a world devoid of much high quality writing as a result.

It is my belief that almost all of us do realize that we would surely be in a bad position if that should occur, so the best thing to do is to stop this illegal activity if you are doing it.

Throughout the second quarter of 2009, e-book sales went above $ 37 million and, because of that, regulators are going to be made to deal with this issue as the use of e-books keeps growing and growing.

Besides publishing, the writer additionally regularly contributes articles on metal storage shelves and glass display shelves.

006
internet piracy
Image by Alrunia
as far as I know, this one is FACTUALLY INCORRECT. so, you know, you probs don’t want to use it anywhere. But it’s a pretty picture so I’m leaving it here anyway.

More Internet Piracy Articles

Media Piracy and Law Enforcement

7099106561_8ddf80db4a

Once upon a time, music played for free on the radio. And you could record a cassette if you wanted to, and you could listen to it as many times as you wanted to, and nobody thought you were a pirate if you shared it with your friends. In fact, this was seen as a way for new bands to break into the market; quite frequently receiving a mix tape would be motivation to buy the album of the band whose song was included.

What little concern there was over music piracy was restricted to “bootleg” tapes made at concerts. Even one of the most outspokenly liberal musicians ever, Frank Zappa, vented in vain at bootleg tapes of his music. He went so far as to include the tape of an interview expressing his anger with this practice at the beginning of his “As An Am” album, part of his “Beat the Boots” project. But even at its most vampiric, the bootleg recording industry was hardly able to suck off more than a single-digit percentage of profits.

But then the Internet happened. And suddenly, through it, the sharing of a home-made recording suddenly became something you could provide to thousands of people instead of one or two friends. Where even the recording of several purchased CDs onto cassette tape was only moderately a big deal before, now it is a major industry.

The media piracy issue is one of the most vitriolic hot-button issues in today’s Internet culture. The major factors being:

* The RIAA. The Recording Industry Association of America may live on in history as being one of the most ineffective measures of copyright protection the world has ever seen. Its methods have been draconian, never once catching a pirate, but relentlessly pursuing everyone from soccer moms to grandmothers to even dead people with a lawsuit for receiving a pirated tune, which in and of itself is not even a crime. Funded by the not-particularly successful record labels and armed with a battalion of lawyers, the RIAA’s practices have so far been futile at stopping piracy and harassing of legitamate users.

* Sony – became the laughing stock of 2006 with the Rootkit Fiasco. Sony included a malicious program on several music CDs, which installed a computer program called a “rootkit” on any computer you stuck them into, for the purposes of preventing unauthorized copying. The attempt backfired two ways: not only did it do nothing to prevent copying, but it crippled the software on the computer by compromising its security layer; any hacker looking to break into a computer need only look for the rootkit and they were in! Sony faced consumer lawsuits for this attempt and had to distribute an uninstaller for the rootkit, which itself was another botch in that it introduced more security holes into the system after patching its own rootkit. Sony lost millions of customers with this fiasco, many of whom swore publicly that they would never trust Sony again.

* The DMCA. The Digital Millennium Copyright Act is the United States copyright law which both criminalizes production and dissemination of technology, devices, or services that are used to circumvent measures that control access to copyrighted works and criminalizes the act of circumventing an access control, even when there is no infringement of copyright itself. This law has since endured no end to controversy, and is in the process of being reformed. The DMCA is said to be anti-competitive; because it gives copyright holders and the technology companies (including the ones convicted of monopolistic practices under anti-trust laws) that distribute their content the legal power to create closed technology platforms and exclude competitors from inter-operating with them. Once again, DRM technologies are clumsy and ineffective; they inconvenience legitimate users but do nothing to stop pirates.

The whole problem with copyright protection stems from the haziness of defining at what point someone has broken the law. Say I bought an album on tape cassette, brought it home, and played it on my stereo so that my whole family can hear it. I’m not a pirate yet. I upgraded my stereo to a new model and copied that album to a compact disk so that my new stereo can play it. Obviously, I haven’t stolen anything here, but now I might be breaking a law intended to stop me from copying it for piracy purposes. If I play it so my whole family can hear it in the living room, that should be no different from if I made a separate CD copy for each member of my family so they can all listen to it in their bedrooms with their headphones on. Am I a pirate now?

