hollywood dreams

Transcription

hollywood dreams
hollywood dreams
a ‘three strikes’ policy put to the question
hollywood dreams
contents
Foreword...................................................................................................... 3
Executive Summary. ................................................................................ 4
Introduction................................................................................................. 4
Background.................................................................................................. 5
The rights under threat. ......................................................................... 5
File sharing.................................................................................................. 6
IP addresses................................................................................................. 7
What do the content owners want?................................................. 8
Related implications.............................................................................. 10
What’s good for the goose… ............................................................. 10
Onus of proof reversed........................................................................ 11
Proportionality......................................................................................... 11
Can it be done?....................................................................................... 11
Comments from around the world................................................. 14
NZ. ................................................................................... 14
UK. ................................................................................... 14
Sweden.......................................................................... 14
USA.................................................................................. 15
France............................................................................. 15
Contact........................................................................................................ 16
About iiNet................................................................................................ 16
References................................................................................................ 17
The material contained in this paper may be freely copied and/or reproduced providing any content used is
clearly referenced as being by permission of iiNet Ltd.
2
a ‘three strikes’ policy put to the question
hollywood dreams
foreword
Hollywood Dreams was prepared some time ago, however a decision was taken by iiNet management (during
2009) not to release the paper following commencement of proceedings in the Federal Court.
In light of recent developments in Ireland and the UK, iiNet has decided to release the Hollywood Dreams paper
to bring into the open what iiNet believes to be some major Australian issues surrounding a potential ‘Three
strikes protocol’.
In Ireland, media reports indicate that a private agreement has been made between Eircom (an Irish ISP) and
content owners to implement a ‘Three strikes protocol’. The Irish courts have now examined this agreement and
ruled that it poses no difficulties in respect of that country’s privacy legislation. It is expected that content owners
will now want to extend that protocol (by agreement) to other Irish ISPs. It is not expected to be introduced as
mandatory legislation.
In the UK, a ‘Digital Economy Bill’ also looks set to become law and, although it is touted to force ISPs to
‘cooperate’ with rights holders, it really delivers little more than is already available to rights holders in Australia.
The Bill indicates that:
• Rights holders may apply for a court order to learn a subscriber’s identity to aid investigations (as has been the case in Australia for years);
• An industry code ratified by industry regulator – OFCOM - must first be produced;
• Commercial agreements must be in place between the rights holder and the ISP to determine such things as:
◦◦
Limits applied by the ISP on the number of enquiries per period;
◦◦
Cost recovery arrangements for ISPs from rights holders.
Given that various jurisdictions have different governing legislation and different political agendas, it is not
always possible to make a simple comparison between those jurisdictions.
Clearly this paper indicates that iiNet does not support implementation of a ‘Three strikes protocol’ in Australia.
We do not believe that switching the internet off will have any material impact on the incidence of content
piracy. It is, at best, a clumsy shotgun approach to halting infringements. As Justice Cowdroy has commented,
termination goes well beyond the prevention of copyright infringement and will negatively and materially affect
a broader range of individuals who are not involved in infringements. Termination of internet access is clearly
not provided for under the Copyright Act and the community generally expects that it will not be prevented from
using commercial, educational, communications and entertainment applications enabled by the internet as a
result of unproven allegations of infringement. It follows that if termination is disproportional, ineffective and not
provided for in law, it is largely pointless.
We believe, therefore, that as a matter of common sense, common law and community expectation that a ‘Three
strikes protocol’ is unacceptable and should not be considered in the Australian context. Prosecutors such as
AFACT will continue to say “that’s not good enough” but until rights holders abandon the ‘Charlie Chaplin’ era
business model and embrace digital distribution techniques that exploit the power if the internet (rather than
demanding it be switched off), the gap between ISPs and rights holders will continue to create tension.
3
a ‘three strikes’ policy put to the question
hollywood dreams
executive summary
This is a discussion of the principles behind, and indeed the fundamental flaws with, a ‘three strikes’ policy
proposed by copyright owners. This proposal relates to the policing of internet-based copyright infringement, at a
time when many countries have already rejected similar policies on the grounds that they simply won’t work.
Whilst this is not a legal argument, issues of legality are certainly brought into play when we consider the
implications this proposed policy would have on both the general public, and the internet industry as a whole.
By examining possible outcomes that would result from the implementation of such flawed policy, we believe
that we can clearly and unequivocally discredit its value.
We also rely on the well-known principle of ‘innocent until proven guilty’ (a constitutional right in many
countries).
This is designed to be a discussion piece to encourage some deeper thinking on the issue, as well as an
educational tool for the general public, many of whom are unaware of how the ‘three strikes’ policy would
impact them as an individual.
introduction
In various jurisdictions around the world, copyright owners have been appealing to governments for what
has often been termed a ‘three strikes’ policy. The approach also seems to be part of the secretive Anticounterfeiting Trade Agreement (ACTA) discussions taking place1.
