Will VPNs Remain a Legal Way to Evade the “Six Strikes” System?

Posted by Cyberbear on January 2, 2014 in Computer Crimes, Copyright Law, Intellectual Property, Internet with Comments closed |

Posted by: Florencia Todaro

 

InternetSince everybody noticed that NSA is intercepting online activity and Google and Facebook are tracking your online movements. People get worried for their privacy.
One solution to avoid scams appears to be Virtual Private Networks. Read more…

BITCOIN Hidden Market?

Posted by Cyberbear on January 2, 2014 in Computer Crimes, Internet, Legislation, Open Source, Tech News with Comments closed |

Posted by:  Forencia Todaro

 

bitcoin2Bitcoin is the P2P electronic money and payment network, which offers the “advantage” of no controls; but does really work like that?
The online currency is enjoying a record on her value; it recently reached the price of gold. The benefits for illegal markets started to be in discussion.  The latest cases exposed how the currency is used for ´dark market´, and consequently FBI intervened. The FBI intervention added to the debate concerning individual privacy. Read more…

SPAM, Bots, and Malware. Oh my!

Posted by Cyberbear on December 6, 2013 in Computer Crimes, Hackers, Internet with Comments closed |

Posted By: Jonathon Sanchez

 

Anyone who uses email knows about spam emails, and in 2010, there was an estimated 200 billion pieces of spam sent per day. However, recently, there seems to be an unexplained precipitous drop in spam. The one question that I have always had, as a person who was raised on technology, who actually falls for spam emails?

A University of San Diego and International Computer Institute joint research found that spam is big business. The researchers estimated that they could have made $7,000 per day. They ran a fake pharmaceutical website that mirrored a legitimate website. The faux-website asked for financial information and then told the user there was an error to try again. The actual hit rate was about .0127 percent of people who received the solicitation actually fell for the trick – since there is little limitation on how many e-mails can be sent out – the potential for big profits remain Read more…

Aaron Swartz’s Alleged Conduct and the Computer Fraud and Abuse Act

Posted by Cyberbear on December 6, 2013 in Computer Crimes, Hackers, Intellectual Property, Internet, Litigation with Comments closed |

Posted By: Tammy Thibodeau

 

AaronSwartzIndictment_Page_01In Aaron Swartz’s superseding indictment the government alleged Swartz, accessed JSTOR and the MIT network “without authorization.” (United States v. Aaron Swartz, Crim. No. 11-CR-10260-NMG, 3, Sept. 12, 2012). Swartz had accessed the MIT network (and computers) four times “without authorization” after being blocked in three separate incidents. (Id.). Further, JSTOR’s software configuration enables computerized measures to block automated downloads of large amounts of articles. (Id. at 2). All of Swartz’s conduct violated the Computer Fraud and Abuse Act (CFAA) under both definitions of access; “exceeds authorized access” and “without authorization.” (18 U.S.C. § 1030(e)(6) (2008)). Read more…

The Trans-Pacific Partnership & Modern Copyright Law

Posted by Cyberbear on December 6, 2013 in Computer Software, DMCA, Intellectual Property, Internet with Comments closed |

Posted By: Justin McKay

 

Jay_treatyIf you haven’t noticed, there has been an increasing amount of commentary on the internet about the Trans-Pacific Partnership (TPP) ever since Wikileaks released the negotiated draft text of the intellectual property chapter on November 13, 2013. Unfortunately, most of that commentary contains suggestive and alarming language without many (or any) references to the text to substantiate their doomsday attitude. So, I decided to take a look at the text. Below are my findings:

What is the TPP?

Simply put, it is a trade agreement aimed at 21st century trade issues, created in 2005, and originally known as the Trans-Pacific Strategic Economic Partnership Agreement between Brunei, Chile, New Zealand, and Singapore. The United States joined negotiations for an expanded agreement in 2008, with many other countries joining in 2010, including Australia, Canada, Japan, and Mexico.