The further problem is that digital protections against copyright are platform and player-specific. There has been a whole quagmire of different devices such as the Apple iPod, Microsoft Zune, handheld game consoles, cell phones, and other devices capable of recording, storing, and playing back music. These features are sold to us as benefits of the device, and yet when we get them home we find that we have to pay for the song some six times to be able to listen to it on each device – if indeed (as is seldom the case) the song has even been ported to that platform! Subscribing to a DRM-protected device further restricts the user’s freedom to switch to a different device – you’re locked in, and would be breaking the law if you moved the media from one device to another – even if you, yourself, wrote and recorded that song at home!

The turmoil over media piracy isn’t likely to end any time soon. Fortunately, the legal system has so far left the enforcement of copyright concerns to private industry, which isn’t doing such a hot job of enforcing copyright anyway. Consider that any country in the world can host any media pirate and in fact several countries do just that, with no laws to stop them. Pirated media is very big business in some countries, not because they want to steal, but simply because they want that media to play on their own independently produced digital devices. Remember when you could just buy a record and drop it on any record player and it would just play?

Freelance writer for over eleven years.

Uniforms Formal Clothing Uniform Scrubs

CISPA – The solution is the problem
internet piracy
Image by DonkeyHotey
CISPA – another bad law that undermines citizen rights while purporting to solve a problem.

"They" won’t be satisfied until they completely bypass the 4th Ammendment. "The right of the people to be secure in their persons, houses, papers, and effects, against unreasonable searches and seizures, shall not be violated, and no warrants shall issue, but upon probable cause, supported by oath or affirmation, and particularly describing the place to be searched, and the persons or things to be seized." This is part of a never ending rain of over broad legal maneuvers designed to limit citizen’s rights of property and free speech including: SOPA, PIPA, ACTA, the DMCA, Sonny Bono Act and more.

Read more about it: CISPA Isn’t ‘Son of SOPA’ (But That’s Not Saying Much) by Brock N. Meeks on Wired Threat Level.

The source image for the truck in this cartoon is a Creative Commons licensed photo from Joelk75’s Flickr Photostream.

More Internet Piracy Articles

How Music Libraries Were Transformed By The Internet

103846888_2acc90e387

As with any new, widely accessible invention, the internet was feared for its easy and quick distribution of items and ideas. Many music labels and artists set forth an endeavor to prevent the use of the web as a means to spread their creations illegally. However, the progressive internet and those who inhabit it could not be stopped.

Music studios are beginning to see that in actuality a major benefit has arisen from this excited wave of free-sharing. More bands than ever before are turning a profit that may otherwise have been expected to fail, or would never have gathered attention at all. People with a love for genres outside the easily accepted norm have created hundreds of self-categorized sub-genres that make demands for sound that popular radio wouldn’t have given a chance.

With internet acting as a proliferation zone for both standard genres and subgenres, personal audio libraries are becoming extremely diverse. Although illegal downloading is still prevalent within society, producers have taken notice of the possible marketing techniques through free song downloads. Many companies are now offering free song samples and limited time specials to customers as an incentive for further purchase.

The success of many small businesses that moved online gave much needed confidence to larger companies to follow suit and make the journey along the virtual highway. Apple has released their iTunes Store, a program that one can download online, allowing customers to make large or small purchases of many different songs and albums. The iTunes Store allows a person to select only the songs he or she wants from a particular album without requiring the person to purchase the whole album.

Connection to the world-wide-web has also made the library itself a variable tool. In years past, there was only the default music player that came equipped in the software of the computer itself, but now many different programs compete for the most popular install online. Some provide the music in stores, connect to a portable device like an iPod, burn disks, shrink file sizes, organize, and find all information for an untitled MP3. These programs have also inspired easier creation of independently made music from home that can be quickly shared with the world with a simple click of the mouse.

The internet has proved itself to be a guaranteed source of endless possibilities for many people and industries. The transformation of music collections from a physical library of records, cassettes and CDs, to an intangible virtual form has the web to thank. Even though there are those who see the online virtual music libraries as a deviation from the norm, there is no doubt that internet connection will continue to change how people use them.

