Want to read Slashdot from your mobile device? Point it at m.slashdot.org and keep reading!

 



Forgot your password?
typodupeerror
×
Security Communications The Internet Your Rights Online

Internal Emails of An RIAA Attack Dog Leaked 427

qubezz writes "The company MediaDefender works with the RIAA and MPAA against piracy, setting up fake torrents and trackers and disrupting p2p traffic. Previously, the TorrentFreak site accused them of setting up a fake internet video download site designed to catch and bust users. MediaDefender denied the entrapment charges. Now 700MB of MediaDefender's internal emails from the last 6 months have been leaked onto BitTorrent trackers. The emails detail their entire plan, including how they intended to distance themselves from the fake company they set up and future strategies. Other pieces of company information were included in the emails such as logins and passwords, wage negotiations, and numerous other aspect of their internal business."
This discussion has been archived. No new comments can be posted.

Internal Emails of An RIAA Attack Dog Leaked

Comments Filter:
  • by unity100 ( 970058 ) on Saturday September 15, 2007 @04:25PM (#20618519) Homepage Journal
    this is something big.

    real big.
  • by Aim Here ( 765712 ) on Saturday September 15, 2007 @04:33PM (#20618575)
    If you read the emails, apparently utorrent is their favourite torrent client, since it allows them to 'interdict' torrents, whatever that means. Whatever they're up to, that surely warrants a campaign to boycott the client in favour of free software torrent clients where these sorts of deficiencies can at least be fixed by anyone who cares.

    Oh, and the rumors of them being behind the spyware-encrusted ziptorrent were false; that one seems to have been MediaSentry's doing.
  • Re:Distance? (Score:5, Interesting)

    by Abalamahalamatandra ( 639919 ) on Saturday September 15, 2007 @04:39PM (#20618633)
    As people have said, entrapment only applies to law enforcement types.

    In the civil arena, I believe unclean hands [wikipedia.org] would be more applicable, especially if you can trace Media Defender back to the RIAA via contracts and such.
  • Re:Distance? (Score:5, Interesting)

    by Wordplay ( 54438 ) <geo@snarksoft.com> on Saturday September 15, 2007 @04:46PM (#20618709)
    I imagine that a clever lawyer could point out that they're attempting to sue over a transaction of which they were an active part. If I give you something outright, it would likely be impossible for me to sue to get compensation later. If I give it to you while wearing a disguise, I'm not sure that principle doesn't apply.

    A -really- clever lawyer could point out that since the RIAA has been documented as giving their stuff away, that anyone downloading from anywhere might have a reasonable belief that it was coming from the "authorized" source in disguise. I don't know that it would fly, but seems like there'd be a non-zero chance of diluting RIAA's argument in the entire body of cases.

    On a side note, seems like this would give the artists cause to sue the RIAA, for distributing their work in a manner that's likely not covered by their contract (though with artist contracts in RIAA member companies, who knows--maybe they have the right to give it all away for free.)
  • Are you sure? (Score:4, Interesting)

    by Xenographic ( 557057 ) on Saturday September 15, 2007 @05:06PM (#20618873) Journal
    I wonder if Ray Beckerman (NYCL) would be able to use this? He's been trying to get discovery about what MediaDefender is up to from the RIAA for ages, last I heard, and hasn't gotten jack. Considering they're now open to all, I wonder if they could be used in court?

    After all, you may remember how MediaDefender paid someone to hack into TorrentSpy's email. I'd call this turn-about...
  • by Aim Here ( 765712 ) on Saturday September 15, 2007 @05:11PM (#20618919)
    That's not the problem. The idea is that it's easier for MediaDefender to disrupt bittorrent when the other users are using utorrent.

    I don't know exactly what interdiction involves (it's a military term so I can make a guess) , but it seems to be an exploit in utorrent that they use to disrupt downloading of utorrent users. The less people use utorrent, the harder it is for MediaDefender to practice this 'interdiction'. MediaDefender seems to be quite worried every time a new version comes out, and they do try to get their customers to use utorrent when checking torrent sites to see that their files are being spoofed properly.

