Boston College Tells Students That Using A Wireless Router Is A Sign Of Copyright Infringement
from the wtf? dept
Copyright lawyer Ray Dowd points out that Boston College is telling students that simply using a wireless router is a sign of copyright infringement. Take a look at the image below:So why is Boston College telling students that simply using a wireless router is a sign of infringement?
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: boston college, copyright, infringement, wifi
Companies: boston college
Reader Comments
Subscribe: RSS
View by: Time | Thread
"For any computer on the BC network, a specific IP address is assigned. The music and film industries monitor activity on file-sharing networks, and they contact Boston College with the IP addresses that are found to be illegally sharing files. BC, by law, is bound to release the identities of the individuals tied to those IP addresses."
Based on accusations from the industry? Not so sure about that...
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
"BC, by law (See the Personal Data Privacy Act of 1974 (5 U.S.C. 552a)) will disregard any and all requests for the identity of any individual(s) associated with the IP address(es) presented unless accompanied by a court order or subpeona."
Or, "RIAA, MPAA, et al., piss off unless you have more proof that just an IP address."
[ link to this | view in chronology ]
Re: Re: IP Addresses
> the identities of the individuals
What's amazing is how, as a federal law enforcement officer, I can't get information from a university on a student in a terrorism investigation without a court order based on probable cause, but the recording industry can get whatever they want just by demanding it.
[ link to this | view in chronology ]
Re: Re: Re: IP Addresses
[ link to this | view in chronology ]
Re: Re: Re: IP Addresses
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
[/irrationality]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
I recognize and compliment the sarcasm, but there's a grain of truth in that.
The number of hijacked/0wned/zombie'd systems worldwide continues to increase, as it has for a decade. This isn't surprising: the dominant operating system (Windows) CANNOT be secured, not even by Microsoft -- which presents fresh evidence of its own failures on a daily basis. And other operating system instances, notably MacOS, have also been successfully attacked in large numbers.
Estimates of the number of such systems on the Internet vary, but any estimate under 100 million is absurd. Reasonable estimates at this time are in the 200-300 million range. But whatever that number is: it will be higher by the time you finish reading this.
Those systems are used for a lot of dubious things, and of course some of those things involve copyright infringement. So given current estimates of the total number of Internet users, and guestimating 1 system per user (some have many; many share some; let's go with "1"), something like 1 in 5 or 6 end-user systems no longer belong to the people who think they own them...and could easily be involved in ANYTHING.
And as the Julie Amero case demonstrated, everything I just said is far, FAR beyond the feeble intellectual grasp of law enforcement, prosecutors and judges...so do I even need to try to explain how vastly inferior people like the MAFIAA couldn't understand it even if their lives depended on it?
[ link to this | view in chronology ]
Re: Re:
That's like trying to create a car that makes jerks drive correctly. You can control how the car works, but you can't control what the operator does with the car.
Last I checked, Win7 is about as secure as a standard Linux distro install, which is a heck of a lot better than OSX.
Linux can be made more secure than Windows, but only through customizing it, which a typical end user would never do.
[ link to this | view in chronology ]
Re: Re: Re:
You are correct in the assumption that any OS can be made secure or at least reasonably secure, but that takes real knowledge to accomplish and even with knowledge it is not going to be a hundred percent.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
You obviously don't know much about computer security.
[ link to this | view in chronology ]
Re: Re:
1. Run an antivirus and firewall software.
2. Only download things from trusted sources.
3. Use Firefox or something similar that has a NoScript/AdBlock Plus funtionality through extensions or built-in to avoid being pwn'd by Javascript malware.
Just by doing those three things, I have been able to avoid ALL viruses on my machine, save those goddamned codec pack viruses that for a while, I was stupid enough to download.
[ link to this | view in chronology ]
Re: Re: Re:
You mean like from Microsoft? Even they've distributed viruses.
[ link to this | view in chronology ]
WiFi
Because everyone is using WiFi now a days and it's flooding the 2.5GHz range. I needed to find some way to clear up all that radio pollution.
That was sarcasm, but I can't think of a better reason why they would say that.
[ link to this | view in chronology ]
I feel sorry for anyone taking IT type classes at BC
GO HOKIES!
