{"id":980,"date":"2012-09-12T00:57:09","date_gmt":"2012-09-12T00:57:09","guid":{"rendered":"http:\/\/ncjolt.org\/?p=980"},"modified":"2020-06-04T20:54:07","modified_gmt":"2020-06-04T20:54:07","slug":"big-brother-is-watching-you-watch-game-of-thrones-new-study-shows-that-bittorrent-users-are-monitored-and-logged-within-hours","status":"publish","type":"post","link":"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/big-brother-is-watching-you-watch-game-of-thrones-new-study-shows-that-bittorrent-users-are-monitored-and-logged-within-hours\/","title":{"rendered":"Big Brother is Watching You Watch Game of Thrones: New Study Shows That BitTorrent Users Are Monitored and Logged Within Hours"},"content":{"rendered":"<p>Tuesday, September 4, 2012 by Jonathan Ambrose<br \/>\nA <a href=\"http:\/\/www.cs.bham.ac.uk\/~tpc\/Papers\/P2PMonitor.pdf\">recent study<\/a> from UK&#8217;s University of Birmingham suggests that users of BitTorrent clients to share files are likely to be monitored, with those downloading or sharing the most popular content being observed and recorded within hours.<br \/>\nBitTorrent is <a href=\"http:\/\/www.ipoque.com\/sites\/default\/files\/mediafiles\/documents\/internet-study-2008-2009.pdf\">widely-used<\/a> file sharing protocol that allows users to download files from <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">multiple users at once<\/a>. While it has <a href=\"http:\/\/www.cs.bham.ac.uk\/~tpc\/Papers\/P2PMonitor.pdf\">legitimate uses<\/a>, it is, perhaps <a href=\"http:\/\/www.afact.org.au\/research\/bt_report_final.pdf\">overwhelmingly<\/a>, used illegally to obtain copyrighted material.<\/p>\n<blockquote><p>The study found that those downloading one of the 100 most popular files\u00a0 are likely to be <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">\u201clogged by a monitoring firm within three hours.\u201d<\/a><\/p><\/blockquote>\n<p>The study was carried out using software that behaved like a BitTorrent client and <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">logged the connections made to it.<\/a> While previous studies had already explored the process of <a href=\"http:\/\/www.google.com\/url?sa=t&amp;rct=j&amp;q=&amp;esrc=s&amp;source=web&amp;cd=1&amp;ved=0CC8QFjAA&amp;url=http:\/\/dmca.cs.washington.edu\/uwcse_dmca_tr.pdf&amp;ei=v6RGUIG9FY6C9QT3q4HwAg&amp;usg=AFQjCNF0GOcCInrNHXcoWcpjuvyDDHoS-w\">indirect monitoring<\/a> (where indirect indications of sharing activity are considered), the Birmingham study was the <a href=\"http:\/\/www.cs.bham.ac.uk\/~tpc\/Papers\/P2PMonitor.pdf\">first to observe and quantify direct monitoring<\/a> (in which the observer directly connects with users to determine their activity).<br \/>\nThe study found that those downloading one of the 100 most popular files\u00a0 are likely to be <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">\u201clogged by a monitoring firm within three hours.\u201d<\/a> Those downloading less popular files were still monitored, but less frequently, suggesting that the observers <a href=\"http:\/\/www.cs.bham.ac.uk\/~tpc\/Papers\/P2PMonitor.pdf\">\u201callocate resources according to the popularity of the content they monitor.\u201d<\/a><br \/>\nThe research was able to implicate <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">10 different firms monitoring<\/a>. While some were identified as copyright enforcement organizations, six of the firms could not be identified, and their exact reasons for collecting the data are <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">unknown<\/a>. Some firms, however, have been accused of selling the information to copyright holders for <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">marketing purposes<\/a>.<br \/>\nThe researchers also found that the \u201cblocklists\u201d used by BitTorrent users to exclude peers suspected of monitoring to avoid detection were ineffective, missing <a href=\"http:\/\/www.cs.bham.ac.uk\/~tpc\/Papers\/P2PMonitor.pdf\">31% of the peers<\/a> they identified as monitors. The study helpfully suggests that BitTorrent users should \u201cnot rely solely on such speculative blocklists to protect their privacy, and should instead combine them with blocklists based on empirical research . . . .\u201d<br \/>\nIP addresses collected by monitoring firms have in the past been used to determine the physical location of file sharers, which are in turn the basis for <a href=\"http:\/\/www.bbc.co.uk\/news\/technology-19474829\">cease and desist letters and settlement offers<\/a>. However, there is <a href=\"http:\/\/www.zdnet.com\/blog\/networking\/court-slaps-down-the-use-of-ip-addresses-in-file-sharing-cases\/2365\">some doubt<\/a> about the use of these IP addresses as the sole basis for copyright infringement claims in court, as the information only pertains to a certain location, rather than any specific user. Regardless of the future legal implications, however, the study is surely of great interest to copyright holders seeking to enforce infringement, users hoping to avoid detection, and\u00a0 researchers watching from the sidelines.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Tuesday, September 4, 2012 by Jonathan Ambrose A recent study from UK&#8217;s University of Birmingham suggests that users of BitTorrent clients to share files are likely to be monitored, with those downloading or sharing the most popular content being observed and recorded within hours. BitTorrent is widely-used file sharing protocol that allows users to download <a href=\"https:\/\/journals.law.unc.edu\/ncjolt\/blogs\/big-brother-is-watching-you-watch-game-of-thrones-new-study-shows-that-bittorrent-users-are-monitored-and-logged-within-hours\/\" class=\"more-link\">&#8230;<\/a><\/p>\n","protected":false},"author":1,"featured_media":0,"comment_status":"closed","ping_status":"open","sticky":false,"template":"","format":"standard","meta":[],"categories":[51],"tags":[],"_links":{"self":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/980"}],"collection":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/users\/1"}],"replies":[{"embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/comments?post=980"}],"version-history":[{"count":1,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/980\/revisions"}],"predecessor-version":[{"id":7701,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/posts\/980\/revisions\/7701"}],"wp:attachment":[{"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/media?parent=980"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/categories?post=980"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/journals.law.unc.edu\/ncjolt\/wp-json\/wp\/v2\/tags?post=980"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}