18.11.2014 Views

1oz61wa

1oz61wa

1oz61wa

SHOW MORE
SHOW LESS

You also want an ePaper? Increase the reach of your titles

YUMPU automatically turns print PDFs into web optimized ePapers that Google loves.

Chapter 5<br />

en.wikipedia.org/wiki/Bandwidth_throttling) (last visited June 10, 2013); Damon Brown, “AT&T Wireless<br />

Bandwidth Throttling: The Backlash Has Begun,” PCWorld (Feb. 14, 2012) (available at http://<br />

www.pcworld.com/article/249952/atandt_wireless_bandwidth_throttling_the_backlash_has_begun.html); Chloe<br />

Albanesius, “Is Your ISP Throttling Bandwidth? Google Will Know,” PCWorld (Jan. 28, 2009) (available at<br />

http://www.pcmag.com/article2/0,2817,2339772,00.asp).<br />

68. Jeremy F. DeBeer and Christopher D. Clemmer, “Global Trends in Online Copyright Enforcement: A<br />

Non-Neutral Role for Network Intermediaries?,” 49 Jurimetrics 4 (2009).<br />

69. Id.<br />

70. See Juran Janus, “Congress Looks At Technology’s Role In Addressing Illegal File-Sharing On<br />

University Campuses,” IEEE USA Today’s Engineer (July 2007) (available at http://www.todaysengineer.org/<br />

2007/Jul/filesharing.asp).<br />

71. See Michael S. Sawyer, “Filters, Fair Use, and Feedback: User-Generated Content Principles and the<br />

DMCA,” 24 Berkeley Tech. L.J. 363 (2009) (available at http://papers.ssrn.com/sol3/<br />

papers.cfm?abstract_id=1369665).<br />

72. Sanna Wolk, “Filtering and Blocking of Copyright Infringement Works: A European Perspective,” Inha<br />

Int’l Forum 33 (2012) (available at http://papers.ssrn.com/sol3/papers.cfm?abstract_id=2186751).<br />

73. See “YouTube Content ID” (available at http://www.youtube.com/t/contentid); “Dailymotion Content<br />

Protection” (available at http://www.dailymotion.com/legal/contentprotection); “YouKu Joins Broad Coalition in<br />

Support of UGC Principles,” PR Newswire (Mar. 7, 2011) (available at http://www.prnewswire.com/newsreleases/youku-joins-broad-coalition-in-support-of-ugc-principles-117512623.html).<br />

74. See, e.g., discussion of YouTube’s Content ID Program, above; Emir Efrati, “Reappearing on YouTube:<br />

Illegal Movie Uploads,” The Wall Street Journal at B1 (Feb. 7, 2013) (available at http://online.wsj.com/article/<br />

SB10001424127887324906004578290321884631206.html).<br />

75. Principles for User Generated Content Services (undated) (available at http://www.ugcprinciples.com).<br />

76. Courts in the United Kingdom have recently “ordered ISPs to block access to The Pirate Bay and<br />

Newzbin2, both file-sharing sites found by the courts to facilitate infringement on a massive scale.” See “Cases<br />

Wrestle with Role of Online Intermediaries in Fighting Copyright Infringement,” Center for Democracy &<br />

Technology (June 26, 2012) (available at https://www.cdt.org/policy/cases-wrestle-role-online-intermediariesfighting-copyright-infringement).<br />

77. See Public Knowledge, “Filtering Whitepaper: Limitations and Consequences” (undated) (available at<br />

http://www.publicknowledge.org/paper/pk-filtering-whitepaper_3); see also Mike Masnick, “As Expected,<br />

BitTorrent Providers Planning To Route Around Comcast Barrier,” Tech Dirt (Feb. 18, 2008) (available at http://<br />

www.techdirt.com/articles/20080215/171450267.shtml).<br />

78. Id.<br />

79. Compare Testimony of David Sohn (Senior Policy Counsel, Center for Democracy & Technology)<br />

before the House Committee on the Judiciary, Subcommittee on Intellectual Property, Competition and the<br />

Internet, on “Promoting Investment and Protecting Commerce Online: Legitimate Sites v. Parasites (Part 1),” Tr.<br />

at 29 (Mar. 14, 2011) (arguing that “there are serious technical and cybersecurity concerns. For example domain<br />

name blocking is technically incompatible with DNSSEC, which is a standard for protecting the security of the<br />

domain name system that has been a decade in the making and is just rolling out. In addition, the technologies<br />

that users—or, excuse me, the techniques that users would employ to circumvent blocking would create new<br />

cybersecurity risks as well.”) (available at http://judiciary.house.gov/hearings/printers/112th/112-<br />

153_65186.PDF) with Testimony of Daniel Castro (Senior Analyst, Information Technology and Innovation<br />

Foundation), before same, Tr. at 43 (Mar. 14, 2011) (“Some opponents of better enforcement of IP claim this<br />

will disrupt the Internet. I am here to tell you this claim is 100 percent false. The simple fact is that using DNS to<br />

block access to websites or servers is not particularly new or challenging. DNS redirection has been used for<br />

many years to block spam and bot nets and to protect users from malware. It is also widely used to provide<br />

parental control filters, correct typos in URLs and to provide improved search results.”) (available at http://<br />

judiciary.house.gov/hearings/printers/112th/112-153_65186.PDF).<br />

See, also, Electronic Frontier Foundation, “SOPA/PIPA: Internet Blacklist Legislation” (undated) (available at<br />

https://www.eff.org/issues/coica-internet-censorship-and-copyright-bill); Center for Democracy & Technology,<br />

“The Perils of Using the Domain Name System to Address Unlawful Internet Content” (Sept. 2011) (available at<br />

https://www.cdt.org/files/pdfs/Perils-DNS-blocking.pdf); Grant Gross, “SOPA Author to Remove ISP Blocking<br />

Provision,” PC World (Jan. 13, 2012) (available at http://www.pcworld.com/article/248171/<br />

sopa_author_to_remove_isp_blocking_provision.html).<br />

84

Hooray! Your file is uploaded and ready to be published.

Saved successfully!

Ooh no, something went wrong!