<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	
	>
<channel>
	<title>Comments on: “Six Strikes” Evidence Still Waiting for Impartial Re-review</title>
	<atom:link href="http://torrentfreak.com/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Tue, 28 Oct 2014 22:56:13 +0000</lastBuildDate>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>By: Sistema de alerta contra pirataria nos EUA, gera demanda por VPN e Proxies &#124; Livre Navegar</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1046602</link>
		<dc:creator><![CDATA[Sistema de alerta contra pirataria nos EUA, gera demanda por VPN e Proxies &#124; Livre Navegar]]></dc:creator>
		<pubDate>Thu, 14 Mar 2013 13:16:09 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1046602</guid>
		<description><![CDATA[[...] TorrentFreak lembra ainda que o sistema carece de um revisor imparcial das evidências colotadas ans redes P2P, [...]]]></description>
		<content:encoded><![CDATA[<p>[...] TorrentFreak lembra ainda que o sistema carece de um revisor imparcial das evidências colotadas ans redes P2P, [...]</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: MadAsASnake</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045562</link>
		<dc:creator><![CDATA[MadAsASnake]]></dc:creator>
		<pubDate>Mon, 11 Mar 2013 18:35:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045562</guid>
		<description><![CDATA[And if they seed it, they are making it available. It find it difficult to find a valid reason for this, they are complaining that people are using torrents that they themselves put there. I beleive this is true for almost all of these things - probably even true of HADOPI and NZ 3 strikes... Absolutely laughable.]]></description>
		<content:encoded><![CDATA[<p>And if they seed it, they are making it available. It find it difficult to find a valid reason for this, they are complaining that people are using torrents that they themselves put there. I beleive this is true for almost all of these things &#8211; probably even true of HADOPI and NZ 3 strikes&#8230; Absolutely laughable.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: Forkingham Melle</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045459</link>
		<dc:creator><![CDATA[Forkingham Melle]]></dc:creator>
		<pubDate>Mon, 11 Mar 2013 11:51:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045459</guid>
		<description><![CDATA[NOT MY WRITING this from Open democracy

The digital age has inevitably shaken the concept of copyright to its core. When you have ‘digital’ content, you always have the ‘human readable’ format and you also have the digital expression of the copyrighted material translated by computers into bits - the ones and zeroes. As a result there is a degree of inevitable copying of the work in question. ‘Digital’ means copying, in other words.

Similarly, networks must make temporary copies to function. So, ‘network’ means copying.

Computers make copies in order to process and display information. Therefore ‘computer’ also means copying. As a result, the growth of computers accessing content over digital networks means either reinventing information and communications technologies or re-inventing copyright to some extent.

Unfortunately, it has taken a painfully long time for this fairly simple realisation to dawn on many of the analogue industries that had grown too comfortable to grab the opportunities that the digital revolution offers. One of the best examples of this dogged refusal to accept the most basic concepts of digital technologies was the debate surrounding the copyright status of temporary technical copies created by computer networks.

In 1999/2000, publishers and the music industry ran an energetic lobbying campaign against a copyright exception for incidental network copies that, “do not interfere with the normal exploitation of the work” by the copyright owner.

The European Publishers&#039; Council (EPC) warned in 2001 that “unless we have Parliament&#039;s amendments [to prohibit unauthorised temporary copying] or something similar in effect, we do not have the ability to authorise any kind of copy, regardless of its economic significance, and thereby lose our control over illegal, piratical distribution of our works.”

The logic of the publishers was somewhat more subtle and more dangerous than it sounds. If every copy in an internet provider&#039;s network would be a copyright infringement, the provider could not function without prior authorisation. Providers would be liable for copies made in the transmission of legal/authorised content and doubly liable (for the copy and the facilitation of the infringement) for illegal/unauthorised content.

If the amendments in question had been adopted, European Internet companies would have had no option other than to monitor, delete, censor and restrict their customers in every way that the publishers considered appropriate for fighting against copyright infringement – as well as increasing prices by demanding royalties for legitimate content. Of course, 1999/2000 was a lifetime ago in internet years and things have moved on in the meantime.

Or have they? In 2012, the Austrian High Court has referred the “kino.to” case to the European Court of Justice. One of the questions asked in that case is: “are reproduction [sic] for private use and transient and incident reproduction permissible only if the original reproduction was lawfully reproduced, distributed or made available to the public?”

