PFF Says BU Helps Terrorists By Not Handing Over Students To RIAA

from the today's-shill-brought-to-you-by... dept

I really try to avoid reading the Progress & Freedom Foundation's intellectual property blog, because it just raises my blood pressure with a near constant stream of highly misleading arguments or just purely ridiculous claims. However, Tim Lee points out that Tom Sydnor is up to his usual tricks of taking some bit of news, twisting the context around completely, leaving out fairly important details and coming up with a conclusion that doesn't even add up from his own twisted reasoning. This time, it's about the recent story where a judge correctly dropped RIAA lawsuits against some Boston University students after the school noted that it could not identify who the alleged infringers were with certainty.

This set off quite the rant from Sydnor, who claims that this now means that BU's network is a "safe harbor" for "terrorists, pedophiles, phishing-scheme operators, hackers [and] identity thieves" by giving them a "get out of jail free" card. This is similar to those silly and easily disproved arguments from years ago that open WiFi would allow criminals to all get away with any online crimes they wanted.

This makes two faulty assumptions that Sydnor either knows and ignores, or is ignorant about (neither of these are good options). First, it assumes that all of those other activities wouldn't leave any other trail. That, of course, is ridiculous. Your network usage is hardly the only bit of information all of those other criminal uses leave. Second, it assumes that every person on a network is easy to identify. In fact, it's quite difficult to establish, with any degree of certainty, who a particular IP address belongs to. Thanks to a variety of different factors, an IP address is not at all a good identifier of who is doing something online. This has been one of our problems with lawsuits relying on such info. It's notoriously unreliable, leading to many bogus charges (collateral damage to supporters like Sydnor, apparently, but not to those of us who believe in actually having evidence before accusing someone of a crime). It also does not mean, as Sydnor claims, that BU network administrators are "incompetent." It just means they're honest.

But, rather than face up to any of those facts, Sydnor skips over them and goes for the emotional charge:
Perhaps the U.S. Departments of Justice and Homeland Security should explain the broader implications of this ruling to BU before clumsy efforts that coddle student piracy help get someone defrauded, molested, or killed. BU's IT Department might also consider the potential legal implications of acts that tend to conceal the identity of lawbreakers.
Yes, or perhaps anyone with a bit of common sense could explain to Sydnor how networks work and the difference between not being able to identify a user vs. "concealing the identity of a lawbreaker." Apparently, based on Sydnor's twisted reasoning here, any network operator who cannot identify each and every user on its network may be guilty of being an accessory to a crime. Sydnor, who rushes to point to legal precedents supposedly (though often not really) supporting his position at every opportunity, somehow misses out on the right to anonymity which has been established many times in court. But why let little things like facts and reality get in the way of claiming that a reasonable response from BU sysadmins is going to lead to a safe haven for terrorists and pedophiles and criminal charges against BU network operators?


Reader Comments (rss)

(Flattened / Threaded)

  •  
    icon
    James (profile), Dec 5th, 2008 @ 4:55pm

    I can tell you who had an IP address on a given day and time for seven years. Damn, logs people,logs. They do not lie.

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      IP Spoof, Dec 5th, 2008 @ 6:22pm

      Re:

      "logs. They do not lie."

      I assume you are are being somewhat serious ... this of course could be incorrect.

      The point being that one can lie to the logs.

       

      reply to this | link to this | view in chronology ]

    •  
      icon
      PaulT (profile), Dec 6th, 2008 @ 12:30am

      Re:

      Unless they do. (http://en.wikipedia.org/wiki/IP_address_spoofing)

      Maybe your logs will show who had leased the IP address at any one time correctly (assuming nobody's tampered with the logs). That doesn't mean that the correct IP address is being investigated to begin with. Remember the case a few months ago where a college was accused of downloading copyrighted files, but the IP address belonged to a laser printer?

      I'd hope that you're not the sys admin of any company I work for if you're that easily fooled by fake information, and apparently willing to give people up based on such flimsy evidence.

       

      reply to this | link to this | view in chronology ]

    •  
      identicon
      Gorshkov, Dec 9th, 2008 @ 3:47am

      Re:

      I can tell you who had an IP address on a given day and time for seven years. Damn, logs people,logs. They do not lie.
      You can tell what ACCOUNT had a given IP address on any given time of day .... assuming all clocks involved were in sync, and you actually know the time to look for in the logs. But that doesn't tell you WHO was in front of the computer at the time - or even *what* computer, if you're dealing with an internal, NATed network.