    Some of this stuff could conceivably be used by MD's customers to sue MediaDefender for deliberately misleading them as to the effectiveness of their spoofing, like this one, when Amy Winehouse' record company wants to come and see how well they're doing:

    From: Ben Ebert
    To: Randy Saaf; Tabish Hasan; Ben Grodsky; Jay Mairs
    Cc: qateam
    Sent: Wed Jun 27 09:23:42 2007
    Subject: Re: umgi

    Neil is asking for this now, let's give him amy winehouse on the sites I listed below. We need to make
    +sure they are usiny utorrent since our decoys are not as strong as they could be. If you can influence
    +the methodology have them download the top 15 with a short time frame like 2 hours.


    Oh, and their emails do show them avidly reading slasdot and Digg and the like whenever a scandal affects them. So hello and welcome, to all you grifters taking the piss out of corporate record executives in ineffective-but-lucrative-peer-to-peer-spoofing land!

  • OH RLY? (Score:5, Interesting)

    by BlueParrot ( 965239 ) on Saturday September 15, 2007 @05:39PM (#20619121)

    Its a pity we can't see what these paracites earn. I bet they earn more than us sysadmins :( Why hide what this scum thinks its worth.


    dev-salaries-18june2007.xls

    Sergio A. Alvarez 2,916.67 $70,000.00
    Linus Aranha 2,708.33 $65,000.00
    Dylan C Douglas 2,916.67 $70,000.00
    Benjamin Ebert 3,541.67 $85,000.00
    Norman T Heath 4,791.67 $115,000.08
    Sujay S. Jaju 2,708.33 $65,000.00
    Andrew H. Kim 2,291.67 $55,000.00
    Ivan Y Kwok 4,166.67 $100,000.00
    Jed Z. Levin 2,291.67 $55,000.00
    Gerald E. Rode 2,291.67 $55,000.00
    Sheetalkumar Shah 2,708.33 $65,000.00
    Nainesh N. Solanki 2,708.33 $65,000.00
    Daeyoung Song 2,375.00 $57,000.00
    Jeffrey W. Wang 2,375.00 $57,000.00

    You were saying? :p
  • Intentional? (Score:2, Interesting)

    by nurb432 ( 527695 ) on Saturday September 15, 2007 @05:42PM (#20619141) Homepage Journal
    Perhaps this was actually intentional, and the are using this team as a sacrificial lamb, so to speak.

    If you read thru the emails and get a idea of the potential scale of the operation, it might scare you away from p2p if you dont have any balls.. Perhaps thats the idea, to weed out the 'little people'?
  • by IgnoramusMaximus ( 692000 ) on Saturday September 15, 2007 @05:43PM (#20619161)

    That is laughable given what many in the slashdot crowd consider evil. Developing closed source software for example.

    "Evil" is an exaggeration. This dislike of closed-source comes from the fact that many here instinctively realize that information, such as computer programs, some forms of art, thoughts in people heads, large integer numbers etc, do not fall under the simplistic, inane attempts to mis-apply an economic model of a "market" to things which do not have the required attributes to become "private property" and thus are not subject to "trade".

    This does not mean that we believe that artists and software developers have to go hungry, but it does mean that the method by which various misguided businessmen (usually the middle-men peddling the art/science and not creating it themselves) expect to make their living is fatally flawed (primarilly because it was constructed by businessmen for businessmen, with no regards to anything else) and, in order to be "successful", demands positively immoral and dangerous to society activities, such as attempts at truly totalitarian measures in efforts to control the flow of information in society.

    As more and more people realize this, it is my hope that some time in the future this idiotic "copyright" regime will be replaced with something that actually reflects the nature of the information and the needs of the society.