The referral attempts to re-open the question of making internet companies independently liable for copyright infringement in relation to every unauthorised file that passes over its network. So, we are back in 2000, with a threat that internet companies could be forced into a “gatekeeper” role as a privatised police force.

An unwise ruling from the European Court of Justice would speed up an already problematic trend that is fuelled by efforts to use internet companies as private enforcement “tools” in order to protect copyright in the online environment. Even though both ACTA and SOPA failed, their proposals on the enforcement of copyright through “voluntary” arrangements with any or all internet intermediaries live on. The US-led OECD “Communiqué on Principles for Internet Policy-Making”[pdf] adopted in June 2011 talks obscurely of norms of responsibility that enable private sector voluntary co-operation for the protection of intellectual property.

It somewhat less obscurely reflects an active choice to avoid references to the right to a fair trial and due process of law, choosing instead to refer to “fair process” - which sounds like both, but means neither. This practical implementation of such a policy can be seen in efforts of the United States “IP Enforcement Coordinator”, to exploit the global reach of US companies to take “voluntary” punitive actions against foreign online services considered to be breaching US copyright rules. The “voluntary” measures taken against Wikileaks also give a taster of where this policy is heading. Payment service providers blocked payments to Wikileaks whileAmazon withdrew hosting services.

This increasing pressure on intermediaries to meddle with content is happening at a particularly inauspicious time. Internet access providers are increasingly demanding the right to interfere with the functioning of the open internet (i.e. undermining the concept of network neutrality). The core value of the internet for free speech is the ‘any-to-any’ concept whereby any part of the network can (broadly speaking) communicate unrestricted with any other part of the network.

This is now under threat from the privatised enforcement measures demanded by some policy-makers from internet intermediaries that are increasingly finding commercial advantages in making such interventions.

Suddenly, we end up confronted simultaneously with all the worst aspects of policy-development over the past fifteen years. We have courts questioning the most fundamental elements of the networked environment – the ‘right’ of network providers to make the transient copies that are essential to the functioning of the Internet – the argument that we already had thirteen years ago.

Layered on top of these existential questions, we have policy-makers tinkering with the most fundamental legal principles of a society that is based on the rule of law, seeking to replace the regulation of free speech and communication by laws and courts with terms of service and the whims of internet access providers, hosting providers, domain name registrars, domain name registries, search engines, payment providers and advertising networks.