The content owners argue that, following their allegations (by means of notifications to an Internet Service
Provider of a suspect IP Address2), that an ISP should identify the service utilising the IP address at a specified
time. They demand that the ISP should then immediately notify the account holder of the service that an
allegation had been made against them. Furthermore, the content owners believe that after three such
allegations have been made, the ISP should terminate the service without further evidence.
Many in the community accept this process as fair and reasonable. Such opinion is based
on a series of assumptions about the accuracy of the process and an assumed link
between the temporary IP address and a responsible person. This paper
doesn’t attempt to examine the legal aspects of a ‘three strikes’ protocol,
such as whether an ISP is even able to implement such a protocol while
complying with current telecommunications legislation. Its purpose is
to reflect on what practical steps might be required by the Australian
community if such a protocol were ever introduced.
A sort of thought experiment along the lines of “OK, if we introduce
‘three strikes’ – what do we do to make it work” .
1
http://www.itnews.com.au/News/168549,acta-leak-isps-to-be-bound-by-new-rules.aspx
2
An IP address is a temporary identifier used by ISPs to set up an internet session for a customer. It
helps define where, on the internet; a service is located and is used for traffic routing.
4
a ‘three strikes’ policy put to the question
hollywood dreams
background
The problem...
According to copyright owners, in Australia alone, millions3 of pirated copies of copyright works (films, music,
TV etc) are being distributed annually. These works have been digitised (either legitimately or not) and are
thus easily copied from camera to computer or, from computer to computer, either via physical media like
discs, or over the internet using the capability of modern broadband.
This may have been less of a problem when blank DVDs cost almost as much as a recorded one, mobile
phones were only used for making phone calls and 10kg cameras were shoulder mounted. In 2010, however,
technological advances have turned the average pocket or purse into a recording studio.
Production houses suggest that security is now tight, but complaints continue that leaked copies are still making
it into the hands of pirates prior to first screening. Once screened, inferior quality rip-offs are also being filmed
in cinemas by thieves with miniature cameras, which are then rapidly shared via the internet or at dodgy market
stalls, the world over.
Movie studios are estimating Australian annual losses in the hundreds of millions4, due to illegal copying.
Without doubt, most outside the industry agree that piracy must be affecting revenues, although many are
very sceptical about an argument that every pirate copy equates to a lost sale.
This problem faced by content owners is not helped by the fact that, for over 100 years5, we have been treated
to free broadcasts and ever wider choices of, firstly music and later, movies and TV shows. It’s not necessarily
intuitive to many people that a movie which has been freely broadcast to the world should be paid for.
In a world in which manufacturers openly target consumers with devices purposely developed to copy that
‘free’ content, one can understand why many may be confused by (or suspicious of) the conflicting messages
being circulated.
the rights under threat
(or, the list of combatants)
It’s worth considering at least three sets of rights in connection with the ‘three strikes’ idea.
One - Copyright infringement is easy to grasp. Artists, creators, authors have well established rights to the fruits
of their creative labour, or rights to the proceeds of content which they have legitimately purchased. These
rights are generally recognised by civilised jurisdictions, worldwide. The telecommunications industry in Australia
absolutely supports these rights.
3
AFACT claim that in 2005, “there were an estimated 11 million illegal downloads of movies” in Australia alone.” Piracy: The Facts, Copyright or
Copywrong in AFACT, accessed 2 July 2009, from http://www.afact.org.au/factsheets/AFACT_Consumer_Guide_Piracy_The_Facts.pdf
4
AFACT claim that “Film and TV piracy rips more than $230 million out of the Australian economy each year.” Piracy: The Facts, Copyright or Copywrong
in AFACT, accessed 2 July 2009, from http://www.afact.org.au/factsheets/AFACT_Consumer_Guide_Piracy_The_Facts.pdf
5
On Christmas Eve, 1906, Reginald Fessenden used a synchronous rotary-spark transmitter for the first radio program broadcast, from Ocean Bluff-Brant
Rock, Massachusetts. Ships at sea heard a broadcast that included Fessenden playing O Holy Night on the violin and reading a passage from the Bible.
(http://en.wikipedia.org/wiki/Radio)
5
a ‘three strikes’ policy put to the question
hollywood dreams
Two - In Australia, consumers’ rights are also well understood. Legislation and privacy protocols are ‘front of
mind’ for most organisations to the point that some believe privacy provisions sometimes get in the way of an
individual conducting their private affairs. Most of those same individuals also agree that their own rights to
privacy are non-negotiable and that the occasional frustrations of trying to do business on behalf of someone
else, in such an environment, are a reasonable price to pay.
