Internal Emails of An RIAA Attack Dog Leaked 427
qubezz writes "The company MediaDefender works with the RIAA and MPAA against piracy, setting up fake torrents and trackers and disrupting p2p traffic. Previously, the TorrentFreak site accused them of setting up a fake internet video download site designed to catch and bust users. MediaDefender denied the entrapment charges. Now 700MB of MediaDefender's internal emails from the last 6 months have been leaked onto BitTorrent trackers. The emails detail their entire plan, including how they intended to distance themselves from the fake company they set up and future strategies. Other pieces of company information were included in the emails such as logins and passwords, wage negotiations, and numerous other aspect of their internal business."
Torrent or it didn't happen (Score:5, Informative)
http://thepiratebay.org/search/mediadefender [thepiratebay.org]
http://torrents.thepiratebay.org/3806944/MediaDefender.Mail.200612.200709-MDD.3806944.TPB.torrent [thepiratebay.org]
enjoy !
Re:Distance? (Score:5, Informative)
Re:Distance? (Score:4, Informative)
Torrent Download (Score:2, Informative)
Re:Hahahaha, no. (Score:5, Informative)
Unclean Hands (Score:3, Informative)
I just had to dig up an old post of mine that needed reposting...
Msg: 35175 of 43019 7/9/2007 4:27:06 AM Recs: 32 Sentiment: Not Disclosed
By: Boyle M. Owl Send PM Profile Ignore Add To Favorites
Legal Crows Come Home To Roost. Media Defender Says "We Didn't Mean It"
Media Defender backtracks on 'entrapment site'
It was all a terrible mistake
By Nick Farrell: Monday 09 July 2007, 07:14
THE MOVIE industry's private dick division has denied that it set up a P2P site designed to catch people pirating.
Media Defender admitted that it set up a site, called MiiVi, which looked exactly like a P2P site but claimed it was never meant to go live and was not designed to entrap pirates.
According to Ars Technica, Media Defender claimed the story has been blown far out of proportion and was started by sites like The Pirate Bay and TorrentFreak. MediaDefender's Randy Saaf told Ars Technica the story was "completely made up".
Well, not completely made up. He said Media Defender was working on an internal project that involved video and didn't realise that people would be trying to go to it and being a security company it didn't password-protect the site.
Saaf said that it was not an entrapment site, and Media Defender was not working with the MPAA on it. He claimed that the MPAA didn't even know about it.
However Ars asked theme why MediaDefender immediately removed all contact information from the whois registry for the domain if the site was so innocent. Saaf said that it was afraid of a hacker attack or people sending it spam.
It is not clear what Saaf was planning to do with all the details of would-be P2P users who might have logged into the site while it was accidently online or if anything was collected.
-------
Not an entrapment site? Walks like a duck...
Yeah, uh, Media Defender (nee Sentry) is in a heap of trouble because it gives the MPAA two things:
An unclean left hand and an unclean right hand. Media Defender's software installed a secret scanner that uploaded data on any "copyrighted files" to MPAA goons that may have resided on the computers of the dupes who went there.
You can't be breaking into people's computers and violating things like RIGL 11-52-3 by installing nefarious software. Many states have similar laws, and some states have laws specifically against spyware. "Evidence" gathered with unclean hands (this is an actual legal term and concept) angers judges to no end. Any "evidence" by the MPAA shown to be gathered by Media Defender now is under a very dark cloud.
That's why Media Defender is in deep shit. They committed felonies _and_ screwed their client. Thus all the "we didn't know people would actually _go_ to our honeypot"
Whoops.
--
BMO
-------
Fast forward to today...
http://thepiratebay.org/tor/3806944/MediaDefender.Mail.200612.200709-MDD/ [thepiratebay.org]
And now it's proven that they really _did_ set it up as a honeypot. This weekend has turned out pretty good so far.
Hats off to the leaker. Now the _feds_ might have something to go after MediaDefender and the MPAA with. Oh, what delicious irony, with cream and sugar.
--
BMO
Torrent Comments (Score:4, Informative)
Re:Distance? (Score:5, Informative)
If they hadn't set up the website, this specific "crime" COULDN'T have happened.
Think about what you said, with respect to, for example, VICE squads:
"Would Joe have been busted for possession of marijuana if the cop didn't sell it to him? In all probability he would have; it would just have happened elsewhere."
This is incorrect. It would NOT have happened; he MIGHT have been busted for possession of OTHER marijuana sold by someone else. On the other hand, he might not.