And layered on top of this, we have internet access providers raising their own existential questions about the viability (from their perspective) of the core concept of the internet – the ‘any-to-any’ principle.]]></description>
		<content:encoded><![CDATA[<p>NOT MY WRITING this from Open democracy</p>
<p>The digital age has inevitably shaken the concept of copyright to its core. When you have ‘digital’ content, you always have the ‘human readable’ format and you also have the digital expression of the copyrighted material translated by computers into bits &#8211; the ones and zeroes. As a result there is a degree of inevitable copying of the work in question. ‘Digital’ means copying, in other words.</p>
<p>Similarly, networks must make temporary copies to function. So, ‘network’ means copying.</p>
<p>Computers make copies in order to process and display information. Therefore ‘computer’ also means copying. As a result, the growth of computers accessing content over digital networks means either reinventing information and communications technologies or re-inventing copyright to some extent.</p>
<p>Unfortunately, it has taken a painfully long time for this fairly simple realisation to dawn on many of the analogue industries that had grown too comfortable to grab the opportunities that the digital revolution offers. One of the best examples of this dogged refusal to accept the most basic concepts of digital technologies was the debate surrounding the copyright status of temporary technical copies created by computer networks.</p>
<p>In 1999/2000, publishers and the music industry ran an energetic lobbying campaign against a copyright exception for incidental network copies that, “do not interfere with the normal exploitation of the work” by the copyright owner.</p>
<p>The European Publishers&#8217; Council (EPC) warned in 2001 that “unless we have Parliament&#8217;s amendments [to prohibit unauthorised temporary copying] or something similar in effect, we do not have the ability to authorise any kind of copy, regardless of its economic significance, and thereby lose our control over illegal, piratical distribution of our works.”</p>
<p>The logic of the publishers was somewhat more subtle and more dangerous than it sounds. If every copy in an internet provider&#8217;s network would be a copyright infringement, the provider could not function without prior authorisation. Providers would be liable for copies made in the transmission of legal/authorised content and doubly liable (for the copy and the facilitation of the infringement) for illegal/unauthorised content.</p>
<p>If the amendments in question had been adopted, European Internet companies would have had no option other than to monitor, delete, censor and restrict their customers in every way that the publishers considered appropriate for fighting against copyright infringement – as well as increasing prices by demanding royalties for legitimate content. Of course, 1999/2000 was a lifetime ago in internet years and things have moved on in the meantime.</p>
<p>Or have they? In 2012, the Austrian High Court has referred the “kino.to” case to the European Court of Justice. One of the questions asked in that case is: “are reproduction [sic] for private use and transient and incident reproduction permissible only if the original reproduction was lawfully reproduced, distributed or made available to the public?”</p>
<p>The referral attempts to re-open the question of making internet companies independently liable for copyright infringement in relation to every unauthorised file that passes over its network. So, we are back in 2000, with a threat that internet companies could be forced into a “gatekeeper” role as a privatised police force.</p>
<p>An unwise ruling from the European Court of Justice would speed up an already problematic trend that is fuelled by efforts to use internet companies as private enforcement “tools” in order to protect copyright in the online environment. Even though both ACTA and SOPA failed, their proposals on the enforcement of copyright through “voluntary” arrangements with any or all internet intermediaries live on. The US-led OECD “Communiqué on Principles for Internet Policy-Making”[pdf] adopted in June 2011 talks obscurely of norms of responsibility that enable private sector voluntary co-operation for the protection of intellectual property.</p>
<p>It somewhat less obscurely reflects an active choice to avoid references to the right to a fair trial and due process of law, choosing instead to refer to “fair process” &#8211; which sounds like both, but means neither. This practical implementation of such a policy can be seen in efforts of the United States “IP Enforcement Coordinator”, to exploit the global reach of US companies to take “voluntary” punitive actions against foreign online services considered to be breaching US copyright rules. The “voluntary” measures taken against Wikileaks also give a taster of where this policy is heading. Payment service providers blocked payments to Wikileaks whileAmazon withdrew hosting services.</p>
<p>This increasing pressure on intermediaries to meddle with content is happening at a particularly inauspicious time. Internet access providers are increasingly demanding the right to interfere with the functioning of the open internet (i.e. undermining the concept of network neutrality). The core value of the internet for free speech is the ‘any-to-any’ concept whereby any part of the network can (broadly speaking) communicate unrestricted with any other part of the network.</p>
<p>This is now under threat from the privatised enforcement measures demanded by some policy-makers from internet intermediaries that are increasingly finding commercial advantages in making such interventions.</p>
<p>Suddenly, we end up confronted simultaneously with all the worst aspects of policy-development over the past fifteen years. We have courts questioning the most fundamental elements of the networked environment – the ‘right’ of network providers to make the transient copies that are essential to the functioning of the Internet – the argument that we already had thirteen years ago.</p>
