march 2014 dmca presentation

41
Digital Millennium Copyright Act Theodore Mak, Clayton Bauer

Upload: theodore-mak

Post on 11-Apr-2017

131 views

Category:

Documents


2 download

TRANSCRIPT

Page 1: March 2014 DMCA Presentation

Digital Millennium Copyright Act

Theodore Mak, Clayton Bauer

Page 2: March 2014 DMCA Presentation

Introduction Theodore Mak ([email protected])

IT Express Programmer (Lead Consultant) Lead Incident Response and IT Abuse Administrator

Kam Chand ([email protected]) IT Express Programmer Incident Response and IT Abuse Administrator

Page 3: March 2014 DMCA Presentation

Notes This presentation was adapted from the DMCA

lecture from the 2013 Security Symposium This is intended as a quick summary of the

technical side of DMCA Some materials may be outdated

ServiceNow has replaced Remedy

Page 4: March 2014 DMCA Presentation

Digital Millennium Copyright Act (DMCA)

Passed into law October 28, 1998.

The DMCA protects internet service providers (ISP) from liability for copyright infringement by their

users. If the internet service provider meets certain

requirements.

Page 5: March 2014 DMCA Presentation

Digital Copyright Millennium Act (DMCA) Requirements ISP must take:

Take steps when it receives notice that infringing material resides on its network

Adopt and implement a policy that provides for termination of users who are repeat infringers

Accommodate standard technical measures that are used by copyright owners to identify and protect copyrighted works

Page 6: March 2014 DMCA Presentation

What groups are involved in DMCA?

IRT Incident Response Team (Kam and Theo) Handles the technical aspects

DMCA Group Technology Transfer Services Designated Agent

Individual within the ISP who is registered with the U.S. Copyright Office as the point of contact for DMCA communications.

Jan Carmikle

OSD /SJA Office of Student Development, Student Judicial Affairs Works with students

http://manuals.ucdavis.edu/ppm/250/250-05.pdf

Page 7: March 2014 DMCA Presentation

How Does BitTorrent Work?

Page 8: March 2014 DMCA Presentation

http://computer.howstuffworks.com

How Does BitTorrent Work? A user opens a web page and click on a link for the desired file.

Pirate Bay, Kickasstorrents, Torrentz, etc. BitTorrent client software (e.g. Vuze, Azure, BitComet, uTorrent)

communicates with a tracker to find other computers running BitTorrent that have the complete file (seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file).

The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.

The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.

Page 9: March 2014 DMCA Presentation

images.google.com

Page 10: March 2014 DMCA Presentation

Key Point

To download files from BitTorrent, one must also share

Page 11: March 2014 DMCA Presentation

http://computer.howstuffworks.com

IP Address Dynamic Host Configuration Protocol (DHCP) Dynamic IP addresses are issued using a leasing

system, meaning that the IP address is only active for a limited time.

If the lease expires, the computer will automatically request a new lease. Sometimes, this means the computer will get a new IP address, too, especially if the computer was unplugged from the network between leases.

Page 12: March 2014 DMCA Presentation

MAC Address A unique 12 character addresses assigned to a

network interface card (NIC) Hard coded Must be registered to connect wired on campus Note: The MAC address can be spoofed

Page 13: March 2014 DMCA Presentation
Page 14: March 2014 DMCA Presentation
Page 15: March 2014 DMCA Presentation

Investigation User Downloads File

Most commonly via BitTorrent Types: Music, television shows, movies, video games,

ebooks

Violation detected IP address is identified to belong to UC Davis Copyright Notification is sent to UC Davis

Designated Agent Notification is forwarded to IRT

Log searching begins

Page 16: March 2014 DMCA Presentation

Sample DMCA Notification Evidentiary Information: Notice ID: 22275371730 Asset: ARCHER File Name: Archer.2009.S04E01-13.720p.WEB-DL.x264.AAC Timestamp: 2013-05-29 05:22:30.537 GMT Last Seen Date: 2013-05-29 05:22:30.537 GMT File Size: 2833295329 IP Address: 128.120.169.94 Protocol: BitTorrent