[ link to this | view in chronology ]
Re: I feel sorry for anyone taking IT type classes at BC
[ link to this | view in chronology ]
Re: Re: I feel sorry for anyone taking IT type classes at BC
[ link to this | view in chronology ]
Re: Re: Re: I feel sorry for anyone taking IT type classes at BC
The least liked employee of one department is given preference when a position opens in another department, seemingly regardless of how unrelated the departments are or how unqualified the applicant is.
HR doesn't vet applicants - just checks for degrees and "diversity."
Managers aren't necessarily qualified to do the jobs they hire for, much less competent enough to know who would do a good job.
[ link to this | view in chronology ]
Re: Re: I feel sorry for anyone taking IT type classes at BC
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
Because no one, especially tech savvy college students, knows how to hack a wireless router.
http://www.google.com/search?q=hack+wireless+router
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
-Using a wireless router in your room; others may use.......
This does NOT appear to say that if your wireless connection is unsecured you could look guilty. The way it is formatted looks exactly like it's saying that using a wireless router in your room is a common example of CI.
If they wanted to have the appearance of saying that it's not a good idea to have an unsecured router for these reasons they shouldn't have put it into the bullet points and worded it the way it is.
My 2 cents.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
Just formatted and worded poorly.
FTFM
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
"Using a wireless router in your room; others may share illegal material through your router, giving the appearance that you are the guilty party."
The offending use of a wireless router was spelled out. And they are 100% correct.
Above AC is correct; This is just Masnick whining and spreading FUD. Which seems to be all he's good for.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
The point I was making is that the way this is worded and formatted it looks like BC is actually saying using a wireless router is a common example of infringement.
Use your reading comp skills, look at the reply I posted to myself, get the WHOLE picture of what I was saying, then quietly go away.
Thank you.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
I say "accuse an IP address of infringing" specifically, because that is all they know, they cannot accuse a person.
And, logically, the more open your wireless router, the less certainty anyone could have about who is responsible for infringement tied to an IP address.
What BC really meant was:
"Please secure your wireless router so that when the RIAA comes knocking, we can help them as expediently as possible to identify the BC student on whom they want to apply the onerous laws which they wrote. An unsecured router makes the job of finding shakedown victims harder for the recording industry, and BC doesn't want to waste their time."
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
That isn't the issue. The issue is whether the college is handing over the details of a student based on their IP address. Handing over details isn't an investigation, it's forgoing the need to investigate at the expense of the student's privacy.
"Having a wireless router can bring a lot of trouble to a student. It would be wrong to NOT warn them about this."
That may be the case, but the way the advice is written gives the impression that merely operating a wireless router is an example of infringement.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
Therefore, a IP address alone does not rise to the level of 'evidence' for anything.... not a search warrant or anything.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
Because someone somewhere collected an IP number from some network?
What did he do to confirm that the IP was real in the first place?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
investigation will begin with that student."
No shit, Sherlock? I'm glad you cleared up that painfully obvious point.
"The school is just following the rules, and the advice in question is sound."
They aren't and it isn't. They are caving into the demands of a powerful minority, not the law, and giving out misleading advice. They are not required to give out this information without anything less than a subpena from a judge. And to that, IP is poor evidence. Even for probable cause it doesn't hold up. IPs can be faked, hijacked, or mis-recorded. They are too volatile to be considered reliable to prove anything other than that a particular IP was recorded as the recipient of alleged infringing data.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
So, you are saying that the owner/operator of every network element that touches the packets of infringing content is an accessory, and possibly liable? That includes the school, their ISP, the Internet backbone provider, etc.
On a similar note, Ford is now an accessory and liable for 23% of US hit and run accidents.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Nut, meet sledgehammer!
[ link to this | view in chronology ]
Re: Nut, meet sledgehammer!
[ link to this | view in chronology ]
What silly FUD.
Look at the whole sentence: "Using a wireless router in your room; others may share illegal material through your router, giving the appearance that you are the guilty party."
It explains that if the student has a wireless router in their room and other people use that router to share illegal material, it could make the student that has the router look guilty. That's sound advice. If someone else used that router to infringe, it would look like the student with the router is the infringer. As the case law that Dowd quoted points out, simply saying, "I have an unsecured router and another person did it" is not a perfect defense.
Must be a slow news day.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
It's up to the industry lawyers to prove that you were downloading infringing content. How can they do that if they can't tie the IP to you for certain?