As individuals we all have the right to the presumption of innocence. That is, where a person is accused of an
offence of some sort, then there is a requirement in our Australian legal system that guilt must be proven.
Accusations and allegations by themselves are not sufficient to establish guilt. This seems common sense;
however it is fundamental to our legal system. The telecommunications industry also supports these rights,
without hesitation.
Three - ISPs have the right to conduct their businesses without being required to take on additional
responsibilities outside their role as a common carrier. Just as Australia Post is not held liable for the contents
of every package or mail item passing through the mail system, ISPs and telecommunications carriers have the
right to carry customer traffic without being made accountable for the contents of every digital packet they
deliver. If carriers were responsible for every act conducted using telecommunications, their systems would be
shut down in self-preservation. Where obligations are imposed under Australian law, the telecommunications
industry readily cooperates with authorities.
file sharing
Using the internet in conjunction with freely available file sharing software, internet users are able to share
files saved on their computers. Much of the activity on the internet consists of customers going to websites
and ‘doing their thing’ there. This could be a social networking site or an online banking service, looking up
movie timetables, buying a music track or bidding for something on an online auction site. One person visiting
one website at a time.
With file sharing, the software makes use of location addresses
commonly used for internet applications. These
addresses are referred to as Internet protocol addresses
or just simply;
‘IP addresses’.
The ability to share or distribute files has been made much
easier with the availability of ‘Bit Torrent’ software, developed
specifically for this purpose.
Typically, files obtained by file sharing (using ‘bit torrent’
software) are quite large. Many files are megabytes or
even gigabyte in size. NASA’s excellent website6 distributes
photographs and video clips in this way.
6
http://veimages.gsfc.nasa.gov//7104/world.topo.bathy.200405.3x21600x21600.panels.png.tar.torrent
6
a ‘three strikes’ policy put to the question
hollywood dreams
Time Warner has used a similar approach for movie distribution and has praised the elegance of the software
for just this purpose7.
The efficiency of this software is proving to be just as useful for unauthorised activities as it is for legitimate
distribution. The efficiency of file sharing piracy has also led despairing industry leaders like Sony Chief
Executive, Michael Lynton to reportedly declare, “I’m a guy who sees nothing good having come from the
Internet. Period.”8
Ironically, Sony is also a leading producer of technology designed specifically to record and burn high quality
content to DVD9.
IP addresses
These are a useful part of the systems which make the internet run. With so many computers connected to
the web, it’s important to know how to get stuff from ‘A’ to ‘B’ and where ‘A’ is and where ‘B’ is. The IP addressing
scheme most widely in use in 2010, is version 4 (IPv4)10. It uses a numeric address, written as four numbers
separated by periods. Each number can be zero to 255, a bit like this: 1.160.10.240. That’s a few more than 4
billion possible addresses. Not really enough for the world’s population to have one each.
IP addresses are issued to ISPs who allocate them as needed. Many are shared between users and many
use dynamic allocation, meaning IP addresses change from time to time. This doesn’t create an issue as IP
addresses aren’t allocated to customers like phone numbers. Most customers wouldn’t know the IP address
currently connected to their service. If a customer requires a fixed or ‘static’ IP address, they can arrange for
that to be provided, usually at a price.
IP addresses are readily and frequently shared on networks. A private network in a business or home
environment can easily get by with only one internet connection, which is then accessed
through an in-house network.
Consumer grade DSL routers, retailing for a hundred dollars or so, can
readily share a DSL connection (with a single IP address), between
hundreds of different computers using wireless access. Coffee shops
and fast-food stores routinely provide wireless access for customers using
this method. Over the course of a single day, a wireless router in a CBD café
might share its IP address with hundreds of different laptops or other wireless
devices like Blackberries, iPhones or other smartphone devices.
7
http://www.timewarner.com/corp/newsroom/pr/0,20812,1192450,00.html
8
http://www.p2pnet.net/story/22376
9
http://www.learningcenter.sony.us/assets/itpd/discburners/dvdirect/
10
A new ‘version 6’ is slowly being adopted as the internet is said to be running out of v4 addresses for the number of different locations
on the net. IPv6 could provide 3.4×1038 IP addresses, or more than 600 quintillion IP addresses per square metre of the planet. That’s a
lot.
7
a ‘three strikes’ policy put to the question
hollywood dreams
A business providing internet access for employees may have
thousands of computers ‘behind’ a corporate internet gateway with its
single IP address.
Wireless routers have been very useful in extending the limited numbers of
IP Addresses in an IPv4 world. Sharing a single IP address amongst multiple
users11 has worked well. In addition to allowing access for authorised users,
though, a further problem arises when unauthorised users access the wireless
router and steal internet access.