Page 17: March 2014 DMCA Presentation
Page 18: March 2014 DMCA Presentation

How Do We Know? Wireless – We track the wireless authentication

logs Wired – We track the MAC address

Students must register their ethernet MAC address to connect using a wire

Page 19: March 2014 DMCA Presentation

Investigation: Staff or Student Student

First or Second Violation? Results are sent back the DMCA group Office of Student Development (OSD) / Student Judicial

Affairs (SJA) is notified Staff/Faculty

Results are sent back to the DMCA group DMCA group investigates with violator’s Department

Case is entered into ServiceNow

Page 20: March 2014 DMCA Presentation

No Results / Exceptions

Incorrect Information Date and time inaccurate

Missing information (such as timezone)

Department VLAN Unregistered Device (solved!)

Page 21: March 2014 DMCA Presentation

Interpreting IRT Email

Page 22: March 2014 DMCA Presentation
Page 23: March 2014 DMCA Presentation

Deactivation: 1st and 2nd Violation

First Violation Disable wireless and wired access for two weeks IRT confirms with DMCA, Users, and OSD Start of two week count down

Second Violation Disable wireless and wired access permanently Same process as first violation

Page 24: March 2014 DMCA Presentation

Deactivation: Process

DMCA notifies IRT and user of shutdown User is instructed to forward all inquires to OSD/SJA IRT deactivates account using the wireless blacklist

tool and Infoblox

Case is entered into ServiceNow

Page 25: March 2014 DMCA Presentation

Key Notification Points Remove peer-to-peer software from your computer If you have a wireless router registered in your name

you are responsible for activities of anyone accessing the UC Davis network through the router. 

Do not use another person’s computer or allow others to use your computer or your login/password.

In approximately two weeks the users account will activate

Page 26: March 2014 DMCA Presentation

Wireless Blacklist Users are added to the wireless blacklist

Page 27: March 2014 DMCA Presentation

Infoblox We block the registered wired MAC address listed

on the users central computing account. If no MAC address are listed user the users

account, we do not block them. Automatically reactivates

Page 28: March 2014 DMCA Presentation
Page 29: March 2014 DMCA Presentation

Activation Activate wireless login ID

by removing user from wireless blacklist Unblock MAC address

Automatically unblocked in Infoblox ServiceNow ticket is closed

Page 30: March 2014 DMCA Presentation

DMCA Notification Totals (1998-2012)

Page 31: March 2014 DMCA Presentation

Statistics (2011-2014)

Jul-11Au

g-11Sep

-11Oct-

11Nov

-11Dec-

11Jan

-12Feb

-12Mar-

12Ap

r-12May

-12Jun

-12Jul-12Au

g-12Sep

-12Oct-

12Nov

-12Dec-

12Jan

-13Feb

-13Mar-

13Ap

r-13May

-13Jun

-13Jul-13Au

g-13Sep

-13Oct-

13Nov

-13Dec-

13Jan

-14Feb

-140

20

40

60

80

100

120

140

160

180

200

220

DMCA Requests

Month / Year

Page 32: March 2014 DMCA Presentation

Statistics: Comparison

July Aug Sept Oct Nov Dec Jan Feb0

20

40

60

80

100

120

140

160

180

200

2011-2012 2012-2013 2013-2014

Num

ber

of D

MCA

Req

uest

s

Page 33: March 2014 DMCA Presentation

Requests vs Actions

Jun-13 Jul-13 Aug-13 Sep-13 Oct-13 Nov-13 Dec-13 Jan-14 Feb-140

50

100

150

200

250

300

350

400

450

500

DMCA Requests Actions Taken

Page 34: March 2014 DMCA Presentation

Ways to Minimize DMCA Educating users about DMCA

Page 35: March 2014 DMCA Presentation
Page 36: March 2014 DMCA Presentation
Page 37: March 2014 DMCA Presentation
Page 38: March 2014 DMCA Presentation

Popcorn Time Streams video from torrents Temporary copy of the file is saved on the client’s

computer While streaming, the copy can be shared

Page 40: March 2014 DMCA Presentation

Questions

Ask us anything!