how to protect your copyrighted content · 2020-05-15 · download to streaming history of digital...

25
© 2014 MarkMonitor Inc. All rights reserved. Digital Piracy on P2P Networks How to Protect your Copyrighted Content Olesia Klevchuk and Sam Bahun MarkMonitor

Upload: others

Post on 24-Jun-2020

7 views

Category:

Documents


0 download

TRANSCRIPT

Page 1: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

© 2014 MarkMonitor Inc. All rights reserved.

Digital Piracy on P2P Networks How to Protect your Copyrighted Content

Olesia Klevchuk and Sam Bahun

MarkMonitor

Page 2: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Agenda

P2P landscape: history and recent developments

Detection and verification of unauthorized content on P2P sites

Enforcement strategies

Alternatives to enforcements

2 | Confidential

Page 3: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

P2P Landscape History and Recent Developments

3 | Confidential

Page 4: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Download to Streaming

History of Digital Piracy

4 | Confidential

Music piracy enters mainstream with Napster

P2P brought software and video piracy

Shift to consumption of streaming content – TV

and sports most impacted

< 5 MM Today

1995 2000

P2P

300 MM

Users

Streaming

1B+ Users

2005 2010 2015

Live

Streaming

50 MM Users

Napster

25 MM Users UseNet

16 MM Users

Page 5: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

From Napster to eDonkey2000

First Generation of P2P

Napster brought P2P to

masses

Centralized server model

made it possible to shutdown

the network

5 | Confidential

Page 6: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Second Generation of P2P

Ability to operate without

central server, connecting

users remotely to each other

Difficult to shutdown

Attracted millions of users

worldwide

Requires some technical ability,

plagued with pop-up ads and

malware

Kazaa, Gnutella and Torrent Sites

6 | Confidential

Page 7: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

New P2P piracy

No to little technical ability is

required

Attractive, user-friendly

interface

BitTorrent powered making

enforcements challenging

Page 8: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

BitTorrent powered streaming app

Popcorn Time

Allows you to watch

thousands of movies

instantaneously

In the U.S., software was

downloaded onto millions

of devices

Interface resembles that

of popular legitimate

streaming platforms

8 | Confidential

Page 9: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

BitTorrent is among the most popular platforms online

P2P Adoption and Usage

307 million users

1.44 billion users

69 million subscribers

300 million users

Twitter

Facebook

Netflix

BitTorrent

9 | Confidential

Page 10: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Steady trend of a number of P2P infringements

P2P Piracy

P2P piracy presents a real threat to content owners as the

number of infringements consistently hit billions of cases

10 | Confidential

Page 11: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

P2P Piracy around the Globe

18% 6%

46% 13%

5%

11%

11 | Confidential

Source: MarkMonitor Q4 2014

Page 12: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Monetizing on piracy content

Piracy Profits From Downloads Decrease

BitTorrent portals continue to generate more ad revenue overall than any other

segment

Profits generated by Torrent sites shrank by 30% mainly at the expense of growing popularity of streaming platforms

Profits generated P2P piracy

12 | Confidential

2013 2014

Page 13: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Detection and Verification

Page 14: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

P2P Networks

Fighting Piracy Worldwide

Monitoring

Compliance

Enforcement

Reporting

Monitors millions of users worldwide

Fully compliant with the high standards of the EU Directive and applicable U.S. laws regarding evidence collection

procedures

Vendor of choice for the world’s largest anti-piracy programs

Compliant with local regulations

Notices are delivered to the correct ISP

Call centers to handle consumer inquiries regarding notices

Geographic information

Content breakdown: title, type, etc.

Report on notice quotas

Bittorrent

uTorrent

Azureus

Wyzo

eDonkey

eMule

Shareaza

K-Lite Pro

Gnutella

Bareshare

K-Lite Nitro

Limewire

Ares

Filecroc

Kceasy

Warez P2P

14 | Confidential

Page 15: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

P2P Verification

File (Hash) Verification: The method used to verify that a file

on a P2P network matches a copyrighted asset.

• Human – Download a full copy and apply human review of the

file.

• Fingerprinting – download and process against a database of

reference fingerprints.

Peer (Case) Verification: The method used to verify that each

peer discovered in a swarm for an infringing file is in fact

sharing the file.

Page 16: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Peer Verification Levels Verification Level

Step Verification Process 1 2 3 4 5 6 7

1 IP address sharing file with asset name is detected

2 IP address is verified as active (pinged, etc)

3 IP address is detected as having a P2P Client

4

Hash is collected as reported by peer for

comparison against a database of hashes for

confirmed infringements

5

File is partially downloaded and hash is collected

for comparison against a database of hashes for

confirmed infringements

6 File is partially downloaded for playback and

potential analysis against a content ID database

7 File is fully downloaded for playback and

verification

Recommended for business intelligence scanning

Recommended for notice sending based on good faith

Recommended for court level evidence standards

GDPI, P2P BI

Notice

Sending, P2P BI

Litigation

16 | Confidential

Page 17: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Enforcement

Page 18: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Top Markets with Clear Legal Procedures or

Business Practices for P2P Notice Sending

18 | Confidential

Page 19: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Things to Consider before sending notices

Geography: Notices can be sent worldwide, but are not likely

to reach the end users without supporting legislation or

business practices.

Program Goals: Education, Legal, Conversion, etc…

Notice Language: Does the notice template clearly match with

the goals while meeting all legal requirements in a given

country?

Graduated Response type programs can be based on

legislation, but also on voluntary private agreements between

trade associations/individual content owners and ISPs.

Page 20: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Alternative use for P2P data

Use piracy data to drive insights to convert pirates

and direct them to legal content.

DETECT VERIFY ENFORCE

ANALYZE

20 | Confidential

Page 21: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Monitor Global Piracy Trends to Make Intelligent

Business Decisions

21 | Confidential

Business Intelligence Data

What: quality, language, content type

Where: networks, ISP, geo-locations

How: streaming vs. downloading, ways to find content

Why: benchmark data

Cyberlockers

P2P

Search

Learn where and how copyrighted

material is being used Combined with traditional sources

of media consumption

Sales Data

Distribution Data

Audience Data

Page 22: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Software Company

Piracy Data to Create New Revenue Streams

CHALLENGE

Lack of visibility into piracy market

Pirated copies of proprietary software Cracked and hacked copies

STRATEGY

Use piracy data to measure demand for

software No enforcement – but use data to drive

sales

RESULTS

Piracy conversion strategy

Piracy data as a source of sales leads Recovering revenue from cracked software as

part of sales strategy

22 | Confidential

Page 23: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Use Data to Enhance Your Business Strategy

Benefits Of Using Piracy Data

Adapt to shifting piracy landscape

Convert pirates to pay and discourage casual pirates

Making smarter business decisions

• Distribution

• Marketing

• New releases

Recover lost revenues and create additional streams of

revenue

23 | Confidential

Page 24: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Q&A

Please be sure to submit all your questions via

the Q&A tab on your screen.

24 | Confidential

Page 25: How to Protect your Copyrighted Content · 2020-05-15 · Download to Streaming History of Digital Piracy 4 | Confidential Music piracy enters mainstream with Napster P2P brought

Thank You!

For information on MarkMonitor solutions, services and

complimentary educational events

• Contact us via email:

[email protected]

• Visit our website at:

www.markmonitor.com

• Contact us via phone:

US: 1 (800) 745 9229

Europe: +44 (0) 203 206 2220

25 | Confidential