Internet Countermeasures  Effectiveness Assessment Anti-Piracy Technical Operations March 17th – March 31 th.

Slides:



Advertisements
Similar presentations
P2P Market Conference March 2009 Mitchell Edwards CFO & GC BitTorrent, Inc.
Advertisements

MediaDefender 1 From Anti-Piracy to Promotion What weve tried What has worked, and what hasnt Branding Campaigns.
Making P2P Networks Scalable a paper presentation by Derek Tingle.
Your McGraw-Hill Course Solution for {insert Course # and Name here} Your online training and assessment solution for introductory computing concepts,
Clayton Sullivan PEER-TO-PEER NETWORKS. INTRODUCTION What is a Peer-To-Peer Network A Peer Application Overlay Network Network Architecture and System.
DailyMed Stuart J. Nelson, MD, FACP, FACMI National Library of Medicine National Institutes of Health.
Beating Back the Assault Scott O’Connell Nixon Peabody Boston, MA Manchester, NH Attorney Client Privilege.
What is Digital Piracy? Digital piracy is a form of online piracy and includes the unauthorized online distribution of electronic copies of copyrighted.
Page 1 County of Los Angeles Corrective Action Plan Program Enhancements John Sterritt CEO Risk Management.
A) 80 b) 53 c) 13 d) x 2 = : 10 = 3, x 3 = 309.
& OLSON LLP ATTORNEYS AT LAW. & OLSON LLP ATTORNEYS AT LAW.
P2P gets married to Social Networks Minh Nguyen TELECOM SudParis
Interest in File Sharing at All Time High Article Link Article Link.
Academic Advisor: Dr. Yuval Elovici Technical Advisor: Dr. Lidror Troyansky.
© 2015 Jones and Bartlett Learning, LLC, an Ascend Learning Company All rights reserved. Security Policies and Implementation Issues.
Steps to Compliance: Risk Assessment PRESENTED BY.
Collaborating for Access Strategies for Processing the MALDEF and CRLA Records Joseph Geller, Project Archivist Society of American Archivists August 9,
Free Powerpoint Templates Page 1 Free Powerpoint Templates Peer-2-Peer File Sharing Kenie Moses TECH621Social Internet Spring 2011.
Social Media Tools for Citizen Interaction Reach for the Gold NCARD 2011 Boone, NC September 13,2011 Terry Bledsoe, Chief Information Officer, Catawba.
English Language Arts (ELA) and Fine Arts Eighth Grade Barracudas Room 108 Jen Austin x108.
Introduction Widespread unstructured P2P network
Privacy in P2P based Data Sharing Muhammad Nazmus Sakib CSCE 824 April 17, 2013.
A Survey of P2P Filesharing Applications James Kirk CS February 3, 2004.
Peer to Peer Network Anas Hardan. What is a Network? What is a Network? A network is a group of computers and other devices (such as printers) that are.
BitTorrent Internet Technologies and Applications.