This article has been written by the author, Eric James. Should you require anymoreaccupuncture treatmentsplease visit his acupressure weight loss resources!

To every iTunes Music Store sucker, thanks a billion
internet piracy
Image by Thomas Hawk
ABC News: iTunes: One Billion Served Crank up the old PR and spin machine. Apple today announced their one billionth iTunes download today. The song? Speed of Sound by Cold Play.

"Over one billion songs have now been legally purchased and downloaded around the globe, representing a major force against music piracy and the future of music distribution as we move from CDs to the Internet," said Apple CEO Steve Jobs.

Personally I’ve never bought an iTune and I don’t own an iPod. I think Apple’s DRM is awful and represents a major step back for us all. I think those that are investing in iTune digital libraries are suckers. You are basically betting that Apple’s proprietary DRM laced format will be the standard for the rest of your life. You are paying too much for your music and tying yourself to only Apple products going forward. More innovative ways to play your music may indeed come in the future but unless they are marketed by Apple you will not likely be able to use these devices with your iTunes files due to Apple’s tight proprietary control.

Personally I want nothing to do with it. I still collect my digital music the old fashioned way, I rip it straight from CDs to crystal clear high bit rate DRM free mp3s. These files of course can be played on any device and represent better value in my opinion for today’s consumer.

What happens when the killer phone is finally here? You know the one, built in terabyte of storage, lightening fast file transfer speeds, full satellite radio, a breathalyzer, your car and house key, a tiny little thing the size of credit card with a 12 mega pixel camera on it (hey it’s the future right, we can dream). What happens when this phone is out and you really want it and unfortunately Apple didn’t make it? That’s right, you’re a sucker then aren’t you. I thought so. You paid all that good money for your iTunes and now you can’t put them on your new phone because your new phone threatens Apple’s dominance. So who owns the music anyway? You or them? They do. You bought nothing. You bought the right to play their song on their product. It might work today. But I’m not about to bet that this will be the format du jour 10 years from now.

click here for more: thomashawk.com/2006/02/itunes-one-billion-suckers-served….

I talk about internet piracy.

Subscribe! http://www.youtube.com/subscription_center?add_user=the1janitor
FACEBOOK MEH: http://facebook.com/the1janitor
TWEETER MEH: http://twitter.com/the1janitor
TUMBLR MEH: http://the1janitor.tumblr.com

http://youtube.com/the1janitor

You Can Actually Download Tunes Via The Internet

6720778403_b45bae8451

Truly, if you love music, you are sure to like the ability to download songs on the web. Who wouldn’t? There is no other way to get all of the fantastic music and bands that you love, in one place, at one time, than to download music from the Internet. You will get everything you know and love and can locate some good entertainers that you may never have heard of before.

For those who are fond of a lot of diverse forms of music, there is certainly nowhere else you’ll find such a great assortment of good quality entertainment choices than on the world wide web. You’ll never again have to worry about purchasing numerous compact discs in order to get all of your desired tunes. When you download songs on the web, you are able to pick and choose anything you like.

Exactly how excellent is it that you can make your own personal music soundtrack, out of millions of existing songs? You are able to cross genres and performers, whatever you like. The best means to get started when you want to download songs online is to find a reliable resource for your music. You’ll want to hit upon a site that provides music downloads that are licensed. You can get into a lot of trouble for downloading music that is copyrighted and has not been freed up for downloading.

There are actually copious class action law suits against folks who’ve been downloading music on the internet, dishonestly. Piracy is a especially serious criminal offense and the music community has been fighting for a long time in an effort to end the piracy of Internet downloads. It’s serious business that has landed some otherwise unknowing, unwary and innocent individuals in jail for a long time and paying lots of money in fines.

It’s effortless to find legitimate, legal sources for music downloads. Run a query on your preferred search engine and observe who offers lawful downloads. You will most likely receive a very long list. You can drill down and find exactly what you’re searching for by getting more detailed. If there is a individual artist that you are searching for, type their name in the search field.

It is best to just leave questionable services alone and find one that you can guarantee won’t get you into trouble. You can find the greatest sites for legal music downloads when you run a search on your favorite search engine. Just type in download songs online and you will receive thousands, perhaps millions of hits back. Make sure to check out the top sites that are listed on the search results page.

