[12336] in cryptography@c2.net mail archive

home help back first fref pref prev next nref lref last post

Re: Verizon must comply with RIAA's DMCA subpoena

daemon@ATHENA.MIT.EDU (Declan McCullagh)
Tue Jan 21 20:02:01 2003

X-Original-To: cryptography@wasabisystems.com
X-Original-To: cryptography@wasabisystems.com
Date: Tue, 21 Jan 2003 19:00:28 -0500
To: William Allen Simpson <wsimpson@greendragon.com>
From: Declan McCullagh <declan@well.com>
Cc: "Cryptography (moderated)" <cryptography@wasabisystems.com>
In-Reply-To: <3E2DD46F.402A4B40@greendragon.com>

At 06:15 PM 1/21/2003 -0500, William Allen Simpson wrote:
>He's placed the decision here:
>   http://www.politechbot.com/docs/verizon.riaa.decision.012103.pdf
>
>All this to learn the identity of a computer at a particular IP address.
>Presumbly, Verizon will now be smart enough to say: "All of our IP
>addresses are assigned using DHCP, and we have no record of the name
>of any subscriber associated with an IP address."

I was thinking along the same lines. This seems to be a market opportunity 
for an Internet provider that keeps no IP address<->identity records for 
more than a few minutes or hours.

The DMCA subpoena process requires that a copyright holder contact "the 
clerk of any United States district court (for) a subpoena to a service 
provider." There's a hint in the law (digital signatures) that this can be 
done electronically, but I presume there's still a delay.

>This raises the question in my mind, how would the RIAA know?

Unfortunately, those details aren't in the court record. If RIAA ever files 
suit against a p2p user (which they have never done to date, to the best of 
my knowledge), we'd find out. I asked RIAA today about their plans to sue 
individuals -- they're breaking the law, right? -- and they wouldn't talk.

Still, we shouldn't overlook the obvious: It doesn't need to be anything as 
advanced as monitoring; it could be a tip from an informant at a university 
computer lab... Or a corporate administrator who tipped RIAA off in hopes 
of thwarting a lawsuit...

My understanding of Kazaa is that it's easy enough to find out who is 
distributing files and what those files are. That doesn't answer your 
questions about identifying who's accumulating them, though.

-Declan


---------------------------------------------------------------------
The Cryptography Mailing List
Unsubscribe by sending "unsubscribe cryptography" to majordomo@wasabisystems.com

home help back first fref pref prev next nref lref last post