    My personal favourite for art, for example, is a modernized "patronage" system, with direct transfer of donations by patrons of art to artists themselves. Sicence is, as it should, funded by academia and as soon as the for-profit scientific journals are dispised of (efforts in this direction are under way) it will be free from this nonsense. Performance arts have no problem whatsoever since the performers are expecting payment for their labour at the gate. Etc and so on.

    It is quite possible however that a better model exists. If so I am sure someone will come up with it. Whatever it is, the notions of "copyrights" and "patents" as they stand are ... well ... patent absurdities! And what we see is simple human reaction to that undeniable fact, particularly among the younger generation whose indoctrination in these mattters is not yet effective.

  • Re:Are you sure? (Score:5, Interesting)

    by SL Baur ( 19540 ) <steve@xemacs.org> on Saturday September 15, 2007 @05:45PM (#20619177) Homepage Journal

    I wonder if Ray Beckerman (NYCL) would be able to use this?
    I doubt it, but I'm not a lawyer and he is, so I'd expect him to Do The Right Thing.

    Actually, I'm in awe of him. I read the deposition he conducted earlier in the year against an RIAA "expert" witness yesterday (yeah, yeah mod me down for violating /. etiquette in not only reading TFA but also the attached links). Reading the transcript was even more fun than reading about SCO's chapter 11 filing. Brilliant man.
  • Re:Distance? (Score:2, Interesting)

    by Alwin Henseler ( 640539 ) on Saturday September 15, 2007 @05:54PM (#20619257)

    Yes I can see a prosecution of downloaders might be hampered by how they were caught, if they were handed (corrupted) files by copyright holders themselves (RIAA/MediaDefender or allies). But 2 points you may have missed:

    1) On a Windows system I've once seen a URL being opened as a direct result of playing some video file. Maybe there still exist similar leaks on many (unpatched) client systems out there, that allow arbitrary code execution. In that case: install some monitoring software, gather system info, identifiable data an so forth, and voila: you might proceed to prosecute that person not for sharing the video you handed him/her, but for all other illegal activity done using that computer. Failing that, an inside look in a file sharer's machine could be very helpful for rights holders.

    2) By feeding corrupted downloads to users, you make their experience less satisfying, so that said users may turn away from using things like BitTorrent. Or give BT / file sharing in general a bad reputation (as in: works difficult, downloads often crap). That would also serve your purpose (although I expect the result to be minimal unless you succeed in causing mayor disruption of the file sharing network).

    --Don't tell me this sounds good, and you won't me on your team. Up yours! File sharing may be illegal in some cases, but in general I don't feel it's unethical, or that it helps society at large to prevent it. Try and convince me otherwise, with solid arguments.

  • by Animaether ( 411575 ) on Saturday September 15, 2007 @06:27PM (#20619457) Journal
    okay, so Mr. Maris wasn't the sharpest tool in the shed in forwarding the stuff to a gmail account.

    However... assume the the group/person releasing this did at least have a gmail e-mail address for this guy, he still wouldn't have the password.
    Now, it's not a very strong password - it can certainly be cracked easily by a dictionary or even a brute force attack.

    But if either of those methods are what were used - then what's up with Google apparently not stopping this in one way or another? E.g. maximum of N login attempts in a given time, notifying the rightful account holder of the attempts, etc.?
  • Gold Jerry, Gold! (Score:5, Interesting)

    by MtlDty ( 711230 ) on Saturday September 15, 2007 @09:22PM (#20620913)
    I like this one. It seems the record companies try to get marketing data from illegal p2p downloads. ---------- Subject: Nicole Scherzinger Date: Fri, 24 Aug 2007 15:14:31 -0700 Nicole from pussy cat dolls has a single called "whatever u like". It's not selling well on itunes or playing that great on radio. A song called "Baby Love" just leaked (I don't know how long ago). Interscope wants to know if Baby Love is picking up steam on p2p. They need to make a decision by early next week on whether they should switch to this song as the single. Please get me a score comparison on Monday for these two tracks. Also, please put beyonces, fergie, gwen, and nelly furtado singles as comparisons.
  • Re:Distance? (Score:3, Interesting)

    by Goaway ( 82658 ) on Saturday September 15, 2007 @09:28PM (#20620947) Homepage
    Now, I did not read the actual emails yet beyond the summary, but that contains a hint most people are missing. The goal of this isn't to entrap people for downloading material. That idea is dumb, everybody knows it, and these people aren't so dumb they think that would work.