If you feel you’ll be most interested in having a monthly subscription, shop around first. Make sure that all of the songs and artists and genres you’re looking for are available before you make your purchase. If you can’t find what you’re searching for on the initial site you come to, rest assured, there are a copious amount of others to look into. Keep looking until you discover yourself a music downloading home.

Either purchase tunes individually , buy the whole album on the web or in many cases, subscribe to a month to month service that gives you a larger number of files to download. Whenever you download songs on the internet, it’s a win win situation. You’ll save money and get all the great tunes you love and the labels and entertainers who produce them are monetarily rewarded.

Reserve a couple of romantic comedy through your neighborhood kiosk. There are specific types of kiosks which rent movies.

Listen to George – Stop SOPA and PIPA
internet piracy
Image by DonkeyHotey
"If the freedom of speech is taken away then dumb and silent we may be led, like sheep to the slaughter." – George Washington

Do you want to share a relevant quote? Please do so in comments below.

THE WEB GOES ON STRIKE! Read All About It!

NOTE: After experiencing the day of protest about SOPA/PIP it is clear that the action could better be called a Web Blackout rather than a Strike.

TAKE ACTION! Google has a form.

Full quote: "If men are to be precluded from offering their sentiments on a matter which may involve the most serious and alarming consequences that can invite the consideration of mankind, reason is of no use to us; the freedom of speech may be taken away, and dumb and silent we may be led, like sheep to the slaughter."
From an address to officers of the Army (15 March 1783)

The source image for this caricature of George Washington from a painting by American artist Gilbert Stuart via Yale University Art Gallery and Wikimedia.

Music Piracy

10806053956_1745bb3090

Topple track; Protecting artists from piracy. The debate: Should you give your music away for free these days?
On first impressions, Topple Track looks confusingly like a site for (very delicious) burgers. It’s not however; it’s much more useful than that. It’s even more useful than it is hunger inducing. Topple Track provides musicians with ‘the most comprehensive anti-piracy services on the web’ protecting musicians from the bane of the music industry; the illegal download.

Obviously there are other guys out there who claim to do this, but in comparison, those guys are part timers. These guys are serious! Self professed ‘internet nerds’, they’ve got pretty much every angle covered. Signing up with Topple Track before releasing your song (or before it leaks!) means if people want your tracks… they gonna have to pay!

They don’t just wait around for people to upload the tracks then hope they can delete the links before millions of people illegally download them, they use all sorts of whizz-kid algorithms to find the file’s source and stop it before even it gets on to major search engines.

You think you’d be paying through the nose for a service with this kind of technology, but the prices are insanely reasonable- you could pay as little as $ 3 to protect a track FOREVER. When you think about how much money you could potentially make from a single track if you were getting everything you should, this is an easy-decision investment. It’s something we’re pretty impressed by here at Music Gateway, as we believe strongly in protection for musicians. You’re really not getting ripped off at all with Topple; they’re genuinely doing you a solid.

Now to a record label, using a service like this is a no brainer. But from an individual music producer/ songwriter’s point of view, there are a lot of arguments for and against stopping people illegally downloading. You want people to hear your music- it’s all about exposure right? Ok so people are getting your stuff and not giving you any money. But at least they’re listening to you instead of just One Direction, right? Hopefully they’re sharing your songs with their friends, increasing your reach and just maybe your economical fan will one day part hands with his hard earned cash to see one of your shows. Just maybe.

Man up fellah! Grow a pair! You deserve something in return for the gift you’ve imparted to the world. Have some belief in your self-worth. No you didn’t make the music for the money- but a girl’s gotta eat. If you’re making good stuff and people want to hear it, then it has value and you should claim that. People are only downloading illegally these days because it’s the done thing and so artists are basically bending to mob rule.

Look at Radiohead’s 2007 release ‘In Rainbows’ which they released for free. Radiohead are one of the biggest bands out there, having sold in excess of 30,000,000 records. People want their music, but it turns out they don’t want to pay. Despite the band’s bohemian attitude, despite the fact they trusted their fans to do the right thing, the majority of people downloaded for free. They still made a lot of money from it, but that’s because they’re Radiohead. Smaller bands probably would have gone hungry.