Modern routers come complete with reasonable quality security software which allows users to log on
if they have the appropriate password. Unfortunately, in an era of plug-and-play technology, many routers
just get plugged in, powered up and allowed to run unsecure. This can mean a few unexpected guests taking
advantage of another’s internet service while they are within radio signal range. From the number of calls12 to
support desks asking for assistance to set up secure wireless routers, it is clear that unauthorised use of private
routers is not uncommon and, by extension, neither is the unauthorised access to IP addresses allocated to
those internet services. iiNet has cooperated with police to investigate fraudulent use of internet access (as a
result of unauthorised wireless access) on a number of occasions.
Investigators could easily uncover IP addresses by use of freely available bit torrent software. It is a feature13
of file sharing software that the locations (IP addresses) of the files being sought (say, the latest movie) are
disclosed by the software while in use. While this may be interesting, there is no way to directly link an IP
address to a specific person for further investigation. Assumptions can be made, but if a proprietor was
running a coffee shop or a small business and providing wireless internet access for customers when their IP
address came up on somebody’s list, they would be at a loss to point to a suspect.
what do the content owners want?
The solution put forward by proponents of ‘three strikes’ is this:
1. They will search the internet for copies of files containing their copyright material. Typically these will be
movies, TV shows or music performances.
2. Where they locate copies of these files being made available for sharing, they will attempt to download
the contents. In the process, they will take note of the IP addresses of the computers providing access to
unauthorised files. (Note that the IP addresses are not of ‘downloaders’ , they are the addresses of the
services where the file is being made available)
3. They will then identify which ISP had been allocated with the specific IP address and notify that ISP that an
infringement has been detected. In this scenario, it is the investigator who has downloaded the file.
11
The 802.11 standard used in most routers today allows up to 254 wireless connections on the same router.
12
iiNet has a daily average of 90 customer calls relating to securing wireless connections - that’s 32,850 every year.
13
http://wiki.theory.org/BitTorrentTrackerProtocol
8
a ‘three strikes’ policy put to the question
hollywood dreams
Content owners have indicated that they:
1. Require the ISP to similarly notify their customers, using the publicly sourced IP address as a means of
identifying the customer.
2. When three such notifications have been forwarded, the content owners demand that the ISP should restrict
or disconnect the service identified by the IP address.
3. Require the ISP to accept liability for:
a. Any costs associated with carrying out the content owner’s demands;
b. Actions taken by users as a consequence of the loss of service (remembering no guilt has been proven).
It is important to note that content owners don’t want to pay any of the costs associated with any of this
prosecution process, going so far as to describe such an idea as a “… burdensome shifting of costs…”14.
There are some significant hurdles in the way of implementing such a plan, however.
1. An IP address does not match to a person - ever. They match to services. Internet services are very often a
shared service in a given premise, like water, power and other services. Disconnecting an internet service will
affect all those using the service. It is unreasonable to assume that the occupants of entire premises should
be punished on the basis of the actions of a single unidentified user.
2. The IP addresses identified by bit torrent software indicate a service where a file is available. The file could
exist, quite legitimately, at that service, although it is obviously unacceptable to advertise its availability for
download, the file isn’t necessarily a pirate copy.
3. Modern internet devices (like wireless routers) can provide wireless access outside the premises - which is
a common occurrence. Disconnecting premises because an unauthorised user gained access and used the
service for further unauthorised purposes is unreasonable.
4. Businesses commonly make free wireless access available either to visitors, employees15, students16 or
customers17. Municipal authorities also often make free wireless access available to city visitors18, as do
sporting venues19. Each service would be provided with a single IP Address, yet content holders demand
that these entire premises would have to be disconnected on the basis that an IP address was identified by
their investigators.
5. There is no ‘cost: benefit’ equation to support such argument because the benefits all accrue to one party
(the rights holder) and the costs all accrue to an unrelated party (the ISP).
6. The process goes against Australian practice by inverting the principle of ‘presumption of innocence’ to a
‘presumption of guilt’.
14
Record Industry of NZ: http://computerworld.co.nz/cw/articles/230209_article.pdf
15
iiNet employees are given subsidised home internet as an employee benefit
16
UWA students are given subsidised internet: http://www.its.uwa.edu.au/student/internet
17
Starbucks offers wireless internet to its customers: http://www.starbucks.com.au/en-AU/_Wireless/
18
City of Perth Heritage Trail: http://heritageperth.com.au/projects/hi-tech-heritage-trail
19
Internode offers internet access at the MCG: http://www.internode.on.net/news/2009/03/130.php
9
a ‘three strikes’ policy put to the question
hollywood dreams
related implications
Currently, law enforcement agencies work in close cooperation with ISPs and other carriers in order to
investigate and prosecute offenders. Where these agencies require information or assistance from ISPs,
they obtain a warrant or court order as required by the applicable legislation. They do not have an ability or
freedom to bypass such provisions.
