march 2014 dmca presentation

Post on 11-Apr-2017

128 Views

Category:

Documents

2 Downloads

Preview:

Click to see full reader

TRANSCRIPT

Digital Millennium Copyright Act

Theodore Mak, Clayton Bauer

Introduction Theodore Mak (tjmak@ucdavis.edu)

IT Express Programmer (Lead Consultant) Lead Incident Response and IT Abuse Administrator

Kam Chand (chand@ucdavis.edu) IT Express Programmer Incident Response and IT Abuse Administrator

Notes This presentation was adapted from the DMCA

lecture from the 2013 Security Symposium This is intended as a quick summary of the

technical side of DMCA Some materials may be outdated

ServiceNow has replaced Remedy

Digital Millennium Copyright Act (DMCA)

Passed into law October 28, 1998.

The DMCA protects internet service providers (ISP) from liability for copyright infringement by their

users. If the internet service provider meets certain

requirements.

Digital Copyright Millennium Act (DMCA) Requirements ISP must take:

Take steps when it receives notice that infringing material resides on its network

Adopt and implement a policy that provides for termination of users who are repeat infringers

Accommodate standard technical measures that are used by copyright owners to identify and protect copyrighted works

What groups are involved in DMCA?

IRT Incident Response Team (Kam and Theo) Handles the technical aspects

DMCA Group Technology Transfer Services Designated Agent

Individual within the ISP who is registered with the U.S. Copyright Office as the point of contact for DMCA communications.

Jan Carmikle

OSD /SJA Office of Student Development, Student Judicial Affairs Works with students

http://manuals.ucdavis.edu/ppm/250/250-05.pdf

How Does BitTorrent Work?

http://computer.howstuffworks.com

How Does BitTorrent Work? A user opens a web page and click on a link for the desired file.

Pirate Bay, Kickasstorrents, Torrentz, etc. BitTorrent client software (e.g. Vuze, Azure, BitComet, uTorrent)

communicates with a tracker to find other computers running BitTorrent that have the complete file (seed computers) and those with a portion of the file (peers that are usually in the process of downloading the file).

The tracker identifies the swarm, which is the connected computers that have all of or a portion of the file and are in the process of sending or receiving it.

The tracker helps the client software trade pieces of the file you want with other computers in the swarm. Your computer receives multiple pieces of the file simultaneously.

images.google.com

Key Point

To download files from BitTorrent, one must also share

http://computer.howstuffworks.com

IP Address Dynamic Host Configuration Protocol (DHCP) Dynamic IP addresses are issued using a leasing

system, meaning that the IP address is only active for a limited time.

If the lease expires, the computer will automatically request a new lease. Sometimes, this means the computer will get a new IP address, too, especially if the computer was unplugged from the network between leases.

MAC Address A unique 12 character addresses assigned to a

network interface card (NIC) Hard coded Must be registered to connect wired on campus Note: The MAC address can be spoofed

Investigation User Downloads File

Most commonly via BitTorrent Types: Music, television shows, movies, video games,

ebooks

Violation detected IP address is identified to belong to UC Davis Copyright Notification is sent to UC Davis

Designated Agent Notification is forwarded to IRT

Log searching begins

Sample DMCA Notification Evidentiary Information: Notice ID: 22275371730 Asset: ARCHER File Name: Archer.2009.S04E01-13.720p.WEB-DL.x264.AAC Timestamp: 2013-05-29 05:22:30.537 GMT Last Seen Date: 2013-05-29 05:22:30.537 GMT File Size: 2833295329 IP Address: 128.120.169.94 Protocol: BitTorrent

How Do We Know? Wireless – We track the wireless authentication

logs Wired – We track the MAC address

Students must register their ethernet MAC address to connect using a wire

Investigation: Staff or Student Student

First or Second Violation? Results are sent back the DMCA group Office of Student Development (OSD) / Student Judicial

Affairs (SJA) is notified Staff/Faculty

Results are sent back to the DMCA group DMCA group investigates with violator’s Department

Case is entered into ServiceNow

No Results / Exceptions

Incorrect Information Date and time inaccurate

Missing information (such as timezone)

Department VLAN Unregistered Device (solved!)

Interpreting IRT Email

Deactivation: 1st and 2nd Violation

First Violation Disable wireless and wired access for two weeks IRT confirms with DMCA, Users, and OSD Start of two week count down

Second Violation Disable wireless and wired access permanently Same process as first violation

Deactivation: Process

DMCA notifies IRT and user of shutdown User is instructed to forward all inquires to OSD/SJA IRT deactivates account using the wireless blacklist

tool and Infoblox

Case is entered into ServiceNow

Key Notification Points Remove peer-to-peer software from your computer If you have a wireless router registered in your name

you are responsible for activities of anyone accessing the UC Davis network through the router. 

Do not use another person’s computer or allow others to use your computer or your login/password.

In approximately two weeks the users account will activate

Wireless Blacklist Users are added to the wireless blacklist

Infoblox We block the registered wired MAC address listed

on the users central computing account. If no MAC address are listed user the users

account, we do not block them. Automatically reactivates

Activation Activate wireless login ID

by removing user from wireless blacklist Unblock MAC address

Automatically unblocked in Infoblox ServiceNow ticket is closed

DMCA Notification Totals (1998-2012)

Statistics (2011-2014)

Jul-11Au

g-11Sep

-11Oct-

11Nov

-11Dec-

11Jan

-12Feb

-12Mar-

12Ap

r-12May

-12Jun

-12Jul-12Au

g-12Sep

-12Oct-

12Nov

-12Dec-

12Jan

-13Feb

-13Mar-

13Ap

r-13May

-13Jun

-13Jul-13Au

g-13Sep

-13Oct-

13Nov

-13Dec-

13Jan

-14Feb

-140

20

40

60

80

100

120

140

160

180

200

220

DMCA Requests

Month / Year

Statistics: Comparison

July Aug Sept Oct Nov Dec Jan Feb0

20

40

60

80

100

120

140

160

180

200

2011-2012 2012-2013 2013-2014

Num

ber

of D

MCA

Req

uest

s

Requests vs Actions

Jun-13 Jul-13 Aug-13 Sep-13 Oct-13 Nov-13 Dec-13 Jan-14 Feb-140

50

100

150

200

250

300

350

400

450

500

DMCA Requests Actions Taken

Ways to Minimize DMCA Educating users about DMCA

Popcorn Time Streams video from torrents Temporary copy of the file is saved on the client’s

computer While streaming, the copy can be shared

Questions

Ask us anything!

Contact Information

Theodore Mak tjmak@ucdavis.edu

Kam Chand chand@ucdavis.edu

top related