<p>Layered on top of these existential questions, we have policy-makers tinkering with the most fundamental legal principles of a society that is based on the rule of law, seeking to replace the regulation of free speech and communication by laws and courts with terms of service and the whims of internet access providers, hosting providers, domain name registrars, domain name registries, search engines, payment providers and advertising networks.</p>
<p>And layered on top of this, we have internet access providers raising their own existential questions about the viability (from their perspective) of the core concept of the internet – the ‘any-to-any’ principle.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: MadAsASnake</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045444</link>
		<dc:creator><![CDATA[MadAsASnake]]></dc:creator>
		<pubDate>Mon, 11 Mar 2013 10:10:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045444</guid>
		<description><![CDATA[No it&#039;s not. The original reason, shortly after the invention of the printing press was suppression of political and religious discourse that was at odds with the crown view. The US constitution puts it as maximisation of the production of creative works. The other part of this is to make it as widely available as possible (this is basic utilitarianism - you might want to read up on some John Stuart Mill) as there is no point creating it if you don&#039;t make it available. Now, as far as I can see, &quot;piracy&quot; is more consistent with this view, and the concept of a liberal society than yours. Also, there is nothing in what I am saying that neuters copyright. What neuters copyright is the simple fact that through the years, there have been serious technical and cost barriers to copying this stuff. In the 50&#039;s copying TV shows wasn&#039;t done because affordable technology to do so did not exist. VCR changed that. Now, digital equipment, especially the ubiquitous PC and Internet have effectively removed that barrier entirely. Note that none of these technologies have done as you doom sayers continually predict - which is to kill the industry - it doesn&#039;t. The rent seeking from these industries has to stop - not because it is morally reprehensible (which it is), but because modern technology will solve the problem if the gatekeepers are to damn stupid to do so themselves. I will download stuff for free if you don&#039;t make an intelligent market offering (ie, if you want way too much for it, place overly restrictive terms on it (like DRM), don&#039;t offer it at all, make it so hard to get that it might as well not be available, and so on). I&#039;ll do the same if it is older than normally accepted and acceptable time limits (~10 years). Now if these industries can&#039;t work out how to make money from me in the envelope I have offered - they don&#039;t get paid. Simple.]]></description>
		<content:encoded><![CDATA[<p>No it&#8217;s not. The original reason, shortly after the invention of the printing press was suppression of political and religious discourse that was at odds with the crown view. The US constitution puts it as maximisation of the production of creative works. The other part of this is to make it as widely available as possible (this is basic utilitarianism &#8211; you might want to read up on some John Stuart Mill) as there is no point creating it if you don&#8217;t make it available. Now, as far as I can see, &#8220;piracy&#8221; is more consistent with this view, and the concept of a liberal society than yours. Also, there is nothing in what I am saying that neuters copyright. What neuters copyright is the simple fact that through the years, there have been serious technical and cost barriers to copying this stuff. In the 50&#8242;s copying TV shows wasn&#8217;t done because affordable technology to do so did not exist. VCR changed that. Now, digital equipment, especially the ubiquitous PC and Internet have effectively removed that barrier entirely. Note that none of these technologies have done as you doom sayers continually predict &#8211; which is to kill the industry &#8211; it doesn&#8217;t. The rent seeking from these industries has to stop &#8211; not because it is morally reprehensible (which it is), but because modern technology will solve the problem if the gatekeepers are to damn stupid to do so themselves. I will download stuff for free if you don&#8217;t make an intelligent market offering (ie, if you want way too much for it, place overly restrictive terms on it (like DRM), don&#8217;t offer it at all, make it so hard to get that it might as well not be available, and so on). I&#8217;ll do the same if it is older than normally accepted and acceptable time limits (~10 years). Now if these industries can&#8217;t work out how to make money from me in the envelope I have offered &#8211; they don&#8217;t get paid. Simple.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: That_Anonymous_Coward</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045434</link>
		<dc:creator><![CDATA[That_Anonymous_Coward]]></dc:creator>
		<pubDate>Mon, 11 Mar 2013 08:14:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045434</guid>
		<description><![CDATA[In their &quot;evidence&quot; collection for AFACT vs iiNET they seeded the files to collect IP addresses.
This has always been a fun question, if they seed the file are copies authorized?
If they join an existing swarm are they assisting the &#039;crime&#039;?
They have to download the file to verify it is actually the protected content, what happens if they download a mislabeled file?  Do they turn themselves in?]]></description>
		<content:encoded><![CDATA[<p>In their &#8220;evidence&#8221; collection for AFACT vs iiNET they seeded the files to collect IP addresses.<br />
This has always been a fun question, if they seed the file are copies authorized?<br />
If they join an existing swarm are they assisting the &#8216;crime&#8217;?<br />
They have to download the file to verify it is actually the protected content, what happens if they download a mislabeled file?  Do they turn themselves in?</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: DRuNKeN MaSTeR</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045428</link>
