1oz61wa
1oz61wa
1oz61wa
You also want an ePaper? Increase the reach of your titles
YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.
Chapter 5<br />
en.wikipedia.org/wiki/Bandwidth_throttling) (last visited June 10, 2013); Damon Brown, “AT&T Wireless<br />
Bandwidth Throttling: The Backlash Has Begun,” PCWorld (Feb. 14, 2012) (available at http://<br />
www.pcworld.com/article/249952/atandt_wireless_bandwidth_throttling_the_backlash_has_begun.html); Chloe<br />
Albanesius, “Is Your ISP Throttling Bandwidth? Google Will Know,” PCWorld (Jan. 28, 2009) (available at<br />
http://www.pcmag.com/article2/0,2817,2339772,00.asp).<br />
68. Jeremy F. DeBeer and Christopher D. Clemmer, “Global Trends in Online Copyright Enforcement: A<br />
Non-Neutral Role for Network Intermediaries?,” 49 Jurimetrics 4 (2009).<br />
69. Id.<br />
70. See Juran Janus, “Congress Looks At Technology’s Role In Addressing Illegal File-Sharing On<br />
University Campuses,” IEEE USA Today’s Engineer (July 2007) (available at http://www.todaysengineer.org/<br />
2007/Jul/filesharing.asp).<br />
71. See Michael S. Sawyer, “Filters, Fair Use, and Feedback: User-Generated Content Principles and the<br />
DMCA,” 24 Berkeley Tech. L.J. 363 (2009) (available at http://papers.ssrn.com/sol3/<br />
papers.cfm?abstract_id=1369665).<br />
72. Sanna Wolk, “Filtering and Blocking of Copyright Infringement Works: A European Perspective,” Inha<br />
Int’l Forum 33 (2012) (available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2186751).<br />
73. See “YouTube Content ID” (available at http://www.youtube.com/t/contentid); “Dailymotion Content<br />
Protection” (available at http://www.dailymotion.com/legal/contentprotection); “YouKu Joins Broad Coalition in<br />
Support of UGC Principles,” PR Newswire (Mar. 7, 2011) (available at http://www.prnewswire.com/newsreleases/youku-joins-broad-coalition-in-support-of-ugc-principles-117512623.html).<br />
74. See, e.g., discussion of YouTube’s Content ID Program, above; Emir Efrati, “Reappearing on YouTube:<br />
Illegal Movie Uploads,” The Wall Street Journal at B1 (Feb. 7, 2013) (available at http://online.wsj.com/article/<br />
SB10001424127887324906004578290321884631206.html).<br />
75. Principles for User Generated Content Services (undated) (available at http://www.ugcprinciples.com).<br />
76. Courts in the United Kingdom have recently “ordered ISPs to block access to The Pirate Bay and<br />
Newzbin2, both file-sharing sites found by the courts to facilitate infringement on a massive scale.” See “Cases<br />
Wrestle with Role of Online Intermediaries in Fighting Copyright Infringement,” Center for Democracy &<br />
Technology (June 26, 2012) (available at https://www.cdt.org/policy/cases-wrestle-role-online-intermediariesfighting-copyright-infringement).<br />
77. See Public Knowledge, “Filtering Whitepaper: Limitations and Consequences” (undated) (available at<br />
http://www.publicknowledge.org/paper/pk-filtering-whitepaper_3); see also Mike Masnick, “As Expected,<br />
BitTorrent Providers Planning To Route Around Comcast Barrier,” Tech Dirt (Feb. 18, 2008) (available at http://<br />
www.techdirt.com/articles/20080215/171450267.shtml).<br />
78. Id.<br />
79. Compare Testimony of David Sohn (Senior Policy Counsel, Center for Democracy & Technology)<br />
before the House Committee on the Judiciary, Subcommittee on Intellectual Property, Competition and the<br />
Internet, on “Promoting Investment and Protecting Commerce Online: Legitimate Sites v. Parasites (Part 1),” Tr.<br />
at 29 (Mar. 14, 2011) (arguing that “there are serious technical and cybersecurity concerns. For example domain<br />
name blocking is technically incompatible with DNSSEC, which is a standard for protecting the security of the<br />
domain name system that has been a decade in the making and is just rolling out. In addition, the technologies<br />
that users—or, excuse me, the techniques that users would employ to circumvent blocking would create new<br />
cybersecurity risks as well.”) (available at http://judiciary.house.gov/hearings/printers/112th/112-<br />
153_65186.PDF) with Testimony of Daniel Castro (Senior Analyst, Information Technology and Innovation<br />
Foundation), before same, Tr. at 43 (Mar. 14, 2011) (“Some opponents of better enforcement of IP claim this<br />
will disrupt the Internet. I am here to tell you this claim is 100 percent false. The simple fact is that using DNS to<br />
block access to websites or servers is not particularly new or challenging. DNS redirection has been used for<br />
many years to block spam and bot nets and to protect users from malware. It is also widely used to provide<br />
parental control filters, correct typos in URLs and to provide improved search results.”) (available at http://<br />
judiciary.house.gov/hearings/printers/112th/112-153_65186.PDF).<br />
See, also, Electronic Frontier Foundation, “SOPA/PIPA: Internet Blacklist Legislation” (undated) (available at<br />
https://www.eff.org/issues/coica-internet-censorship-and-copyright-bill); Center for Democracy & Technology,<br />
“The Perils of Using the Domain Name System to Address Unlawful Internet Content” (Sept. 2011) (available at<br />
https://www.cdt.org/files/pdfs/Perils-DNS-blocking.pdf); Grant Gross, “SOPA Author to Remove ISP Blocking<br />
Provision,” PC World (Jan. 13, 2012) (available at http://www.pcworld.com/article/248171/<br />
sopa_author_to_remove_isp_blocking_provision.html).<br />
84