In the event that Hollywood studios were provided with the ability to bypass Australian laws, many other
entities, whether law enforcement or not, would also argue it was unnecessary for them to meet the
requirements of
the Act.
what’s good for the goose…
Some thought should be given to other scenarios where a person may be offended
by another internet user. Is it reasonable for a similar policy to apply (obliging
ISPs to forward notices and disconnect) when cyber bullying, cyberstalking, defamatory remarks online or harassment by email
are notified by
the offended?
As a further (perhaps more far-fetched) extension of this
approach, just as content owners are able to easily harvest
the IP addresses of internet users, so too are the operators of
any website. These might consider it attractive to be able to
take the IP addresses of any visitor to their website (which is
easily accomplished) and then demand that ISPs forward messages to
the services with which those IP addresses were temporarily associated.
onus of proof reversed
In Australia, as with most civilised democracies, the onus of proof is with the accuser, not the accused. Recently,
New Zealand rejected a similar ‘three strikes’ policy on the basis that the proposed legislation was simply ‘guilt
by accusation’.20
In the three strikes approach (being sought by content owners), it demands that an anonymous IP address
(which might be gathered by an offshore investigation of Australian internet services), is proof of
an offence.
There is no right of appeal, no identification of an offender, no proof of liability and the investigators are
conveniently insulated from redress by the ISPs who are apparently expected to be drafted into the role of
unwilling agents of foreign interests.
It is inappropriate to expect the accused to prove their innocence rather than the more usual obligation on the
accuser to prove guilt beyond reasonable doubt.
20
New Zealand Section 92: http://www.3news.co.nz/Video/Govt-drops-guilt-on-accusation-copyright-law/tabid/423/articleID/96682/Default.
aspx?ArticleID=96682
10
a ‘three strikes’ policy put to the question
hollywood dreams
proportionality
Consider a scenario where a uni student stops every day for a coffee at the coffee shop close to campus. Here she
catches up on emails and browses the net using the café’s wireless internet access. Regrettably, the student also
illegally downloads music from a Lithuanian ‘seed’. Over a month, she downloads four separate tracks, which her
software then shares back into the ‘net, each instance of which is picked up by anti-piracy investigators.
Under the three strikes policy, the coffee shop is identified, blacklisted and the internet access is disconnected.
Not only are the café’s customers affected, but the café owner is now unable to conduct an internet-based
catering and ordering service, on-line banking, (including payroll authorisations), credit card checking, stock
ordering, nor can they make or receive phone calls via their VoIP telephone service.
The business soon fails. All for the sake of four music tracks worth less than $10, pirated by a person who is
totally unrelated to the business.
Most would argue that disconnecting a service is totally disproportionate to unproven claims of piracy, when such
a service is vital to many for much more than occasionally illegal downloading music or films.
Disconnecting an internet service is disconnecting the user from a broad range of legitimate services provided
to both residential and business consumers. These services extend from sites providing medical information,
used by parents to self diagnose family ailments; to an ability to earn an income working from home (with the
promise of ever-more applications and functionality on the national broadband network). An indiscriminate
three strikes policy is clearly unreasonable.
can it be done?
The notion of three strikes appears quite simple at first glance. This is exactly what the proponents of such a
policy seek to promote – the perception of an apparently straightforward and ‘just’ approach. Unfortunately it
can be seen that, once a little thought is applied, a raft of issues surface, requiring more and more policy changes
to the point where the implementation becomes totally impractical. Superficially, it seems a straightforward
response to an open-and-shut case of infringement. But, this is not the case.
Let us consider other issues.
1. An IP address is not a person. The foreign investigators hired by offshore content owners have only an IP
address but still make an impossible leap to ‘a person’(they would say ‘an identified customer’) on the basis
that internet services have IP addresses and internet services also have account holders. Therefore, they
argue, an IP address is the same as an account holder.
Account holders are people or legal entities, aren’t they?
The answer to this is ‘maybe’. There is no obligation on ISPs to formally identify the people who subscribe
to their services. It may be good business practice to require real names, but subscribers routinely
subscribe via internet ‘self-service’ portals, never once speaking to a human21, so could easily subscribe
using something less than a ‘legal’ name.
Unlike banks, ISPs are not required to obtain anything like 100 points of identification in order to activate a
21
On average, there are 2983 unassisted customer sign-ups a month for iiNet alone.
11
a ‘three strikes’ policy put to the question
hollywood dreams
new account. Given this approach, Joe Citizen may create an internet account in his own name, his wife’s,
or even in a fictitious name or an unincorporated business, a club or, a favourite character or some code
that makes sense to him.
As long as the service is delivered and paid for, the ISP is unlikely to be concerned that an account is held
by ‘The French Patisserie’ instead of the more accurate, but less evocative, Victor Ng22. It may be possible to
track an IP address to a service, we may even be able to link the service to an account name, but the name
isn’t necessarily a person. That would take further delving and maybe further assumptions would need to
be made.