All of this is moot anyway, as you can't be entrapped in civil court. If they passed federal charges (under the DMCA), then an entrapment suit might possibly be in order if those entrapping were operating "above the law". Otherwise, either THEY were committing a crime by distributing the content, or those downloading weren't committing a crime as they would have been given legal permission to download the data. The worst thing they could be asked to do if those distributing the data didn't have permission to do so would be to remove their copy from their computer by the court. Of course, in most sane countries, possession of copywritten data isn't a crime, infringement, or anything similar; only distribution is. All you can be sued for is breach of contract in civil court (assuming there was some sort of contract).
Re:I wonder who did it (Score:3, Informative)
And the password of said account was *drumroll* blahbob.
Re:They seemed to appreciate utorrent (Score:5, Informative)
It seems like it's basically a distributed network of clients that feed garbage data, trying to slow down everyone's downloading. Sadly for them it seems that uTorrent defeated [utorrent.com] their work:
Re:They seemed to appreciate utorrent (Score:5, Informative)
Re:Distance? (Score:5, Informative)
Interdiction (Score:5, Informative)
Four main methods
Decoying. This, in a nutshell, is the serving of fake files that are generally empty or contain a trailer. The goal is to make legitimate content a needle in a haystack, so MediaDefender works hard to ensure that its copies of files show up in the top ten spots when certain keywords are searched for. Everything about the file is tailored to look like the work of pirates, from the file size (movies are often compressed enough to fit on a CD) to the naming conventions to the pirate scene tag. With massive bandwidth and plenty of servers, the company has little trouble in getting these decoy files to appear at the top of search results, but decoying has a down side: the bandwidth. Because MediaDefender actually serves these large but bogus files, it incurs a significant bandwidth bill by using this technique.
Spoofing. Spoofing sends searchers down dead ends. MediaDefender coders have written their own software that interacts with the various P2P protocols and sends bogus returns to search requests, usually directing people to nonexistent locations. Because most people only look at the top five search results, MediaDefender tries to frustrate their first attempts to download a file in hopes that they will just give up.
Interdiction. While the first two techniques try to prevent searchers from locating files, interdiction prevents distributors from serving them. The tool is generally used when media is leaked or newly released; the goal is to slow its spread in those crucial first days. MediaDefender servers attempt to create constant connections to the files in question, saturating the provider's upstream bandwidth and preventing anyone else from grabbing the data.
Swarming. Though he acknowledges the BitTorrent networks can be hard to disrupt, Lee points out that MediaDefender can use "swarming" to make life more difficult for users trying to download copyrighted content. BitTorrent works by using a hash file to reassemble a file from many pieces, each of which may have been downloaded from a different user. MediaDefender simply serves up its chunks of these files, but instead of providing the proper data, its chunks contain static or nothing at all. When the file is eventually reassembled by the user, it may contain clicks, silent spaces, or odd skips. This can make the viewing/listening experience less pleasurable, but it's most effective with software downloads since even small errors can prevent programs from running.
not an internal leak! (Score:3, Informative)
Re:Intentional? (Score:1, Informative)
Re:What's interesting about that (to me) is... (Score:2, Informative)
Re:It'll never be admissible in court. (Score:2, Informative)
Otherwise, if I thought that the police were about to crack down on my best friend's counterfeiting operation, I could just steal all the stuff related to the operation and drop it off at the police station, basically nullifying all of it as an illegal search.
The defense's best tactic would be to claim that there's no way to know if the messages have been tampered with (unless the originals can be subpeona'd off MediaDefender's systems). Though I'm sure MediaDefender is in a tailspin right now trying to figure out if they should be purging all the email from their systems quickly, or if there's already a substantial likelihood of legal action - which would forcing them at this point to retain all the related email they have today.
Re:What's interesting about that (to me) is... (Score:5, Informative)
The info on the intertubes is that Mr. Maris, otherwise known as The Putz of the Century, after having forwarded all his corporate mail to his Gmail account, signed up for one of the p2p forums he was "investigating" using that very Gmail address and the same password as his gmail account had.
And he did so from an IP address already known to belong to Media Defenders.
You figure out the rest.
Re:Interdiction (Score:3, Informative)
Re:How to open .mbox -- Step by Step (Score:2, Informative)
http://kb.wisc.edu/helpdesk/page.php?id=6436#500 [wisc.edu]
Adeptus
HTML Format :) (Score:5, Informative)
http://jrwr.hopto.org/ [hopto.org]
Link to deposition (Score:2, Informative)
http://yro.slashdot.org/article.pl?sid=07/09/14/1723253 [slashdot.org]
A direct link to the deposition is here:
http://info.riaalawsuits.us/umg_lindor_070223JacobsonDepositionTranscript.txt [riaalawsuits.us]
Warning: It's long, but inherently pornographic in nature as the "expert" witness isn't wearing any clothes by the end of it. Enjoy!
now with actual phonecalls (Score:2, Informative)