When you say "it's not a successful defense", it sounds more like "it doesn't prove you didn't do it", which is true, but proving innocence isn't the way our system (nominally) should work.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
How can they do that if the router is wireless?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
The question is how can there be a preponderance of evidence identifying the IP address holder as the infringer, if there is evidence that anyone within wireless range could have committed the infringement?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
Sounds like you need to.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
Hell, even if a router is SECURED, that can happen if someone spies on you putting in the password and gets that password.
Like the guy is pointing out: AN IP ADDRESS IS NOT EVIDENCE IN AND OF ITSELF! In fact, if that is the only evidence that someone has that someone else is infringing? The judge should throw out the case and refuse to grant a search warrant or anything else, because those things are easily faked/manipulated/etc.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
No, generally all the training and experience setting up Cisco IOS devices through the command line allows me to just wing it.
"Sounds like you need to."
Be specific. I know you don't like to, but people can't read your mind. Why do I need to?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
I guess my question is: What other evidence are they likely to have?
That is, if the IP itself doesn't prove it (and it doesn't), they would presumably have to come forward with some other evidence. As you say, the IP seems like the appropriate place to start an investigation, but saying that having an open router "is not a successful defense" against an infringement charge because there might be other evidence against you too strikes me as a "well, duh" argument.
I would think that having an open router would be a successful defense specifically against their IP address evidence. Any other evidence (e.g. a blog post about how you just grabbed the songs in question off the Pirate Bay) would obviously not be covered by an open router defense, but then, I don't think anyone has said it would.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
A router routes things behind it, yes? The crooks drove over that bridge there -> ! Who owns this bridge!? Patently ridiculous - much like the current business model.
\r
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
Hell, you are assuming that it would even GET PAST THE JUDGE and to a jury in the first place.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
Except, if I understand correctly, that the standard is "preponderance of evidence" or "balance of probabilities", rather than "beyond a reasonable doubt" - which makes a pretty big difference.
I suppose the standard of proof is somewhat separate from the presumption of innocence, but the two seem rather intertwined to me.
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
When it comes to these sorts of cases, I think the burden of proof should be elevated to "beyond a reasonable doubt" since there is so much evidence that can be tainted by malefeasance of a third party. Most people are not well versed in technology and the security thereof. They are often the victims of criminals looking to abuse their ignorance and they often succeed.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
Because when you use IP addresses that is what you get, a traffic camera machine that produces a lot of fake photos mixed with real ones.
In what world people allow such a thing to be serious?
Only in the f. up American judicial system that is where.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
Would you trust a system that do such a thing?
Do you want to buy some property on the moon?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
A small tidbit: Perhaps you didn't mean to suggest so, but IP-spoofing does not work for two-way traffic such as file sharing. That would be like mailing a payment to a bootlegger for a copy of a DVD, but putting a fake return address on the envelope to evade detection by the authorities.
Sure, the authorities won't have your real address, but the bootlegger is going to have a hard time getting your DVD to you.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
As far as I know every P2P network out there is sending a small amount of spoofed IP's to everyone to counter IP harvesting from companies.
This forces them to look hard at the data collected you can't just collect IP's because those connections may be spoofs and not real ones you need to download something and get a record of the data transfer to be proof that some IP is really sending data to you.
But apparently that is not being done since you can see a large number of people who don't know what P2P means or don't even have those programs installed being accused, and the reason why is IP spoofing working as envisioned.
You can look it up every bittorrent tracker spoof IP's, this is known as crowd anonymity.
If they just collect only IP's and don't do additional work they will drag a lot of people who never used P2P in their lifes, hence the comparison to a traffic camera spoofing car images, will you trust that camera to tell you that that car was really there without questioning?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
In other words, in a civil case all a plaintiff need do is testify that they believe (perhaps based on information given to them by the university about the user of a particular IP) that the student infringed their copyright to their detriment. Then the student has to put on some evidence that he didn't (could be just as crappy as the plaintiff's). Then the decider of fact (say, a jury) gets to choose whose evidence was better.
[ link to this | view in chronology ]
Re: Re: Re:
> a successful defense.
Considering the burden of proof is on the plaintiff, it most certainly would be successful.