Cs423-cotter1 P2P Discovering P2P (Miller) Internet.
Peer-to-Peer Networking. Presentation Introduction Characteristics and Challenges of Peer-to-Peer Peer-to-Peer Applications Classification of Peer-to-Peer.
ITIS 1210 Introduction to Web-Based Information Systems Chapter 38 How Music Sharing and File Sharing Work.
DATA PROTECTION IN THE AGO Christina Beusch Deputy Attorney General WA State Attorney General’s Office.
Malware in Popular Networks Dmitry O. Gryaznov. The Big Change ► Mostly viruses, few trojans ► Obvious destructive or annoying payload ► Mischief and.
Vulnerabilities in peer to peer communications Web Security Sravan Kunnuri.
BEN Architecture Isovera Consulting Feb Internet consulting for non-profits 2 BEN Architecture Diagram.
Mark Williams-Thomas MA Director - WT Associates Ltd.
Amy B Reed, MD Chair, ABS VSITE Committee.  Vascular Surgery In-Training Examination  Developed by APDVS and ABS/VSB in 2007  First examination given.
MIDTERM EXAM REVIEW SHEET. Review Sheet Where (what legal places) can you share digital information via computers? How are computer files shared with.
Attorney-Client Privilege Issues
Imaging Technology in Claims Litigation April 23, 1998 Carol E. Morse, CPCU Fireman’s Fund Insurance Company.
1 IT Governance 2006 Strategy/Business Case Presentation Office of Fair Employment Practices.
Problem Based Learning Project Presented by Penny Reagan, Elizabeth Stewart & Stephanie Watkins.
Part 3: Internet Applications The Basics of Networking, Part 3 chapter 3.
VS.  The Internet was created in the 1970’s by the Pentagon.  It was designed to be used as an alternate means of communication during wartime.  The.
Copyright © 2014 by The University of Kansas Increasing Access for People with Physical Disabilities.
© Copyright 2010 Hemenway & Barnes LLP H&B
Pre-Requisite and Equivalency for Bus 103 By Sita Motipara.
Peer-to-Peer Networks 01: Organization and Introduction Christian Schindelhauer Technical Faculty Computer-Networks and Telematics University of Freiburg.
Moved to Separate Deck So the students will have the content for future reference To make it easy to segue if/when the conversation takes us here.
Quentis Scott IT Specialist - Section 508 Coordinator General Services Administration Office of the Chief Information Officer Washington, D.C. Developing.
Accessible Instructional Materials AIMs. Accessible Instructional Materials Glossary Check What do these acronyms stand for? AIM AMP APH AU Chaffee Amendment.
Assignment Examples of Portfolios using wikispaces
Your McGraw-Hill Course Solution for Dr. King’s MGMT i, -91i, -92i Southeastern Louisiana University Your online training and assessment solution.
Strategic Agenda We want to be connected to the internet……… We may even want to host our own web site……… We must have a secure network! What are the.
For first time users only, Passcode is on the back of your handout.
2015 Hon. Michael Williamson, M.D. Fla. Maria Ellena Chavez-Ruark, Saul Ewing LLP Prof. Laurie L. Levenson, Loyola Law School, Los Angeles Joint Defense,
Your McGraw-Hill Course Solution for MGMT 210 Southeastern Louisiana University Your online training and assessment solution for introductory computing.
Virtual Oregon Natural Resources Data Clearinghouse Strawman Functional Requirements 4/9/03 Overall goal: Make Oregon natural resources data readily available.
Harnessing P2P Power in the Classroom Julita Vassileva Department of Computer Science University of Saskatchewan, Canada.
Public sector PR Mixit Podcast Simon Wakeman Medway Council.
UNIT 4 Security Protocols. Seminar Topics Assignments this week Metadata – what is it? Security Protocols Next week—no seminar, no discussion—MIDTERM!!!
Presented by - Appsolz.com Mobile Apps for Business Growth.
Let’s look more closely at the reports you can access to monitor your students. In the tabs across the top of the page, select “Reports”. We’ll look at.
O REGON P UBLIC R ECORDS & M EETINGS L AW Citizens Education & Advocacy 2016.
wvcors.tedis-wv.org - current wvcors01.cors.us - soon.
Ever observe content or text styles on the Internet that you were occupied with utilizing for your own work? This article is here to demonstrate to you.
מפגש וירטואלי- מורי לשון והבעה הפרק "אוצר המילים והמשמעים"
At Software Download Help, you will get to know about all the processes from downloading to installation at just one place without wasting even a bit of.

Teen Worker Safety Project
Permission for this presentation is currently restricted. If you are not running Microsoft Office 2003 or an application that supports presentations with.
Presentation transcript:

Internet Countermeasures  Effectiveness Assessment Anti-Piracy Technical Operations March 17th – March 31 th