Take another example, Ed Sheeran; now there’s a music career. His album ‘+’ was the number one illegally downloaded album in the UK this year, with an average of 55,512 illegal downloads a month, but he only actually sold a small fraction of that. He says he doesn’t mind, but it’s pretty common knowledge that he regularly sleeps on his mate’s sofas. While this may be a marketing ploy, the figures speak for themselves; he’s making way less money than he should be. What’s the point in being famous if you don’t get the perks? I think TLC spoke for women everywhere when they said they ‘don’t want no scrubs’.

I digress. In this fast paced digital world where the face of the music industry is constantly changing, you never know what could make you the next big thing. The reality is though that the majority of us just want to know when we can have the next big burger. You’ve worked hard on your music, so take some pride in it, value it. It’s the only way that other people will and that could be the key to change. When cultural conscience believes that a song is an expression of an artist’s soul once again, and not just an mp3 file, that’s when there will be a much brighter future for musicians. Overly sentimental? Probably. But if you believe in improving careers in music like we do, then you know that something has to change. Perhaps this is one of the first steps.

I work for MusicGateway.net, we aim to connect musicians globally.

Music gateway is the place to find the right talent and the right projects, improving the way professionals network, connect and find work. We remove time consuming industry legwork so professionals can focus on creativity. MusicGateway.net also ensures security to everyone involved with our secure E-wallet system. Our unique project work-spaces encompass everything required to collaborate and communicate with other creatives.

If you’re looking for work opportunities, career development, people to collaborate with or advice then sign up for free. The music industry is full of barriers, but we’re breaking those down by putting everyone on a level playing-field.

Net Neutrality – Special Interests keep wishing for death
internet piracy
Image by DonkeyHotey
Corporations, government and the courts are continually proposing new threats to Net Neutrality and Internet Freedom, including: PIPA, SOPA, CISPA, ACTA, and now TPP. On top that Verizon V. FCC wants to turn the Internet into Cabletown. Read this: "We’re About to Lose Net Neutrality — And the Internet as We Know It."

The Network Neutrality logo is an image in the public domain from Wikimedia.

Note: I chose 1995 as the date the Internet use was made popular.

Louis CK on internet piracy

I don’t care about those people!!
Video Rating: / 5

Insanity, P90X & Slim in 6: The High Cost of Piracy

6374117981_4914e618d0

The urge to buy or download pirated copies of expensive workout products is strong. If you have the technical savvy, or have found somebody online who’s willing to sell you a knocked off copy for half price, then what’s not to like? Get the quality goods, save cash, workout and get the body you want, all without breaking the bank. Smart? Actually, no, and not just because we retail these products. Read on to discover some very real dangers involved with these activities, and then ask yourself-is it really worth it?

One of the biggest temptations out there right now is to buy a burned copy of your favorite workout from a Chinese vendor. They’ll sell them to you for almost half price, and promise you that you’ll get everything you need in the box. Not true. We’ve had a number of people contact us here at EFR asking if we can sell them the workout calendar, or the nutrition guide, or any other key component of the workout that didn’t come with the DVD’s,. Frequently the DVD’s themselves don’t play. We know this for a fact: we ordered a sample from two Chinese vendors out of curiosity. One never arrived, and the second had three DVD’s that wouldn’t play.

What’s even more dangerous is that you’re giving unscrupulous people your credit card information. If you haven’t heard, identity theft is a growing crisis for banks and people who find their accounts wiped clean, and sending your financial information to people with no problem ripping off valuable products is a bad, bad move. Many of these illegal vendors are involved a wider array of criminal activity, and selling your credit card information is probably the least of it. So-ask yourself before you buy knock off products online for ridiculously cheap prices-is the high chance of identity theft and incomplete or missing products worth the money you’ll save?

Another avenue that people take is to download these workouts from the internet for free. Of course, you’ve probably already heard about all the viruses out there, and how they’re embedded in these popular products. How millions and millions of computers are now enslaved as ‘zombies’ to hackers who use their combined processing power and online capabilities to attack big, secure targets. This isn’t alarmist talk-google any of the terms I just mentioned, and you’ll pull up a number of reports from CNN, the NYTimes, etc. Downloading large, popular programs is a fast track way to infect your computer. Further, these downloads don’t come with all the required materials. No Nutrition Guide, no workout calendar, none of the other supplemental and vital information that comes with the authentic package.