       

      reply to this | link to this | view in chronology ]

    •  
      identicon
      ike, Dec 16th, 2008 @ 12:14am

      Re:

      I can tell you who had an IP address on a given day and time for seven years.

      No, you can tell which client pays the bill for the IP.

      Which of the household's computer initiated the connection or was it via the WiFi? Was it a person in the household that initiated the connection, or was it software (trojan, proxy, etc)? And if it was a person, which member of the household initiated the connection, or was it a guest? Knowing the IP doesn't answer any of those questions.

       

      reply to this | link to this | view in chronology ]

  •  
    identicon
    inc, Dec 5th, 2008 @ 4:55pm

    He also apparently doesn't know about http://www.torproject.org/

    BU should prob hide all their IPs so the RIAA doesn't see BUs IPs anymore.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Coward, Dec 5th, 2008 @ 5:20pm

    piracy as a 'gateway-drug' ???

    "clumsy efforts that coddle student piracy help get someone defrauded, molested, or killed"

    I never knew that piracy was a 'gateway-drug' to rape and murder.

    huh. i learn something new every day.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    du2vye, Dec 5th, 2008 @ 5:33pm

    before clumsy efforts that coddle student piracy help get someone defrauded, molested, or killed."

    Ha! The obvious is take him up on his threat and see how long it takes.

    Uh, yea right. How come "THEY" never have to prove their claims?

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    OldGeek, Dec 5th, 2008 @ 5:50pm

    Uneducated

    Well this proves that he hasn't been in college or on a campus with any type of laptop. Anyone who's done they're homework and tried to upload it to the professors site knows just how well the network runs. All the youngin's I'm in school with wait till they get home to do any serious downloading, it beats an overloaded school network.

     

    reply to this | link to this | view in chronology ]

  •  
    icon
    Ray Beckerman (profile), Dec 5th, 2008 @ 6:29pm

    The Shill

    Nice article, Mike.

    Fortunately I don't think anybody cares what that shill for the Big 4 record companies and Big 6 film companies has to say.

    He is a whore.

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      Anonymous Coward, Dec 5th, 2008 @ 9:10pm

      Re: The Shill

      Mr. Beckerman,

      Some months ago you felt (and with clear justification) you had been professionally slighted on this site. An apology was promptly given.

      No matter what one's views may be with respect to Mr. Sydnor's opinions, I do believe he deserves the same courtesy of being treated respectfully.

      Perhaps you may wish to consider revising your comment with this in mind.

       

      reply to this | link to this | view in chronology ]

      •  
        identicon
        SomeotherAC, Dec 6th, 2008 @ 9:05am

        Re: Re: The Shill

        Dear AC,

        With all due respect, how do you know the post you responded to was actually made by the real Ray Beckerman ?

         

        reply to this | link to this | view in chronology ]

        •  
          identicon
          Anonymous Coward, Dec 6th, 2008 @ 10:49am

          Re: Re: Re: The Shill

          A fair point that I failed to consider. Thank you for pointing it out.

          Merely FYI, I made the assumption (perhaps in error) that Mr. Beckerman was the source of the comment given that in the very few instances he has commented here he has always done so using his full name and the URL associated with his blog site.

           

          reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous Howard, Dec 5th, 2008 @ 10:32pm

    Re: The Shill

    Yes, please revise your comment to:

    He is a worthless piece of s#@t whore.

    More accurate.

     

    reply to this | link to this | view in chronology ]

  •  
    icon
    Peter Blaise Monahon (profile), Dec 6th, 2008 @ 6:42am

    Unreasonable fear superscedes reasoned logic every time!

    .

    Peter Blaise responds:

    This is the Rush Limbaugh syndrome where someone links three consecutive sentences only by saying them quickly in succession, otherwise there is no underlying logic whatsoever that could possibly tie them together.

    In Catholic grammar school, I saw this all the time: "If I let YOU go the bathroom, I'll have to let EVERYONE go to the bathroom, then there will be CHAOS." Conclusion? Sit down and hold it till the end of class. Result? Kidney stones!