Anti-Piracy Technical Operations 2 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication Heroes Bittorrent Users: n/a download: 1-2 (hours) eDonkey Users: 3.9 Million download: 4-23 (hours) Ares Users: 3.4 Million download: 1-15 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 35%75%30%0% Attempts20 # of Content Files Acquired Search Term(s)heroes * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 3 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication Battlestar Galactica Bittorrent Users: n/a download: 1-6 (hours) eDonkey Users: 3.9 Million download: (hours) Ares Users: 3.4 Million download: n/a (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 55%40%0% Attempts20 4 # of Content Files Acquired Search Term(s) Battlestar galactica 03 * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 4 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication The Office: An American Workplace Bittorrent Users: n/a download: 1-6 (hours) eDonkey Users: 3.9 Million download: 8-22 (hours) Ares Users: 3.4 Million download: n/a (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 30%45%0% Attempts # of Content Files Acquired 6900 Search Term(s)The office US 18/17The office US * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 5 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication House MD Bittorrent Users: n/a download: n/a (hours) eDonkey Users: 3.9 Million download: (hours) Ares Users: 3.4 Million download: n/a (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 0%10%0% Attempts20 # of Content Files Acquired 0200 Search Term(s)House md 13/14/15House md * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 6 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication Law & Order: Special Victims Unit (SVU) Bittorrent Users: n/a download: 1-14 (hours) eDonkey Users: 3.9 Million download: n/a (hours) Ares Users: 3.4 Million download: n/a (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 20%*0% Attempts20 # of Content Files Acquired 4000 Search Term(s)Law and order svu * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 7 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication 30 Rock Bittorrent Users: n/a download: 1-2 (hours) eDonkey Users: 3.9 Million download: (hours) Ares Users: 3.4 Million download: n/a (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 56%20%0% Attempts # of Content Files Acquired Search Term(s)30 rock; 30 rock 1730 rock30 rock 17; 30 rock30 rock * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 8 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication The Black Donnelleys Bittorrent Users: n/a download: 5-7 (hours) eDonkey Users: 3.9 Million download: 5-21 (hours) Ares Users: 3.4 Million download: 1-2 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 35%85%50%0% Attempts # of Content Files Acquired Search Term(s)Black donnellys * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 9 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication Saturday Night Live Bittorrent Users: n/a download: 2-11 (hours) eDonkey Users: 3.9 Million download: n/a (hours) Ares Users: 3.4 Million download: 9 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 35%0%6%0% Attempts # of Content Files Acquired 7010 Search Term(s) Saturday night live 32 Saturday night live * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 10 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication The Hitcher Bittorrent Users: n/a download: 4-13 (hours) eDonkey Users: 3.9 Million download: (hours) Ares Users: 3.4 Million download: n/a (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 30%*11%0% Attempts # of Content Files Acquired 6200 Search Term(s)The hitcher 2007 * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 11 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication Smokin’ Aces Bittorrent Users: n/a download: 2-5 (hours) eDonkey Users: 3.9 Million download: 4-19 (hours) Ares Users: 3.4 Million download: 9 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 40%35%5%0% Attempts20 # of Content Files Acquired 8710 Search Term(s)Smokin aces * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 12 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication The Good Shepherd Bittorrent Users: n/a download: 1-14 (hours) eDonkey Users: 3.9 Million download: 8-20 (hours) Ares Users: 3.4 Million download: 1-6 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 20%*50%20%0% Attempts20 # of Content Files Acquired Search Term(s)The good shepherd * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 13 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication Breach Bittorrent Users: n/a download: (hours) eDonkey Users: 3.9 Million download: (hours) Ares Users: 3.4 Million download: 5-13 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 11%12%24%0% Attempts # of Content Files Acquired 2240 Search Term(s)Breach * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 14 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication Accepted Bittorrent Users: n/a download: 4-16 (hours) eDonkey Users: 3.9 Million download: 8-21 (hours) Ares Users: 3.4 Million download: 4-6 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired 25%*50%10%0% Attempts20 # of Content Files Acquired Search Term(s)accepted * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing

Anti-Piracy Technical Operations 15 Attorney Work Product Created in Anticipation of Litigation Attorney-Client Communication The Flintstones Bittorrent Users: n/a download: n/a (hours) eDonkey Users: 3.9 Million download: n/a (hours) Ares Users: 3.4 Million download: 2 (hours) Gnutella Users: 2.5 Million download: n/a (hours) % of Content Acquired No Results*0%100%No Results Attempts0220 # of Content Files Acquired 0020 Search Term(s)Flintstones The flintstones; flintstonesThe flintstones * Acquisition data taken from 24 hour time frame * No countermeasures at time of testing