It's the plaintiff (rights holder) that would have to prove more.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
I'm losing sleep over how worried you are.
> Defenses only become necessary after the
> plaintiff has successfully presented their
> case.
And in cases like this, the recording has repeatedly claimed that identificationb by mere IP adress alone is enough. In sucha trial, would certainly behoove the plaintiff to "have more" than an IP address if it leads to a wireless router being used in a college dorm. Otherwise, the defense need merely point out the existence of the router (hell, they could just point out the fact that the kid leaves his door open and lets people physically use his computer to do their coursework) and that would be all she wrote for the plaintiff. They will not have proven their case against the defendant anywhere close to the proponderance of the evidence standard.
[ link to this | view in chronology ]
Re: Re:
I don't think everyone has been paying attention. Once the MAFIAA comes after you for file sharing, there really isn't much of an upside.
If you think getting dragged through the courts for years on end only to end up getting your legal fees back is "winning" then more power to you. But the advice is sound.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
I don't really see a story here, just a security warning that could have been phrased much better.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Presumably with permission of course.
The thing is christianity while not itself founded on copyright infringement, surely did spread as it did from its original handful of followers by means of widespread infringement which continues unabated up to this day with not one penny going in royalties from printing/sales of bibles to the original writers or their heirs/estates.
And bibles sell quite well, despite many being given away for nothing but in either case, there is no incentive to the writers to create new works.
As someone who dislikes religion, I almost wish the copyright laws had been stronger back then and enforced of course, they would have certainly choked off, christianity and later islam before they got any real foothold.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
1) sales without copyright / copyright enforcement (competing with free)
2) enforcement of IP can kill off entire future markets, some that people might like and some that people might not like. But like or not like, without widespread copying and disseminating far outside official channels and often for free
I don't like religion and would have been glad if the two worst examples in terms of global reach had never gotten off the ground.
Others, perhaps even you, may be glad that they got off the ground and became religions of global influence thanks to the failure to have and enforce IP (in the way IP "rights holders" want to do now,) back in the day.
So while I did express my dislike and disdain for religions and the two later mashups of Judaism, it was in the context of how strict copyright enforcement prevents the opening up of new markets, so any offense taken is simply added value.
And that is apparently what one needs to succeed in the digital age.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
Are you someone who thinks that the publishers are the only rights holders now.
Are we forgetting about the original artists here?
Of course the people who copied their work and later the publishers who did ditto but on a larger scale, neither of whom paid any money to the artists or their estates at any point, would not have used copyright to prevent their own money making scams.
That's where modern style IP rights could have shut them down.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
No.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
For all you know, these guys could have been writing historical fiction about what happened when a real messiah came along but not the one everyone was expecting.
Perhaps over the years, the disclaimer that this was intended to be fiction was dropped in the same way that fbi warnings about copyright infringement are routinely dropped from pirated copies of movies.
Perhaps many parts of the gospels or the letters that made it into the new testament were dropped for giving the wrong message as entire other gospels were dropped.
We only know that the people who did want to spread the message, that which became the Catholic church would certainly want you to think that the original authors had the same view.
But they were the copiers, so they certainly had a vested interest in doing so and shading the messages the way they wanted to.
Similar happened when printing technology became available and suddenly a lot of the arguments that had been had out in the Catholic church in the opening centuries of the first millenium CE were being propounded again by people who were now shading or interpreting the messages in other ways.
And why wouldn't you think that people wouldn't have done it for compensation, there are plenty of examples in every religion where raking in money was and is still the primary motivation of many in the field.
But even if we assume that gospels were not fiction and that the gospel writers did genuinely claim to believe in everything they wrote that does not preclude a desire for compensation.
The catholic church didn't become rich because it eschewed wealth and dialling 1-800-god for donations so that individuals can live properly wealthy lifestyles is not unfamiliar to us.
So why assume that the original authors would not have wanted a taste too.
[ link to this | view in chronology ]
Re: Re:
i refer you to Monty Python's The Life of Brian for context. Or 4 Lions.
Either are good.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
Copyright was used to control access to the bible, although obviously not by the originators. A notable fact about the American Revolution was that it allowed America to breach royal copyright on the King James Bible.
[ link to this | view in chronology ]
Re: Re: Re:
Incidentally, I do not mean to suggest that Zondervan has misused copyright, or that if there must be copyright laws that this is a bad application of them.