		<dc:creator><![CDATA[DRuNKeN MaSTeR]]></dc:creator>
		<pubDate>Mon, 11 Mar 2013 07:49:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045428</guid>
		<description><![CDATA[A simple video to help you understand: https://www.youtube.com/watch?v=IeTybKL1pM4]]></description>
		<content:encoded><![CDATA[<p>A simple video to help you understand: <a href="https://www.youtube.com/watch?v=IeTybKL1pM4" rel="nofollow">https://www.youtube.com/watch?v=IeTybKL1pM4</a></p>
]]></content:encoded>
	</item>
	<item>
		<title>By: SaneAsAHuman</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045391</link>
		<dc:creator><![CDATA[SaneAsAHuman]]></dc:creator>
		<pubDate>Mon, 11 Mar 2013 02:08:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045391</guid>
		<description><![CDATA[By your reasoning there would be no copyright law at all. The whole purpose of copyright is to give the rights holder control over who gets to posses a copy of their intellectual property. By downloading an illegal copy you are depriving them of their right to control their property. That is very much stealing. Just because you can download something for free doesn&#039;t give you a claim to the moral high ground.]]></description>
		<content:encoded><![CDATA[<p>By your reasoning there would be no copyright law at all. The whole purpose of copyright is to give the rights holder control over who gets to posses a copy of their intellectual property. By downloading an illegal copy you are depriving them of their right to control their property. That is very much stealing. Just because you can download something for free doesn&#8217;t give you a claim to the moral high ground.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: MadAsASnake</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045346</link>
		<dc:creator><![CDATA[MadAsASnake]]></dc:creator>
		<pubDate>Sun, 10 Mar 2013 22:21:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045346</guid>
		<description><![CDATA[No, when you steal something, the party stolen from no longer has it. Pretty much central to every definition of stealing I&#039;m aware of. Especially the legal ones. You can make whatever moral judgment you like about copyright infringement, but it is NOT stealing. The copyright holder looses nothing. The second point I am making is that these strikes schemes are no better than the extortion scam of ACS Law, Steele, and so on. The majority of the accused will not be the offender (if there even is one) and in many cases will have no way to assist in that identification. All these schemes work either by assuming guilt on the accountholder, or straight out extortion. Now, if you are following the Prenda Law thing, you&#039;ll know that judge Wright does not beleive IP evidence alone is enough to expect disclosure, and certainly not enough to make an accusation. You can twist that up any way you like, but extorting innocent people (which is what this is) is really vile behaviour, and definitely illegal.]]></description>
		<content:encoded><![CDATA[<p>No, when you steal something, the party stolen from no longer has it. Pretty much central to every definition of stealing I&#8217;m aware of. Especially the legal ones. You can make whatever moral judgment you like about copyright infringement, but it is NOT stealing. The copyright holder looses nothing. The second point I am making is that these strikes schemes are no better than the extortion scam of ACS Law, Steele, and so on. The majority of the accused will not be the offender (if there even is one) and in many cases will have no way to assist in that identification. All these schemes work either by assuming guilt on the accountholder, or straight out extortion. Now, if you are following the Prenda Law thing, you&#8217;ll know that judge Wright does not beleive IP evidence alone is enough to expect disclosure, and certainly not enough to make an accusation. You can twist that up any way you like, but extorting innocent people (which is what this is) is really vile behaviour, and definitely illegal.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: utuxia</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045342</link>
		<dc:creator><![CDATA[utuxia]]></dc:creator>
		<pubDate>Sun, 10 Mar 2013 22:03:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045342</guid>
		<description><![CDATA[You&#039;re talking about whether or not you can prove your stealing. That remains to be seen. I&#039;m just talking reality here. If you pirate content, you are stealing it. You can twist it all up however you want, or whatever makes you feel better. Even claim to be the victim if you want. But the fact of the matter is, if you produced and licensed the content, and someone takes it without paying for it, then its stealing.]]></description>
		<content:encoded><![CDATA[<p>You&#8217;re talking about whether or not you can prove your stealing. That remains to be seen. I&#8217;m just talking reality here. If you pirate content, you are stealing it. You can twist it all up however you want, or whatever makes you feel better. Even claim to be the victim if you want. But the fact of the matter is, if you produced and licensed the content, and someone takes it without paying for it, then its stealing.</p>
]]></content:encoded>
	</item>
	<item>
		<title>By: That_Anonymous_Coward</title>
		<link>/six-strikes-evidence-still-waiting-for-impartial-reexamination-130308/#comment-1045267</link>
		<dc:creator><![CDATA[That_Anonymous_Coward]]></dc:creator>
		<pubDate>Sun, 10 Mar 2013 16:29:00 +0000</pubDate>
		<guid isPermaLink="false">http://torrentfreak.com/?p=66137#comment-1045267</guid>
		<description><![CDATA[They can&#039;t have a printer in the lab, it could be used to print infringing copies of LoLCat pictures.  You just hit a button and you can make copies!  ITS HORRIBLE!!!!]]></description>
		<content:encoded><![CDATA[<p>They can&#8217;t have a printer in the lab, it could be used to print infringing copies of LoLCat pictures.  You just hit a button and you can make copies!  ITS HORRIBLE!!!!</p>
]]></content:encoded>
	</item>
</channel>
</rss>
