Dunlap, Thomas M.; Kurtz, Nicholas A.
January 2011
Digital Evidence & Electronic Signature Law Review;2011, Vol. 8, p171
Academic Journal
The article examines the methods of obtaining electronic evidence of peer-to-peer (P2P) users and the use of information as evidence in copyright infringement cases in the U.S. federal courts. It explores the methods adopted in the investigation of users of P2P torrent-type technologies that infringe the copyright of plaintiffs. Also discussed are the process of obtaining court orders to subpoena the Internet Service Providers (ISP) and the identification and subpoena production process.


Related Articles

  • Modeling the initial stage of a file sharing process on a BitTorrent network. Lai, Pierre; Chow, K.; Hui, Lucas; Yiu, S. // Peer-to-Peer Networking & Applications;Dec2014, Vol. 7 Issue 4, p311 

    In this paper, we model the number of seeders during the initial stage of a file sharing process on BitTorrent networks. The initial stage is crucial for successfully identifying the initial seeder, who provided the source of the files on the Internet. Most existing BT models focus on different...

  • Hijacking the Vuze BitTorrent network: all your hop are belong to us. Chan-Tin, Eric; Heorhiadi, Victor; Hopper, Nicholas; Yongdae Kim // IET Information Security;2015, Vol. 9 Issue 4, p203 

    Vuze is a popular file-sharing client. When looking for content, Vuze selects from its list of neighbours, a set of 20 nodes to be contacted; the selection is performed such that the neighbours closest to the content in terms of Vuze ID are contacted first. To improve efficiency of its searches,...

  • Internet Service Providers Association criticises P2P measures in Digital Economy Bill.  // Communications Law: Journal of Computer, Media & Telecommunicati;2009, Vol. 14 Issue 5, p139 

    The article reports that the Internet Service Providers Association (ISPA) strongly opposed the proposed legislation on peer-to-peer file sharing in the Digital Economy Bill. According to IPSA secretary general Nicholas Lansman, the proposal will do little to address the problem. He also added...

  • On the collaboration of different peer-to-peer traffic management schemas. Liu, Xin; Wang, Haiyang; Zhang, Lei // Peer-to-Peer Networking & Applications;Dec2014, Vol. 7 Issue 4, p459 

    The fast-growing traffic of peer-to-peer (P2P) applications, most notably BitTorrent, is putting unprecedented pressure to Internet Service Providers (ISPs). To address this challenge, a number of P2P traffic management schemes have been proposed in recent years, among which caching and...

  • A novel hybrid P2P and cloud storage system for retrievability and privacy enhancement. Park, Gi; Song, Hwangjun // Peer-to-Peer Networking & Applications;Mar2016, Vol. 9 Issue 2, p299 

    This paper presents a novel fountain code-based hybrid P2P and cloud storage system. While most cloud storage systems guarantees data retrievability of high level, they may be vulnerable to data privacy since the stored data may be exposed to others by accident or design. On the other hand, P2P...

  • P2P: Too Legit To Quit. Bruno, Antony // Billboard;3/3/2007, Vol. 119 Issue 9, p16 

    This article discusses internet peer-to-peer media downloading. The article notes that the music industry has long been fearful of the popularity of peer-to-peer technology, due to the fact that it allowed for illegal downloading of copyrighted music. However, two legal peer-to-peer services...

  • P2P Business Applications: Future and Directions. Pankaj, Pankaj; Hyde, Micki; Rodger, James A. // Communications & Network;Aug2012, Vol. 4 Issue 3, p248 

    Since the launch of Napster in June 1999, peer-to-peer technology (P2P) has become synonymous with file sharing applications that are the bane of the recording industry due to copyright infringements and consequent revenue losses. P2P promised a revolution in business computing which has not...

  • No, It's Not the New Napster. Levy, Steven // Newsweek;11/28/2005, Vol. 146 Issue 22, pE4 

    The article presents an interview with Bram Cohen, the creator of the file-distribution program BitTorrent. BitTorrent exploits peer-to-peer technology to move big files speedily. Cohen's business received $8.75 million in venture capital. Cohen discusses copyright infringement that takes place...

  • Report: Illegal File Sharing in U.S. Declines. Tribbey, Chris // Home Media Magazine;5/18/2009, Vol. 31 Issue 20, p12 

    The article discusses the report "Online Trends & Insights 2008," released by BayTSP. According to the report, illegal P2P file sharing in the U.S. went down, with BitTorrent becoming the most popular file-sharing application for protected content. It asserted that more than 16 million online...


Read the Article


Sorry, but this item is not currently available from your library.

Try another library?
Sign out of this library

Other Topics