[ link to this | view in chronology ]
Re: Re:
there are a lot of assumptions there.
We don't actually know what the original writers intended.
We don't even know if what has come down through the ages in terms of gospels for example are complete and unedited.
We also don't know if Paul's letters weren't written tongue in cheek in parts, perhaps the intended recipients knew him to actually be big on women's rights but for a laugh he presented himself as a misogynist of the very old school knowing full well the people he was actually writing too would know that. Perhaps, and it is unlikely, he would be distraught to know they were being shown to people who don't have the vital background information to know when he was joking and when he was being serious.
But as many older tv shows are being kept off DVD because rights for dvd didn't exist when the actors original contracts were drawn up and now people aren't available to reach agreements and/or their estates aren't willing to reach agreements based on current copyright law, its not impossible to think similar could not have occurred back then as long as we assume its with the same politicians, laws and lawyers as exist now.
Quite apart from Judas' family getting the publication blocked on grounds of lies, defamation and libel, even if it was being put forward as a work of fiction.
[ link to this | view in chronology ]
The page got cut off a bit..
Making a mix tape for a boy/girlfriend.
Turning up the radio so others in the dorm can hear a song you like.
Singing in the dorm showers in a manner that others can hear you.
Allowing your roommate to share in watching a movie you rented.
Using quotes from movies with friends in an attempt to appear funny or knowledgeable.
[ link to this | view in chronology ]
Re: The page got cut off a bit..
"BC, by law, is bound to videotape you in the shower to ensure that you do not sing."
[ link to this | view in chronology ]
Re: The page got cut off a bit..
[ link to this | view in chronology ]
Re: The page got cut off a bit..
Accessing the internet. Only criminals and thieves use this so anyone caught using it must be doing so for evil purposes.
[ link to this | view in chronology ]
Re: Re: The page got cut off a bit..
Everyone who has ever accessed a 'P2P' network to download copyrighted material without permission has used the internet to do so. If you are using the internet, you are downloading copyrighted material illegally
[ link to this | view in chronology ]
Re: The page got cut off a bit..
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Although it is sound security advice not to leave your router unsecured, I think the reason Mike jumped on this story is because the school is listing it as an "example" of infringement. It's merely a scenario in which infringement "might" occur, so whoever made the list is either slightly incompetent or a little confused. Still think it's a non-story though, Mike. Sorry.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Slightly Incompetent or a Little Confused
[ link to this | view in chronology ]
Re: Re: Slightly Incompetent or a Little Confused
Wow. What world do you live in?
[ link to this | view in chronology ]
Re: Re: Re: Slightly Incompetent or a Little Confused
[ link to this | view in chronology ]
Re: Re: Re: Re: Slightly Incompetent or a Little Confused
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Slightly Incompetent or a Little Confused
Cool story, bro.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Slightly Incompetent or a Little Confused
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Slightly Incompetent or a Little Confused
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Slightly Incompetent or a Little Confused
I prefer "IPtards."
[ link to this | view in chronology ]
Re: Re: Re: Slightly Incompetent or a Little Confused
Just speaking from my personal experience. Campus police are worse than the cops I dealt with in South America.
[ link to this | view in chronology ]
UBC actually bans routers! READ THIS!
From the Resnet Service Agreement
Each ResNet connection is intended to provide services through one computer to the resident of the room it is in. There may be only one computer connected to each ResNet port.
http://www.it.ubc.ca/service_catalogue/internet_telephone/resnet/resnet_policies/resnet_servi ce_agreement.html
I'm not interpreting this wrong. I called in for a random issue and I was told by multiple people that routers are banned. I asked them to cite where in the policies it says so, and they pointed me to above. No one follows that rule, and they don't enforce it, but there it is.
[ link to this | view in chronology ]
Re: UBC actually bans routers! READ THIS!
[ link to this | view in chronology ]
Re: Re: UBC actually bans routers! READ THIS!
What if someone hacked the PS3 for the Linux?
O_o;
[ link to this | view in chronology ]
Re: UBC actually bans routers! READ THIS!
Or you could tell them to kiss your ass. I told my university, "I pay $20,000 a year to go here, and you are not going to tell me what I can and cannot do with the internet connection I PAY FOR"
[ link to this | view in chronology ]
Re: Re: UBC actually bans routers! READ THIS!
