Feeds

AFACT escalating threats against ISPs: reports

Talk loudly and carry a bigger stick

Internet Security Threat Report 2014

Australia’s “copyright versus the Internet” battle, which had become quiet as rights-holders prepared their High Court appeal against the iiNet trial decision, has flared in fine style, with rights-holders’ rep the Australian Federation Against Copyright Theft (AFACT) escalating its threats against Internet service providers.

According to The Australian and Delimiter, AFACT is writing to ISPs demanding that they respond to its demands for actions within seven days.

With fine impartiality, the letter has been sent not only to Telstra and Optus, but even to ISPs whose customer agreements are more favourable to AFACT’s position, including Exetel, which already has provisions for issuing warnings and even disconnecting customers.

The rights-holders’ attack dog has so alienated Exetel that its boss has shown the letter to media, and describes the letter as “bullying”. The letter sets a deadline for this week for recipients to respond, and relies on comments made in the minority judgment in the most recent appeal in the iiNet case.

In the Roadshow Films Pty Limited v iiNet Limited appeal, the majority judgment dismissed the rights holders’ action against the ISP.

However, Justice Emmet wrote that the case may have succeeded, had rights-holders followed an acceptable procedure. This is described in paragraph 210 of the judgment, and can be summarized as requiring:

1. The ISP has been advised of the particulars of an infringement.

2. The rights-holder has requested specific action (including informing the customer of the allegation; inviting the customer to refute the allegation; a warning that service will be suspended if no response is received; a warning that if infringements continue the service will be terminated; and finally, termination of the service).

3. The evidence provided to the ISP should be “unequivocal and cogent” and presented in a way that allowed the ISP to independently check the assertions.

4. Provisions to reimburse the ISP for the cost of investigation, and indemnification against lawsuits from customers whose services are terminated by mistake.

In other words, the copyright holder can’t just throw accusations at ISPs and leave them to work out the truth of the matter: they have to put skin in the game.

El Reg comment: If you’re in the mood for an entirely unfounded speculation, here’s one: the news from barristers working on AFACT’s High Court appeal hasn’t been promising.

If its barristers had driven trucks through holes in the Federal Court appeal judgment, there would be no need for a parallel campaign. AFACT and its backers would need do nothing but sit back and wait for their next day in court, knowing that their position would be impregnable once the win was in hand.

In launching a pre-emptive campaign based on a minority verdict, AFACT invites the belief that the current advice from its barristers is “save what you can”. ®

Internet Security Threat Report 2014

More from The Register

next story
MI6 oversight report on Lee Rigby murder: US web giants offer 'safe haven for TERRORISM'
PM urged to 'prioritise issue' after Facebook hindsight find
Assange™ slumps back on Ecuador's sofa after detention appeal binned
Swedish court rules there's 'great risk' WikiLeaker will dodge prosecution
NSA mass spying reform KILLED by US Senators
Democrats needed just TWO more votes to keep alive bill reining in some surveillance
'Internet Freedom Panel' to keep web overlord ICANN out of Russian hands – new proposal
Come back with our internet! cries Republican drawing up bill
What a Mesa: Apple vows to re-use titsup GT sapphire glass plant
Commits to American manufacturing ... of secret tech
prev story

Whitepapers

Why cloud backup?
Combining the latest advancements in disk-based backup with secure, integrated, cloud technologies offer organizations fast and assured recovery of their critical enterprise data.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
Seattle children’s accelerates Citrix login times by 500% with cross-tier insight
Seattle Children’s is a leading research hospital with a large and growing Citrix XenDesktop deployment. See how they used ExtraHop to accelerate launch times.
10 threats to successful enterprise endpoint backup
10 threats to a successful backup including issues with BYOD, slow backups and ineffective security.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?