    No, what I see hints of is that their client would contain code to disrupt OTHER P2P networks. Their efforts to disrupt traffic are easily thwarted by blocking their IP ranges. What they might be going for is creating a botnet of sorts, so they can attack from entirely random IPs.

    And that's the thing they don't want getting out at any cost.
  • Re:Distance? (Score:3, Interesting)

    by dgatwood ( 11270 ) on Saturday September 15, 2007 @11:12PM (#20621647) Homepage Journal

    I think you missed the point. The movie company knows that the very act of downloading it causes you to redistribute to other people. Therefore by distributing it in that fashion, they are agreeing to allow the content to be obtained with the knowledge that doing so will cause you to redistribute the content, and therefore they are effectively agreeing to allow you to redistribute the content.

  • by Myria ( 562655 ) on Sunday September 16, 2007 @12:32AM (#20622157)
    You're right that you couldn't directly use these emails in court, but that's more because it's hearsay than because it's stolen. However, during discovery, you could subpoena these particular emails to get legally sanctioned copies then use those in court. MediaDefender would have a hard time proving that they don't exist or that the requested emails are irrelevant.

    warning: I'm not a lawyer.
  • by 19thNervousBreakdown ( 768619 ) <davec-slashdot@@@lepertheory...net> on Sunday September 16, 2007 @04:59AM (#20623577) Homepage

    And you, sir, are a walking, talking, slashdot-posting parody of yourself, who apparently learned everything he knows about the mindset and behavior of corporate officers from Jeep commercials.

    Me, I learned it by interacting with them personally and professionally way more than I ever wanted to on a day-to-day basis over the majority of my career, and my experience is that the grandparent is dead-on. The whole system is some screwed-up incompetence engine fueled by narcissism bathed in the infinite oxidizer of a personality almost entirely driven by a super-ego that hasn't matured a day since puberty stopped.

    P.S.
    They all play golf.

  • by Anonymous Coward on Sunday September 16, 2007 @08:55AM (#20624677)

    I get cold sweat when I think on my days of youth, when I actually believed the same sanitized, propagandistic crap you seem to believe. But I don't blame you for your naivette. Unless you were born into this rarefied socialite club or are grudgingly admitted to it via marriage or some astronomically unlikely random coincidence (which you will prompty ascribe to your own infallable iron wit of which the mere peons are bereft of, as is the prevailing custom in those circles), you will learn eventually.


    This comment is like the GBU-28 bunker buster of reality. Man I wish you weren't right, but you are.

    You should see defense contracting, with its own little circle jerk of mutual admiration with the goal of making lots of bucks while doing as little as possible. And it works! A bunch of ex-flag officers running the show with some so-called "engineers" in the mix performing "software maintenance" (in other words, working on shit that doesn't work, never will, and even if it did it performed a task that was appropriate in the chill of the cold war 70s).
  • by Anonymous Coward on Sunday September 16, 2007 @10:46AM (#20625427)

    most execs are lazy farts who talk a storm about "sports" but usually restrict themselves to swinging clubs and copiously drinking


    Right on, you hit that on the mark, but I wouldn't limit that to just execs. I am surround by neighbors who try to relive their glory days of high school JV football every day by shouting at the TV screen on the weekend while downing Coors Light in their sweater vests. Ironically as much "sports" as they talk, the only sport they do play is golf.

"What man has done, man can aspire to do." -- Jerry Pournelle, about space flight

Working...