As for your tuition, it very likely covers less than half the cost of your education. You did not pay for the internet connection, you paid an access fee to get access to resources that the school's alumni- or state-funded endowment paid for.
In a few years, you will grow out of that sense of entitlement, or you will join the **AA as a senior executive.
[ link to this | view in chronology ]
Re: Re: Re: UBC actually bans routers! READ THIS!
The only 'sense of entitlement' I have is the entitlement to the things I paid for. I am not being given anything, I am receiving the services that I pay for.
So yeah, if you call that a sense of entitlement, then guilty as charged; I have a sense of entitlement about everything I pay for
[ link to this | view in chronology ]
Re: Re: Re: UBC actually bans routers! READ THIS!
Again, this policy isn't enforced. But it goes to show what sort of poorly thought out junk we blindly agree to on a daily basis.
[ link to this | view in chronology ]
Boston College May Be Infringing
"BostonCollege is an open, unsecure wireless network that is an alternative for older laptops that do not meet the requirements for bcsecure (BC username and password required). This network does not encrypt data. Therefore, information sent across the wireless network using BostonCollege is “in the clear.” Others might snoop or intercept data transmitted using the unsecured wireless service."
[ link to this | view in chronology ]
Re: Boston College May Be Infringing
[ link to this | view in chronology ]
Isn't there some clause in university funding?
http://news.cnet.com/Democrats-Colle...olice-copyright,-or-else/2100-1028_3-6217943.html
[ link to this | view in chronology ]
[ link to this | view in chronology ]
If you're going to play that game...
Emailing copies of a copyrighted song to all of your friends.
Again, this is badly worded, but the point still stands. You can be wrongly accused of file-sharing if you use an unsecure router, which is clearly what is meant by the college's statement...which any moron in a hurry could realize, but...but...straw man!
[ link to this | view in chronology ]
Heard similar things before :)
Even funnier note from Boston College site - http://www.bc.edu/offices/help/security/copyright/myths.html
5. What's the big deal? It doesn't hurt anybody.
According to the RIAA, online piracy has cut into national music sales by nearly a third since 1999, sending recording and film revenues into a downward spiral, which hurts everyone in the industry, and can hamper the development of new music, films, artists and talent. And once caught downloading illegal files, the individual downloader faces damages resulting from the legal and disciplinary process.
[ link to this | view in chronology ]
Re: Heard similar things before :)
[ link to this | view in chronology ]
Re: Re: Heard similar things before :)
[ link to this | view in chronology ]
Re: Re: Re: Heard similar things before :)
[ link to this | view in chronology ]
Re: Heard similar things before :)
We know it doesn't but nonetheless it is against the law and is being enforced by Homeland Security.
So if we don't do everything we can to prevent you doing it, we'll get dragged into court and that is not only horribly expensive but we don't have the time for it.
And if you do it despite us doing everything we can to stop you from doing it, then it'll be your ass in the sling.
So just don't do it, 'kay.
[ link to this | view in chronology ]
Re: Heard similar things before :)
[ link to this | view in chronology ]
[ link to this | view in chronology ]
[ link to this | view in chronology ]
they forgot the ending...
cash for you, sucks to be BC.....
[ link to this | view in chronology ]
One of my favorites is, your not allowed to look at porn (ii), and they will spy on you occasionally to make sure your not (Inappropriate Content and Transmissions).
This company provides the only fiber optic in the area (very limited). Competition is great.
[ link to this | view in chronology ]
Obligatory link
[ link to this | view in chronology ]
no one ever mentions
using IP addresses as the sole evidence could just MAKE UP numbers.....e.g ok i think infringement was done by lets see.....154.42.8.3....now lets see how much cash they have!
[ link to this | view in chronology ]
They explained that the license plate could be attached to a car owned by a person that lived in the house with a family. It could have been his wife or son or brother's car.
They also said that there was no way I could not be sure the plate wasn't taken from some other car and put on the getaway car.
Furthermore, some people just leave their cars unlocked. So, someone could have taken the car, drove it to the bank, robbed it, and brought it back.
License plates can also be easily faked.
So there was absolutely nothing they could do. No warrant; no further investigation was possible at all. They said goodbye and asked me to call them if I actually had some evidence next time.