Of course, the greatest damage won’t be done to you, your identity or computer-it’s being done daily by thousands of people who engage in these practices to Beachbody itself. Now, I’m not trying to make you feel sorry for them, but simply point out a fact. If they lose enough money to piracy, they’ll stop becoming profitable, or as profitable, and will stop making these amazing products. We’ve already heard from them as to how much they’re being hurt financially by all this piracy, and it seems like it will only get worse.

And finally, think about the message these fitness programs promote: P90X, INSANITY, all of them urge you to discover a new form of integrity, of self-respect, to reach deep into yourself and become a new, better you that is proud of not only their body but the determination, courage and effort it took them to get there. How can you begin such a journey if it starts based in theft and ripping off the very trainers and people who are seeking to help you realize your goals?

Piracy. We’re warned against doing it so much that we tend to tune those warnings out, and hear instead, ‘Blah blah blah’. But piracy has very tangible, real consequences, as the hundreds of thousands of people who experience identity theft can attest, or the ruined computers and the help they give hackers show, or the general disrespect to both yourself and these incredibly trainers that stems from ripping them off despite all their hard work. If you’re tempted to steal a copy of these workouts-don’t. Start this journey with integrity, because trust me, it’s truly, truly worth it.

An excellent way to stay on track is to ensure that you get the right nutrition–try Yoga Earth products for healthy, balanced post-workout shakes! Even better, cleanse your system with a Bazi Antioxidant Drink, which will cleanse your system with the power of 8 super fruits!

Spirit of Justice in America
internet piracy
Image by DonkeyHotey
First they came for our search history, then they came for the open Internet, and then they came for our public spaces.

Imagine a future where all spaces, actual and digital, are privatized. In this world you will always be operating under terms of service rather than the Rule of Law. The same click-away-your-rights protocol that currently infects website, app and software usage will be brought to the actual world. Everything you see, hear, feel, and smell in these environments is subject to copyright. Your right to photograph, video, write about or in any way reproduce or share anything will be severely limited.

As you enter a mall, a highway, a doctors office, a privatized park (like Zuccotti Park), a subway, a movie theater, an airplane, a grocery store, a university, or any privately owned space, your communications device receives a terms of service request based on your location. You will be required to accept the terms of service to be eligible to enter the space.

You won’t be given permission to access if you are undocumented, have been convicted of a crime, have a low credit score, don’t have insurance, are on some terrorist/protestor/copyright infringer watch list or don’t have a recognized device. "No shirt, no shoes, no chip, no service." "We reserve the right to refuse service to anyone." If you don’t want to live by the rules, then you always have the freedom to… stay home… move to another country… change the law, or whatever.

If you attempt to enter the space without accepting the terms of service you could immediately be e-ticketed. Now you will have to appear in court or pay a fine. The same holds for copyright violations. Three strikes and you are immobilized, apprehended and escorted straight to the privatized prison. You won’t see a day in court or be tried by a jury of your peers. You’ll be lucky if you are entitled to redress your grievances in front of a corporate hired arbitrator. You’ll stay in prison until you serve your term and emerge in debt for the cost of your conviction, incarceration and probation. You’ll loose the right to vote. Your prospects will be diminished.

In this future we will no longer be citizens, we will no longer even be consumers, we will become users trading our liberty for the right to work and shop.

This scenario may be extreme, but it suggests how the never ending march of privatization and robo-justice could result in a world where we justify every breech of liberty by citing the property rights of corporations. The rights we give up in the so called digital world are real rights and are setting precedents to be used against our rights in the "real world."

The cellular network is accessing the real Internet. It should not be a corporate wild west where Net Neutrality does not apply. The Internet is part of the real world where our constitutional rights must be upheld. We must be less forgiving of business practices for digital goods that restrict our rights and prevent the creep of these practices into the non-digital realm.

Another step in this escalating process of corporate control is SOPA, aka the Protect IP Act, which will bring less liberty and more robo-justice for all in the name of reducing copyright infringement and piracy.

Read Senator Ron Wyden’s SOPA statement where he warns of severe repercussions to a Free and Open Internet if bills are passed."