Since 2010, the agreement has undergone 19 rounds of negotiations. Interestingly, each country’s positions are documented in the leak (see below for an example). Read more…

WorldWideWar.com

Posted by Cyberbear on December 6, 2013 in Domain Names, Intellectual Property, Trademark with Comments closed |

Posted By:  Daniela Madrid

 

200px-RegisteredTM.svgWhat happens when an owner of a trademark wants to use his trademark as a domain name for his website but discovers that the domain name is already being used by a third party? There are several options to resolve this dilemma. The trademark owner can use an alternative domain name suffix, can file a dispute with ICANN, can file suit in court for trademark infringement or cybersquatting. Read more…

Net Neutrality

Posted by Cyberbear on December 6, 2013 in FCC Regulation, Internet, Net Neutrality with Comments closed |

Posted By:  Chris Fong

 

net neutralityControl of information is hugely powerful. In the US, the threat is that companies control what I can access for commercial reasons. In China, control is by government for political reasons.

Tim Berners-Lee

Regulating the internet is not just limited to interactions over the internet. Internet regulations also include the control over access to the internet and the information provided through the internet. In the United States the issue of what can be accessed online and how to access it is a highly debated issue. Network (“Net”) Neutrality is one attempt to regulate access to the internet with the goal that all internet traffic will be treated equally.

Network Neutrality was introduced in an Internet Policy Statement by the Federal Communications Commission (“FCC”) through the agency rulemaking process. In support of the FCC’s Net Neutrality, Steve Wozniak, co-founder of Apple, wrote in support of Net Neutrality a “To Whom this May Concern” letter to the FCC detailing importance of having Net Neutrality. Mr. Wozniak claims Net Neutrality is the reason information on the web is distributed in an unbiased manner and is accessible to everyone with a computer, in a designated area, for the same cost. Read more…

Personal Jurisdiction and the Internet – Localizing Actions from Cyberspace

Posted by Cyberbear on December 6, 2013 in Internet, Litigation with Comments closed |

Posted By:  Chris Fong

 

10349418The advent of the internet created an area where the traditional lines of jurisdiction are nearly entirely erased. The Supreme Court foresaw the how the advances in technology could affect the notion of jurisdiction and noted in Hanson v. Denckla that “[a]s [technological] progress has increased the flow of commerce between states, the need for jurisdiction has undergone a similar increase.” Though, the Hanson decision was published in 1958, before the internet, the reasoning applies to the internet.

The internet has created an area for people to interact, in real time, regardless of where they are in the world. Firstly, in order to understand the complex interaction of the internet and jurisdiction, I will explain the traditional form of personal jurisdiction. Read more…

Twitch.tv Video Game Streaming and Fair Use

Posted by Cyberbear on December 6, 2013 in Computer Software, Copyright Law, Intellectual Property with Comments closed |

Posted By: Chris Fong

 

320px-Ms_sidewinderTwitch.tv is a website that provides video gamers a website location to share and stream their video game experiences with others. A major concern is whether the streaming of the video game can be constituted as copyright infringement or protected use under Fair Use. In order to determine if it is infringement or Fair Use, we must first understand what rights are given through Copyright laws and what constitutes Fair Use. Read more…

Hip Hop Lyric Site Issued Take Down Notice By NMPA

Posted by Cyberbear on December 4, 2013 in Blogging, Copyright Law, DMCA, Intellectual Property, Internet, Litigation with Comments closed |

Posted By: Ross Arkin

 

Bso_Glee_The_Music,_Volume_5--CDEver since the Sugar Hill Gang proclaimed “I said a hip, hop, the hippie – the hippie
to the hip hip-hop, and you don’t stop 
the rocking to the bang-bang, boogie say up jump the boogie to the rhythm of the boogie the beat.”, hip-hop fans have collectively often said: “What?”

Enter the function of the lyric site. Not just hip-hop fans but fans of music of every genre have often found themselves utterly confounded when it comes to certain lyrics. Before the advent of the internet, the most common way for people to settle lyric disputes was to simply check the hardcopy booklet that came with a retail version of an album, if the album did in fact come with such an insert. Before these inserts existed the only way to obtain a copy of the lyrics to a song was to purchase a song book or sheet music. Now, if anyone were to tell you that Jimmy Hendrix was singing about kissing a guy, you can pull up any number of websites dedicated to displaying the lyrics of songs and clarify what has been misheard. By some reports, five million people google the term “lyrics” every day. (Alex Pham, NMPA Targets Unlicensed Lyric Sites). However, it turns out that the unauthorized (read: unlicensed) display of copyrighted lyrics may be an infringing activity. Read more…

Copyright © 2010-2014 Cyberbear Tracks All rights reserved.
This site is using the Desk Mess Mirrored theme, v2.2.3, from BuyNowShop.com.