[ link to this | view in chronology ]
[ link to this | view in chronology ]
This entire article is a bare-faced lie.
I did; it says no such thing.
Firstly, it is not a list of "signs of" copyright infringement but a list of "examples of", so you haven't even described it accurately. Let me explain in terms that even a child could understand: "sign of" is to "example of" as "symptom" is to "disease". If you really can't tell the difference between those two concepts, you aren't competent to be writing professionally.
Secondly, it doesn't even say that using a wireless router is an example of copyright infringement. It says, very clearly, that if you use a wireless router somebody else might infringe copyright using the same router and you might get the blame. YOU CAN'T JUST IGNORE THE SECOND-HALF OF THE SENTENCE AFTER THE SEMI-COLON AND PRETEND YOU DIDN'T SEE IT.
Well, you can, but how the hell you can seriously expect your pretence to pull the wool over anyone else's eyes is beyond me.
Well, actually even that's not beyond me; you just want to write a sensationalist headline, you know full well that it will generate tons of angry comments from people who have trusted your misbegotten malinterpretation of events and not even clicked on the big version of the picture.
You aren't actually stupid or illiterate or blind, you are just faking it to try and justify your deliberate out-of-context mangling and misinterpretation of perfectly plain English.
Hell, you'd be the first to complain if someone wrote a big article that just took the last half of your headline and ignored the rest to say "Techdirt claims 'Using A Wireless Router Is A Sign Of Copyright Infringement'", but that is exactly what you have just done.
[ link to this | view in chronology ]
Re: This entire article is a bare-faced lie.
You're complaining that he used a more appropriate word? I agree. The headline should have read: 'Boston College Tells Students That Using A Wireless Router Is An Example Of Copyright Infringement'. That headline would much better illustrate the stupidity of Boston College.
"Secondly, it doesn't even say that using a wireless router is an example of copyright infringement."
Didn't you tell us in the previous paragraph that it was a list of examples of copyright infringement? The context implies that using a router is an example. The use of a semi colon highlights the fact that the two halves of the sentence are independent clauses. If they didn't mean to imply that using a wireless router was infringement then they should have used a comma or linked the clauses. You can't just ignore the grammar and pretend that the sentence is unambiguous.
"You aren't actually stupid or illiterate or blind, you are just faking it to try and justify your deliberate out-of-context mangling and misinterpretation of perfectly plain English."
Uh, you seem to be lacking a motive for your devilish plot to pull the wool over our eyes. Aside from which, what does that make me for agreeing with him? Do I get to play the part of co-conspirator or are you going to suggest that I'm stupid, illiterate or blind? By the way, you do realise that blind people who use computers tend to use these wonderful things called screen readers and are as capable of understanding the issue at hand as a sighted person, don't you? But hey, what's belittling people with disabilities compared to a conspiracy against a college.
[ link to this | view in chronology ]
Re: This entire article is a bare-faced lie.
According to you, if a person emailed copyrighted music to all their friends then that also wouldn't be a "sign" of copyright infringement.
Putting the wireless router as an example of copyright infringement is more than enough proof for what the author is trying to say. It is irrelevant that BC has added "others may share illegal materials through your router" because that is just an example of what could happen IF you use a wireless router. The thing that they are trying to say is that USING a wireless router itself counts as a sign of copyright infringement because others may use it for illegal purposes. But it still doesn't change the fact that they are saying that if you use a wireless router, it is a sign of copyright infringement.
Hope you got my point. Also as a previous poster said, BC removed the wireless part so I guess they thought better about it too :)
[ link to this | view in chronology ]
Re: Re: This entire article is a bare-faced lie.
Having a knife in your home is a sign of a murder having been committed, or an example of a murder; others may take your knife, stab someone 20 times, giving the appearance that you are the guilty party.
[ link to this | view in chronology ]
Not 100% sure on why this is, but my best guess is that the state urges UMass as an ISP to prosecute copyright cases. In many cases, infringement notices are handed out to students, who cannot access the internet on campus unless they deal with these infringement notices.
[ link to this | view in chronology ]
They have updated the website
[ link to this | view in chronology ]
recently I bought a let router but I have no idea how to set it but after reading this post I really got the solution. thanks for this useful post.
[ link to this | view in chronology ]