You can read a Senate version of the bill in this PDF.

Sculpture of the "Spirit of Justice" from the Great Hall, 2nd floor of the Department of Justice in Washington D.C. The artist, Carl Paul Jennewein, created this aluminum sculpture in 1935. The dimensions are 12′ 6" tall x 48" in diameter. The CC image used in this post is from my Flickr photostream. The source for this image of the "Spirit of Justice" is a another great photo by Carol M. Highsmith and available via the Library of Congress.

The image has been cropped, exposure increased, contrast increased, and the color is adjusted. The "Spirit of Justice" is holding the letter "INC" the abbreviation for incorporated.

Copyrights Piracy On The Internet

6374115635_be1c72d4ac

What do you mean by Copyright? Copyright is the form of safety provided by laws of United States to authors of the “unique works of authorship” that includes dramatic, musical, literary, creative, and architectural with few other logical works.

This safety is accessible to be published as well as unpublished works.
Material in “public domain” is rational property, which will not come under the copyright laws.
Almost all work prior to 20th Century is not at all copyrighted. United States Copyright Office has placed together very clear summaries of copyrights.

If you have made some original work, and you have published it online, you are automatically granted the copyright to that particular work. Others might not make use of your work apart from very clear rule, established in law, though you did not file for copyright at US Copyright Office. If your work is copied as well as published online by the copyright infringe, then there are some remedies accessible. They are cheap and simple to use. If you wish to recover certain damages against somebody who has dishonored your copyright, you have to register your work with US Copyright Office or if somebody has copied as well as republished your content, plus you want to discontinue their web page from emerging on Google, Yahoo, MSN, and other search engines, or else you want to have their website taken down from the Internet this are good enough in the majority cases.

Internet and Copyright:
“The Internet is characterized as one of the largest dangers to copyright from its inception. Internet is soaked in information, lots of with unstable degrees of copyright security. The copyrighted works on Net comprise of news stories, graphics, pictures, novels, screenplays, software, Usenet text and email. In fact, frightening actuality is that about everything on Net is secluded by the copyright law. That can cause problems for unfortunate surfer.

What is secluded on WWW?
Unique underlying design of the Web page and contents includes original text, audio, video, links, graphics, html, vrml as well as other exclusive markup language series. List of different Web sites compiled by the individual or organization and all the other unique elements, which make up original nature of a material.

When making a Web page, you will be able to link to some other Web sites you can use free graphics on the Web page. If graphics are not presented as “free,” they must not be copied devoid of permission.

When making a Web page, you will not be able to put contents of some other person’s or groups website on your particular Web page. You can copy and paste information as one from different Internet sources in order to make “your own” article. Slot in other people’s material, like e-mail, in your personal document, without any permission. Also forward someone else e-mail to a different recipient without permission. Change context or edit somebody else’s digital correspondence in such a way that it changes the entire meaning.

Lots of aspects on the issue of copyright as well as Internet have still not determined. This information, should serve as very useful guide in order to help you stay away from violation of the copyright rules and pitfalls of unintentionally plagiarizing somebody else’s material.

The Online
Copyright Handbook
covers scores of issues and breaks them down so that you
can really use the information!
Build Your Website inbound links for 1$

SOPA = Less Liberty and more Robo-Justice For All
internet piracy
Image by DonkeyHotey

SOPA, aka the Protect IP Act, will bring Less Liberty and Robo-Justice for All.

Senator Ron Wyden’s "SOPA Statement Warns of Severe Repercussions to a Free and Open Internet if Bills are Passed"

You can read a Senate version of the bill in this PDF.

Sculpture of the "Spirit of Justice" from the Great Hall, 2nd floor of the Department of Justice in Washington D.C. The artist, Carl Paul Jennewein, created this aluminum sculpture in 1935. The dimensions are 12′ 6" tall x 48" in diameter. The CC image used in this post is from my Flickr photostream. The source for this image of the "Spirit of Justice" is a another great photo by Carol M. Highsmith and available via the Library of Congress.

The image has been cropped, exposure increased, contrast increased, and the color is adjusted. The "Spirit of Justice" is holding a web page of the Protect IP Act pdf.

Find More Internet Piracy Articles