So an IP address isn’t necessarily going to lead to a person in a single step.
2. But, let’s ignore all that and press on with the issues – let us assume Victor sets up the patisserie’s service in
his name and is the only user of that service. Further, when notified of allegations of infringements,
Victor puts his hand on his heart, hangs his head and says “Yes, It was me. I should be
punished.”
With that admission; and an apparently accurate identification of the perpetrator,
the service is disconnected in line with the three strikes policy.
Later that day, Victor regrets his admission, goes to the nearest coffee shop
and uses their free wireless connection to log on to the internet portal of a
selected ISP (maybe the same one that disconnected him earlier that day).
He signs up for a new account. To be safe, he uses his middle name (Hugo),
rather than his first name, to sign up.
He may have had a brother (Jules Verne Ng, also a pastry cook) who lived next
door. Jules could have said, “Don’t worry about it, Victor. You pay me half and you
can share my wireless connection”. Either way Victor is back on line and the three
strikes initiated disconnection is ineffective.
So – how do we make the disconnection effective? How do we make the
prescribed punishment stick? It seems pointless to insist on the implementation of a
new regime, with its attendant costs, if it achieves nothing.
Disconnecting the service won’t stop the individual from obtaining internet access unless the person
himself can be banned.
22
This is a fictitious example, our apologies to any real Victor Ng who owns a ‘French Patisserie’
12
a ‘three strikes’ policy put to the question
hollywood dreams
Individuals do not have to personally identify themselves when they connect to the net. Usernames don’t
always match a person’s identity and passwords are commonly shared in households and many small
businesses. If Victor is an infringer, then the network needs some way to identify him and ban him at the
network level – if a three strikes policy really is considered an appropriate response.
3. Apparently, the internet would need to be revised, re-invented, re-built, and re-arranged. It just doesn’t
work in a way that suits content owners23. Instead of allowing folks to remain anonymous and privately
log onto the net, it looks like it should be scrapped and re-built with a pre-requisite personal identification,
verified by a bank-equivalent identity check and made mandatory for all subscribers. It is possible that IPv6
could easily provide every person with their own dedicated IP Address. This could be embedded in a chip,
implanted at birth and then devices capable of logging on to the net would need to pick up the identifying
IPv6 address from the chip before establishing a connection.
It wouldn’t matter whether Victor was at home or at Jules’ house or at the coffee shop, he’ll be identified and
tracked. He won’t be anonymous, he’ll be accurately identified.
Now, let’s assume that we have a fool -proof way of tracking Victor and his infringing internet habits. After three
warnings from the content owners (delivered by his ISP), Victor gets black-listed. His service is disconnected and
the ISP forwards the IPv6 IP address to the Department of Public Safety blacklist where it is available for all ISPs
to see.
So – it could be done in a simple, cheap, pointless, easily by-passed way, or, it could be done in a very expensive,
disruptive, extremely invasive, heavy-handed, draconian way, with only slightly more chance of being effective.
23
”The Internet isn’t free. It just has an economy that makes no sense to capitalism.”
Brad Shapcott, Rule $19.99 of Usenet Rules.
13
a ‘three strikes’ policy put to the question
hollywood dreams
comments from around the world
New Zealand
”In the U.S., it was assumed that repeat infringers would be people who are tried in the court of law. And in New
Zealand, though similar language was transposed, that was not the way it was read. The outcry has been so great
that the New Zealand government has said, ‘Look, we’re not going to enforce this, so we’re going to go back and
rewrite the law.”
Danny O’Brien, Electronic Frontier Foundation
“Section 92A to be scrapped
Prime Minister John Key has announced the government will throw out the controversial Section 92A of the
Copyright Amendment (New Technologies) Act and start again.
... S92 - which requires ISPs to have a code of practice to disconnect “repeat” copyright infringers - was due to go
into force at the end of last month, but at the last minute was suspended by Prime Minister John Key…”
Chris Keall, The National Business Review
United Kingdom
“Internet service providers will not be forced to disconnect users who repeatedly flout the law by illegally sharing
music and video files, The Times has learnt.
...[UK IP Minister David Lammy], who has begun a big consultation entitled Developing a Copyright Agenda for
the 21st Century, said that there was a big difference between organised counterfeiting gangs and “younger
people not quite buying into the system”. He said: “We can’t have a system where we’re talking about arresting
teenagers in their bedrooms. People can rent a room in an hotel and leave with a bar of soap - there’s a big
difference between leaving with a bar of soap and leaving with the television.”
Patrick Foster, Times Online
Sweden
“Internet traffic in Sweden has plummeted after a tough new anti-piracy law was enacted in the country earlier
this week, potentially casting interesting new light on the extent to which illegal file-sharing occurs.