    BS then as now. In fact, that's all Catholic school ever really helped me refine is a BS filter a mile thick.

    .

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Gabriel, Dec 6th, 2008 @ 5:51pm

    It still really, really bothers me that these people seem to be operating from a fundamental assumption that everything we do online can, in fact, be tracked.

    The fact that they're affiliated with many of the companies whose websites who do a lot of online tracking, makes me wonder if they're operating from a position of practical knowledge in this regard.

    Democracy only works when you have privacy. These people seem to tacitly assume that there is no such thing. I wonder if they know something we don't.

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      Anonymous Coward, Dec 9th, 2008 @ 3:53am

      Re:

      It still really, really bothers me that these people seem to be operating from a fundamental assumption that everything we do online can, in fact, be tracked.
      The fact that they're affiliated with many of the companies whose websites who do a lot of online tracking, makes me wonder if they're operating from a position of practical knowledge in this regard.
      Short answer: No, they are not - and no, they can't.
      Working for a company that does a lot of tracking does NOT imply any special knowledge ..... think of a secretary working for Ford or GM - do you really think that secretary knows how to design or build a car?

       

      reply to this | link to this | view in chronology ]

  •  
    identicon
    Duodave, Dec 6th, 2008 @ 7:43pm

    Just because we can, doesnt mean we should

    Ages and ages ago when computers were first designed maybe every computer should have been built with cameras, eye scanners and fingerprint scanners. Then, maybe we could have established with some certainty, who was using them at any given time.

    But no, we didn't do that. The early inventors of computers never foresaw the need for that. The inventors of the internet didn't foresee the need for archival identification using IP addresses, either. It's only now people are trying to forensically associate IP addresses with identities - and it's like putting a square peg in a round hole. Not an exact fit.

     

    reply to this | link to this | view in chronology ]

    •  
      identicon
      You can't be serious, Dec 7th, 2008 @ 9:03am

      Re: Just because we can, doesnt mean we should

      Even if the early inventors had seen the need, it still would be impractical, unethical and easily circumvented.

      BTW, there is no NEED for id of computer users. There is a desire on the part of advertisers, and there is a attempt on the part of government - in the name of fighting terror, drugs, child pron, etc, etc, (insert latest OMG item of the day).

      Even if they had such surveillance capabilities, it would only affect the typical, mostly honest, users. The nefarious would find ways around it.

       

      reply to this | link to this | view in chronology ]

  •  
    identicon
    Anonymous of Course, Dec 8th, 2008 @ 7:44am

    Progress and Freedom?

    The Progress & Freedom Foundation has nothing to do with
    either. Like so many front organizations, the name itself
    is a tip off. Blatant newspeak, sctually becomes parody
    of what it was intended to be.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Matthew Miller, Dec 8th, 2008 @ 8:52am

    so, the point is...

    Of course BU has logs, and perfectly reasonable ones. And BU was required to provide them to the judge, who and made the (impressively tech savvy) determination that DHCP matchings aren't sufficient to demonstrate that a given _person_ was behind a certain activity from that IP address at a given time. And therefore that turning those logs over to the RIAA would very likely produce an unreasonable legal burden on completely innocent students.

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    me, Dec 8th, 2008 @ 8:56am

    this man is a fucking idiot

    IDIOT!!!!!!!!!!!!!!!!!

     

    reply to this | link to this | view in chronology ]

  •  
    identicon
    Hasatan, May 13th, 2011 @ 9:09am

    Seems to me that rather than relying on a frequently changing network address, which identifies a CONNECTION on the network, not WHO is using that connection, security should be implemented on the HUMAN level, like using badges at the door or some other means of security so you know who the PERSONS are using your equipment.

     

    reply to this | link to this | view in chronology ]


Add Your Comment

Have a Techdirt Account? Sign in now. Want one? Register here
Get Techdirt’s Daily Email
Save me a cookie
  • Note: A CRLF will be replaced by a break tag (<br>), all other allowable HTML will remain intact
  • Allowed HTML Tags: <b> <i> <a> <em> <br> <strong> <blockquote> <hr> <tt>
Follow Techdirt
A word from our sponsors...
Essential Reading
Techdirt Reading List
Techdirt Insider Chat
A word from our sponsors...
Recent Stories
A word from our sponsors...

Close

Email This