Searching for Buried Treasure Abroad: How Better International Cooperation Can Help Decrease Internet Piracy
The pirates of the 21st century plunder more than the pirates of the 18th century ever did. Copying and distributing content worth billions of dollars online, modern-day pirates cost movie studios, music companies, and content creators an astronomical amount of money.
Internet piracy has become a legal conundrum wherein countless individuals engage in illegal activity with virtual impunity. Still, it is important to note here the difference between the casual Internet user that occasionally accesses pirated content and the actual pirates that illegally copy and distribute content online: the latter will be the primary focus of my discussion. In Part I of this Article I will examine the current state of US anti-piracy law and further illustrate exactly how countless individuals evade the law. In Part II, which is forthcoming in Spring 2018, I will then frame Internet piracy as a global epidemic and further argue that the international community must foster better cooperation to fight this battle more effectively.
What Is Internet Piracy?
Commonly defined as “[t]he illegal reproduction and distribution of copyrighted material on the Web,” Internet piracy has developed alongside the proliferation of the Internet.
Recently, however, illegal “streaming” websites have become more popular than BitTorrent in the piracy world.
And though web content has become much cheaper and easier to download with the growth of iTunes and Amazon, many individuals still make use of pirated content.
Current State of US Anti-Piracy Law
At its most basic level, Internet piracy is synonymous with copyright infringement. In the United States, copyright law has undergone three major changes coinciding with the Copyright Acts of 1790, 1909 and 1976.
While the Copyright Act of 1976 formed the basis for modern-day copyright law, Congress’ first attempt to target online copyright infringement was the Digital Millennium Copyright Act (“DMCA”) of 1998.
The anti-circumvention measures made it unlawful for individuals to tamper with access-control technologies, such as Digital Right Management (“DRM”), which prevent users from copying and distributing content.
The US legislature grappled with online copyright infringement on one other occasion with the Stop Online Piracy Act (“SOPA”) and the PROTECT IP Act (“PIPA”) of 2011. SOPA and PIPA both sought the end of online piracy by going past the DMCA and allowing the government to restrict access to entire websites based on copyright infringement.
An additional wrinkle in US copyright law is the tension between the DMCA safe harbor provisions and the doctrine of “secondary liability” in copyright infringement. Further described in BMG Rights Management (US) LLC v. Cox Communications, Inc., the U.S. District Court for the Eastern District of Virginia held that an ISP was secondarily liable for a customer’s act of copyright infringement.
How Pirates Evade the Law
Generally, pirates are a risk averse group (as oxymoronic as that may sound).
Under the first method—using fake or hidden website registration details—pirates look to thwart law enforcement agencies from the get-go. By using fake personal information to register domain names, pirates leave law enforcement agencies with very little information to connect a specific person to a specific website.
Next, the use of overseas servers is a popular technique pirates utilize to evade the law. As the DMCA notice-and-takedown mechanism is rooted in US law, content found on overseas servers is typically outside the reach of DMCA compliance.
Another evasion method pirates use is exploiting a high-rate of DMCA compliance to continue piracy efforts. Under this technique, pirates appease law enforcement by following through with a high number of DMCA notice-and-takedown requests, while simultaneously using said compliance as leverage to continue distributing illegal content.
Further, receiving payments through cryptocurrencies is an additional tactic pirates use to avoid punishment. Virtual currencies are an attractive form of payment because they are anonymously traded and leave little to no paper trail.
Finally, the widespread use of VPNs has helped both users and pirates hide from the law. VPNs act as middlemen between one’s computer and the Internet by offering encrypted connections between a virtual server and a private network.
Conclusion
The fight against Internet piracy is a long way from over. While BitTorrent users are “statistically unlikely to face any consequences,” law enforcement agencies further lack the resources to find and prosecute millions of other copyright infringers as well.
Rajan Patel, J.D., University of California, Berkeley, School of Law, 2019; B.A., University of Oregon, 2015.
- See, e.g., Why Does The RIAA Hate Torrent Sites So Much?, Music Business Worldwide (Dec. 6, 2014) (estimating that in 2014 “U.S. Internet users annually consume between $7 and $20 billion worth of digitally pirated recorded music”), https://www.musicbusinessworldwide.com/why-does-the-riaa-hate-torrent-sites-so-much/ [https://perma.cc/W9GY-B44G]. ↑