The new law makes copyright holders such as record and entertainment companies to go through the courts to
determine the identities of those suspected of piracy, via their IP addresses.”
Phil Muncaster, IT News
14
a ‘three strikes’ policy put to the question
hollywood dreams
United States of America
“The basics are simple: get caught three times sharing files illegally, and your Internet access gets cut off.
But in a day and age when Internet access is almost as essential as a cell phone or electricity, should the
music industry or Internet service providers [ISPs] have the power to determine who can and can’t get online,
particularly without criminal charges being filed?
Details are hard to come by, and the ISPs aren’t talking, but the ultimate punishment for repeat infringers who
ignore warnings might be termination of Internet access. Internet speed could be slowed for those who ignore
warnings but haven’t quite reached termination level.”
Liza Porteus Viana, FoxNews.com
France
“The Council wrote that the law would impose punishment equivalent to a criminal sanction outside of a judicial
process and without the presumption of innocence. It said, “whereas under section nine of the Declaration
of 1789, every man is presumed innocent until he has been proven guilty, it follows that in principle the
legislature does not establish a presumption of guilt in criminal matters.” The Council further made clear that the
presumption of innocence applies “to any sanction in the nature of punishment, even if the legislature has left
the decision to an authority that is nonjudicial in nature.”
Egan Orion, The Inquirer
“The Constitutional Council ruled that “free access to public communication services on line” was a human right,
and that only a judge should have the power to strike an individual from the Internet.
Council members, who include former French presidents, based their ruling on the preamble to the French
constitution, which lists freedom of communication and expression as a basic human right. “
J.Le Masurier, France24.com
“PARIS — The highest constitutional body in France on Wednesday defanged the government’s plan to cut off the
Internet connections of digital pirates, saying the authorities had no right to do so without obtaining
court approval.
The council rejected the core portion of the measure, under which a newly created agency, acting on the
recommendations of copyright owners, would have been able to order Internet service providers to shut down
the accounts of copyright cheats who ignored two warnings to stop.
The council said the proposal was contrary to French constitutional principles, like the presumption of innocence
and freedom of speech. The latter right “implies today, considering the development of the Internet, and its
importance for the participation in democratic life and the expression of ideas and opinions, the online public’s
freedom to access these communication services,” the Council said.”
Eric Pfanner, The New York Times
15
a ‘three strikes’ policy put to the question
hollywood dreams
contact
Steve Dalby
iiNet Chief Regulatory Officer
p: +61 8 6263 3812
e: [email protected]
Copies available from:
[email protected]
http://www.iinet.net.au/press/releases/20100421-hollywood-dreams.pdf
about iiNet
iiNet was established in 1993 and listed on the ASX in 1999, growing from a small Perth business into the third
largest Internet Service Provider in Australia. The company now supports around 900,000 broadband, telephony
and dialup services nationwide, with revenues of over $450m, and proudly employs over 1400 people in Perth,
Sydney, Melbourne, Auckland and Cape Town.
iiNet’s goal is to lead the market with the best internet access products and then differentiate with genuine, plain
speaking customer service. The company has its own high speed ADSL2+ network reaching around 4 million
households across Australia; the largest Voice over IP network in the country; and is delighted to have led yet
again with BoB™, winning 2009’s Product category at the Western Australian Technology and Telecommunications
Awards.
