<?xml version="1.0" encoding="UTF-8"?>
<rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>TorrentFreak &#187; evidence</title>
	<atom:link href="http://torrentfreak.com/tag/evidence/feed/" rel="self" type="application/rss+xml" />
	<link>http://torrentfreak.com</link>
	<description>Breaking File-sharing, Copyright and Privacy News</description>
	<lastBuildDate>Wed, 29 Oct 2014 13:30:09 +0000</lastBuildDate>
	<language>en-US</language>
		<sy:updatePeriod>hourly</sy:updatePeriod>
		<sy:updateFrequency>1</sy:updateFrequency>
	<generator>http://wordpress.org/?v=3.9.2</generator>
	<item>
		<title>How Any BitTorrent User Can Collect Lawsuit Evidence</title>
		<link>http://torrentfreak.com/how-any-bittorrent-user-can-collect-lawsuit-evidence-100903/</link>
		<comments>http://torrentfreak.com/how-any-bittorrent-user-can-collect-lawsuit-evidence-100903/#comments</comments>
		<pubDate>Fri, 03 Sep 2010 21:05:40 +0000</pubDate>
		<dc:creator><![CDATA[Ben Jones]]></dc:creator>
				<category><![CDATA[Tutorial & How To]]></category>
		<category><![CDATA[anti-p2p]]></category>
		<category><![CDATA[evidence]]></category>
		<category><![CDATA[lawsuits]]></category>
		<category><![CDATA[video]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=26439</guid>
		<description><![CDATA[The RIAA may have given up on lawsuits targeting P2P users, but other companies have stepped into their shoes. There are many ways to detect P2P users and collect evidence of their behaviors for use in lawsuits. The simplest way needs nothing more than a BitTorrent client.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p>We&#8217;ve covered some of the more exotic ways people can be tracked or monitored in the past (including some that don&#8217;t work) but the lawsuits, abandoned by the record industry as bad for business, have been adopted by a group of lawyers who don&#8217;t let a little <a href="http://torrentfreak.com/u-s-copyright-group-steal-competitors-website-100730/">hypocrisy</a> stand in their way.</p>
<p>There&#8217;s a lot of misinformation about which companies and agencies can do what, and how they do it. People claim industry groups or random companies can search and send out letters at random, whereas the reality is the investigator must be authorized or they could be deemed guilty of copyright infringement themselves.</p>
<p>There&#8217;s also a lot of confusion about exactly how evidence is collected, with people sometimes believing that it can only be collected from corporate networks, or that private trackers are safe because investigators can&#8217;t share and so would be banned for their ratio. Much of this is untrue and these beliefs can make it easier to collect evidence.</p>
<p>The easiest way of all is to simply collect information from trackers. It&#8217;s an easy and quick way to do it, although as was <a href="http://torrentfreak.com/study-reveals-reckless-anti-piracy-antics-080605/">revealed</a> 2 years ago, it&#8217;s often quite inaccurate.</p>
<p>The next simplest way, which provides lots of data, is just to join a swarm and monitor. Some people believe that clients doing this will stand out, as modified clients will behave differently. The reality is that clients don&#8217;t have to be monitored at all.</p>
<p>Researcher Andrew Norton <a href="http://ktetch.blogspot.com/2010/08/how-anti-p2p-lawsuit-evidence-is.html" target="_blank">produced</a> this video explaining how a vanilla µTorrent client can be used to identify and log peers without any modification or abnormal behavior.</p>
<p style="text-align: center;"><object classid="clsid:d27cdb6e-ae6d-11cf-96b8-444553540000" width="500" height="306" codebase="http://download.macromedia.com/pub/shockwave/cabs/flash/swflash.cab#version=6,0,40,0"><param name="allowFullScreen" value="true"><param name="allowscriptaccess" value="always"><param name="src" value="http://www.youtube.com/v/KRMsoeofGcI?fs=1&amp;hl=en_US&amp;color1=0xcc2550&amp;color2=0xe87a9f"><param name="allowfullscreen" value="true"><embed type="application/x-shockwave-flash" width="500" height="306" src="http://www.youtube.com/v/KRMsoeofGcI?fs=1&amp;hl=en_US&amp;color1=0xcc2550&amp;color2=0xe87a9f" allowscriptaccess="always" allowfullscreen="true"></embed></object></p>
<p>The raw data shown in the video &#8211; all that&#8217;s needed for a lawsuit or allegation under most <a href="http://torrentfreak.com/tag/3-strikes/">3-strikes</a> laws &#8211; is nothing more than basic communication data. However, it&#8217;s critical to note that this data, while it is evidence of activity, is NOT evidence of infringement in many cases.</p>
<p>We can&#8217;t testify that this is the method used by any company – they&#8217;re notoriously tight-lipped about their methods – but it&#8217;s quite possible that it&#8217;s being used and sold on as a very high priced service to customers. Selling simple and not always accurate or effective methods for thousands of dollars a week was <a href="http://torrentfreak.com/mediadefender-decoy-effectiveness-on-bittorrent-sites-070922/">revealed</a> to be a key method of MediaDefender. Anyone reading this and intending to hire such companies would be advised to ask for a demonstration of their detection system first-hand.</p>