- Travis M. Andrews, ‘Game of Thrones’ was pirated more than a billion times — far more than it was watched legally, Wash. Post (Sept. 8, 2017), https://www.washingtonpost.com/news/morning-mix/wp/2017/09/08/game-of-thrones-was-pirated-more-than-a-billion-times-far-more-than-it-was-watched-legally/ [https://perma.cc/CYJ9-RKBJ]. ↑
- Id. (noting an illegal audience of 187.4 million and legal audience of 16.1 million). ↑
- Encyclopedia, Definition of: Internet piracy, PC Magazine, https://www.pcmag.com/encyclopedia/term/63907/internet-piracy (last visited Oct. 7, 2017) [https://perma.cc/4BAF-7V44]. ↑
- Aatif Sulleyman, Pirate’s Treasure: How Criminals Make Millions From Illegal Streaming, The Independent (Sept. 19, 2017), http://www.independent.co.uk/life-style/gadgets-and-tech/news/piracy-streaming-illegal-feeds-how-criminals-make-money-a7954026.html [https://perma.cc/6D7S-G6M3]. ↑
- Aaron Parson, How Does Peer-to-peer File Sharing Work?, http://smallbusiness.chron.com/peertopeer-file-sharing-work-57706.html, (last visited Oct. 7, 2017) [https://perma.cc/3ZLQ-N2BW]. ↑
- Id. ↑
- Robert Elder, Illegal streaming is dominating online piracy, Business Insider (Aug. 1, 2016), http://www.businessinsider.com/illegal-streaming-is-dominating-online-piracy-2016-8 [https://perma.cc/U2H6-JDWS] ↑
- Id. ↑
- James Titcomb, Rise of illegal Kodi streaming threatens piracy crackdown, says Government report, The Telegraph (July 7, 2017), http://www.telegraph.co.uk/technology/2017/07/07/rise-illegal-kodi-streaming-threatens-piracy-crackdown-says/ [https://perma.cc/JZF9-MMQ2]. ↑
- See id. ↑
- 10 Reasons Why People Pirate And Illegally Download Movies, Songs, And Software, Fossbytes (May 29, 2017), https://fossbytes.com/10-reasons-why-people-do-piracy-and-download-movies-shows-albums-software/ [https://perma.cc/HQ3Q-3A7Q]. ↑
- Elder, supra note 8 (noting that the economic impact of piracy is still open to debate). ↑
- David Amar, Copyright Competition: The Shifting Boundaries of Convergence Between U.S. and Canadian Copyright Regimes in the Digital Age, 41 Brook. J. Int'l L. 1303, 1309 1313–14 (2016). ↑
- 17 U.S.C. § 106 (2012). ↑
- §102(a). ↑
- §501. ↑
- Matthew Bernstein, Searching for More Efficient Piracy Protection, 43 AIPLA Q.J. 625, 626 (2015). ↑
- Amar, supra note 14, at 1313–14. ↑
- Zoe Carpou, Robots, Pirates, and the Rise of the Automated Takedown Regime: Using the Dmca to Fight Piracy and Protect End-Users, 39 Colum. J.L. & Arts 551, 556 (2016). ↑
- 17 U.S.C. §501; see also Chris Hoffman, What Is the DCMA, and Why Does It Take Down Web Pages?, How-To Geek (Sept. 22, 2016), https://www.howtogeek.com/161216/htg-explains-what-the-dmca-is-and-how-it-affects-the-internet/ [https://perma.cc/9T56-LYT3]. ↑
- Carpou, supra note 20. ↑
- See id. at 556; §512. ↑
- §512(c). ↑
- See generally Carpou, supra note 20 (noting the strengths and inherent flaws of DMCA notice-and-takedowns). ↑
- Id. at 556–57. ↑
- Julianne Pepitone, SOPA explained: What it is and why it matters, CNN Money (Dec. 18, 2017), http://money.cnn.com/2012/01/17/technology/sopa_explained/index.htm [https://perma.cc/HC6A-QMJU]. ↑
- Id. ↑
- Id. ↑
- Id. ↑
- Bernstein, supra note 18, at 639. ↑
- Id. ↑
- 199 F.Supp.3d 958, 963 (E.D. Va. 2016). ↑
- Id. at 963–66. ↑
- Id. at 968–80. ↑
- Id. at 977–981. ↑
- Id. at 363–65. ↑
- See David Newhoff, BMG v Cox Goes to 4th Circuit Appellate Court, The Illusion of More (Jan. 17, 2017), http://illusionofmore.com/bmg-v-cox-goes-4th-circuit-appellate-court/ [https://perma.cc/7J73-VFJK]. ↑
- See Zohair, How Do Pirates Escape Law Enforcement Agencies., Security Gladiators (Sept. 12, 2017), https://securitygladiators.com/pirates/ [https://perma.cc/RA9Q-N4K3]. ↑
- Andy, The Things Pirates Do To Hinder Anti-Piracy Investigations, Torrent Freak (Sept. 9, 2017), https://torrentfreak.com/the-things-pirates-do-to-hinder-anti-piracy-outfits-170909/ [https://perma.cc/7TS5-HP65]. ↑
- Zohair, supra note 41. ↑
- See id. ↑
Ernesto, Pirate Bay Founder Launches Anonymous Domain Registration Service, Torrent Freak (Apr. 19, 2017), https://torrentfreak.com/pirate-bay-founder-launches-anonymous-domain-registration-service-170419/ [https://perma.cc/TQ6A-DHPM].
- See id. ↑
- See Enforcing Online Copyright Protections Abroad: Understanding Foreign Takedown Notice Requirements, The IP Exporter (Mar. 25, 2013), https://theipexporter.com/2013/03/25/enforcing-online-copyright-protections-abroad-understanding-foreign-takedown-notice-requirements/ [https://perma.cc/7A9D-TUCM]. ↑
- See id. ↑
- Andy, supra note 42. ↑
- Id. ↑
- Stephen Carlisle, DMCA “Takedown” Notices: Why “Takedown” Should Become “Take Down and Stay Down” and Why It’s Good for Everyone, Nova Southeastern University: Office of Copyright (July 23, 2014), http://copyright.nova.edu/dmca-takedown-notices/ [https://perma.cc/472E-S8SA]. ↑
- Andy, supra note 42. ↑
- Id. ↑
- See id. ↑
- Pocket-lint Promotion, What is a VPN?, Pocket-lint (Oct. 5, 2017), http://www.pocket-lint.com/news/142278-what-is-a-vpn [https://perma.cc/NA74-5TRE]. ↑
- Id. ↑
- Id. ↑
- Id. ↑
- Id. ↑
- Andy, Just How Risky is Internet Piracy in 2017?, Torrent Freak (July 15, 2017), https://torrentfreak.com/just-how-risky-is-internet-piracy-in-2017-170715/ [https://perma.cc/K5CM-UGEB]. ↑