www.iinet.net.au
16
a ‘three strikes’ policy put to the question
hollywood dreams
references
Brett Winterford, 2010, ‘ACTA leak: IPSs to be bound by new rules’, in itnews: FOR AUSTRALIAN BUSINESS,
accessed 2 March 2010, from http://www.itnews.com.au/News/168549,acta-leak-isps-to-be-bound-by-newrules.aspx
The Australian Federation Against Copyright Theft, 2008, ‘Piracy: The Facts, Copyright or Copywrong’ in AFACT,
accessed 2 July 2009, from http://www.afact.org.au/factsheets/AFACT_Consumer_Guide_Piracy_The_Facts.pdf
Wikipedia, 2009, ‘Radio’, in Wikipedia - The Free Encyclopedia, accessed 2 July 2009,
from http://en.wikipedia.org/wiki/Radio
NASA, 2008, ‘January, Blue Marble Next Generation w/ Topography and Bathymetry’, in Visible Earth: A cataclog
of NASA images and animations of our home planet, accessed 3 July 2009,
from http://veimages.gsfc.nasa.gov//7104/world.topo.bathy.200405.3x21600x21600.panels.png.tar.torrent
TimeWarner, 2006, ‘Warner Bros. Home Entertainment Group Announces Revolutionary Deal to Publish Legal
Film and TV Content Using the BitTorrent Platform’, in TimeWarner Newsroom, accessed 2 July 2009,
from http://www.timewarner.com/corp/newsroom/pr/0,20812,1192450,00.html
P2PNET.Net, 2009, ‘Sony boss Michael Lynton, deconstructed’, in P2PNET.Net: Movies, accessed 3 July 2009, from
http://www.p2pnet.net/story/22376
Sony, 2009, ‘Multi-Function DVD Recorder’, in Sony Learning Center, accessed 5 July 2009,
from http://www.learningcenter.sony.us/assets/itpd/discburners/dvdirect/
Wikipedia, 2009, ‘BitTorrent Tracker Protocol’, in Wiki Theory.org, accessed 3 July 2009,
from http://wiki.theory.org/BitTorrentTrackerProtocol
RIANZ CEO Campbell Smith, 2009, ‘RIANZ comments on Telecommunications Carriers’ Forum’s Internet Service
Provider Draft Copyright Code of Practice’, in Computerworld.co.nz, accessed 3 July 2009,
from http://computerworld.co.nz/cw/articles/230209_article.pdf
17
a ‘three strikes’ policy put to the question
hollywood dreams
iiNet LTD., 2008, ‘Benefits of working with iiNet’, in iiNet: Careers, accessed 5 July2009,
from http://www.iinet.net.au/careers/why-iinet.html
University of Western Australia, 2009, ‘Student Internet and Network Access’, in Information Technology
Services, accessed 3 July 2009, from http://www.its.uwa.edu.au/student/internet
Starbucks Coffee Company Australia, 2009, ‘iiNet Wi-Fi now available at Starbucks!’, in High Speed Wireless
INternet Access, accessed 3 July 2009, from http://www.starbucks.com.au/en-AU/_Wireless/
City of Perth, 2009, ‘High-Tech Heritage Trail’, in Heritage Trail, accessed 3 July 2009,
from http://heritageperth.com.au/projects/hi-tech-heritage-trail
Internode, 2009, ‘Free Internode WiFi now available at the MCG’, in News and Media, accessed 4 July 2009,
from http://www.internode.on.net/news/2009/03/130.php
3News, 2009, ‘Govt drops ‘guilt on accusation’ copyright law’, in 3News: National, accessed 8 July 2009,
from http://www.3news.co.nz/Video/Govt-drops-guilt-on-accusation-copyright-law/tabid/423/
articleID/96682/Default.aspx?ArticleID=96682
Brad Shapcott, 1994, ‘Rule $19.99 of Usenet Rules’, in Net.Legends.FAQ (Noticeable Phenomena Of UseNet) Part
2/4 , accessed 14 July 2009, from http://www.linux.it/~md/usenet/legends2.html
Marisa Taylor, 2009, ‘New Zealand Reconsiders Three-Strikes Rule on Internet Use’, in The Wall Street Journal,
Digits: Technology News and Insights, accessed 4 July 2009,
from http://blogs.wsj.com/digits/2009/03/26/new-zealand-reconsiders-three-strikes-rule-on-internet-use/
Chris Keall, ‘Section 92A to be scrapped’, in The National Business Review - New Zealand, accessed 4 July 2009,
from http://www.nbr.co.nz/article/section-92a-be-scrapped-89121
Patrick Foster, ‘Music pirates will not be disconnected from the internet’, in TimesOnline, accessed 14 July 2009,
from http://entertainment.timesonline.co.uk/tol/arts_and_entertainment/music/article5586761.ece
18
a ‘three strikes’ policy put to the question
hollywood dreams
Phil Muncaster, ‘Swedish net traffic halves after new law’, in IT News, accessed 4 July 2009,
from http://www.itnews.com.au/News/100370,swedish-net-traffic-halves-after-new-law.aspx
Liza Porteus Viana, 2009, ‘Three Strikes and You’re Offline: Music Industry, ISPs May Cut Internet Access for FileSharers’, in FoxNews.com: Tech Tuesday, accessed 4 July 2009,
from http://www.foxnews.com/story/0,2933,510283,00.html
Egan Orion, 2009, ‘French ‘three-strikes’ law struck down’, in The Inquirer: News, reviews, facts and friction,
accessed 8 July 2009, from http://www.theinquirer.net/inquirer/news/1271174/french-strikes-law-struck
J.Le Masurier, 2009, ‘Top legal body strikes down anti-piracy law’, in France24.com, accessed 4 July 2009,
from http://www.france24.com/en/20090610-top-legal-body-strikes-down-anti-piracy-law-hadopiconstitutional-council-internet-france
Eric Pfanner, 2009, ‘French Council Defangs Plan to Crack Down on Internet Piracy’, in The New York Times:
Internet, accessed 14 July 2009, from http://www.nytimes.com/2009/06/11/technology/internet/11net.html
19
a ‘three strikes’ policy put to the question