<p>It should, however, come as yet another wakeup call to those using blocklist-based software. Without any way to identify a client using this method, there&#8217;s no way to add its IP to the list. In fact, the public availability of block-list contents means it&#8217;s extremely easy to avoid being on them. </p>
<p>On the other hand VPNs, proxies and seedboxes will provide some <a href="http://torrentfreak.com/5-ways-to-download-torrents-anonymously-100819/">protection</a>, but the only real solution is to press for the peer-review of anti-P2P companies and their <a href="http://torrentfreak.com/anti-piracy-measures-dont-work-report-shows-090129/">methods</a>, but that doesn&#8217;t look like it will come any time soon.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/how-any-bittorrent-user-can-collect-lawsuit-evidence-100903/feed/</wfw:commentRss>
		<slash:comments>56</slash:comments>
		</item>
		<item>
		<title>MPAA Says It Doesn&#8217;t Need Evidence to Convict Pirates</title>
		<link>http://torrentfreak.com/mpaa-says-it-doesnt-need-evidence-to-convict-pirates-080621/</link>
		<comments>http://torrentfreak.com/mpaa-says-it-doesnt-need-evidence-to-convict-pirates-080621/#comments</comments>
		<pubDate>Sat, 21 Jun 2008 10:23:47 +0000</pubDate>
		<dc:creator><![CDATA[Ernesto]]></dc:creator>
				<category><![CDATA[All]]></category>
		<category><![CDATA[evidence]]></category>
		<category><![CDATA[making available]]></category>
		<category><![CDATA[mpaa]]></category>
		<category><![CDATA[piracy]]></category>

		<guid isPermaLink="false">http://torrentfreak.com/?p=2905</guid>
		<description><![CDATA[Only a few weeks ago, a University of Washington <a href="http://torrentfreak.com/study-reveals-reckless-anti-piracy-antics-080605/">study showed</a> showed how inaccurate the MPAA and RIAA's evidence gathering techniques are. Now, instead of improving their pirate chasing tactics, the MPAA simply claims they don't need any evidence to bankrupt "alleged" copyright infringers.<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></description>
				<content:encoded><![CDATA[<p><img src="http://torrentfreak.com/images/mpaa-logo.jpg" align="right" alt="mpaa">Threat Level <a href="http://blog.wired.com/27bstroke6/2008/06/mpaa-says-no-pr.html">reports</a> that the MPAA now argues that it has the right to demand up to $150,000 in damages per illegally downloaded file, without having to proof that someone actually downloaded that file.</p>
<p>Yes we know, this doesn&#8217;t make sense at all. Luckily, MPAA lawyer Marie van Uitert explains why copyright holders should be able to claim thousands of dollars without having to proove that a copyright infringement actually took place.  In <a href="http://blog.wired.com/27bstroke6/files/mpaathomas_brief.pdf">a brief</a> submitted this Friday, as part of the ongoing &#8220;making available&#8221; debate in the Jammie Thomas case, Van Uitert writes:</p>
<blockquote><p>&#8220;It is often very difficult, and in some cases, impossible, to provide such direct proof when confronting modern forms of copyright infringement, whether over P2P networks or otherwise; understandably, copyright infringers typically do not keep records of infringement.&#8221;</p></blockquote>
<p>So, the MPAA is basically saying that is is too hard to come up with solid evidence, and because of this, they should not have to proove anything. Makes perfect sense doesn&#8217;t it? The MPAA wrote the brief in response to a request from a federal Judge <a href="http://blog.wired.com/27bstroke6/2008/05/jammie-thomas-n.html">last month</a>, who called for a briefing on the claim that having files stored in &#8220;shared folders&#8221; infringes copyright.</p>
<p>The MPAA of course argues that keeping files in a &#8220;shared folder&#8221; does equal <em>distribution</em>, and they also make the argument that filesharers <em>authorize</em> others to download these files. Luckily there were also briefs submitted by the EFF, and several professors who argued against this. It is now up to the Judge to decide who&#8217;s right and wrong.</p>
<p>Source: <a href="http://torrentfreak.com">TorrentFreak</a>, for the latest info on <a href="http://torrentfreak.com/category/copyright-issues/">copyright</a>, <a href="http://torrentfreak.com/category/pirate-talk/">file-sharing</a> and <a href="http://torrentfreak.com/which-vpn-services-take-your-anonymity-seriously-2014-edition-140315/">anonymous VPN services</a>.</p>
]]></content:encoded>
			<wfw:commentRss>http://torrentfreak.com/mpaa-says-it-doesnt-need-evidence-to-convict-pirates-080621/feed/</wfw:commentRss>
		<slash:comments>98</slash:comments>
		</item>
	</channel>
</rss>
