Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Risk

4/14/2011
03:05 PM
50%
50%

Schwartz On Security: Piracy Equals Market Failure

Legal actions to prevent or punish movie, music, and software piracy may be harmful to innovation as well as ineffective.

What's the best way to combat music, movie, and software piracy?

The Android camp offers one approach. Facing piracy of Android software--obviously, a turnoff for third-party developers who need to make a living--Google recently added in-app billing to provide developers with another revenue stream. Now, customers can demo an application before buying it, or purchase upgrades from within the existing application.

Another option comes from the high-technology sector, and involves finding businesses that are pirating your products and suggesting they pay up, so as to avoid fines. This is a strategy practiced by the Business Software Alliance, which counts Adobe, Apple, and Microsoft as members.

Legal channels are another approach. In November, for example, the Feds launched operation In Our Sites, which seized 82 domains, most relating to sales of counterfeit physical goods, though four were file-sharing or related domains. That was followed by an operation in February that took down 10 domains being used by six different services to stream sports events.

Let's review: Giving people an easy way to pay for what they're consuming--or listening to, per Apple iTunes--generates revenue. So does finding people already using your software products and suggesting they pay for it. But do legal measures increase revenues or even decrease piracy?

Industry groups suggest that they do, and praised the Fed-driven takedowns in a letter to the White House, reports The Hill. "Operation In Our Sites has not only put illegal sites out of business, but has raised public awareness about this specific form of crime on the Internet," wrote the Motion Picture Association of America (MPAA) and other organizations. "Most importantly, these enforcement efforts have resulted in most of these entities ceasing their illegal activity."

In fact, the MPAA may be wrong on all fronts. When it comes to the takedowns, for example, TorrentFreak notes that "most of the piracy-related sites simply continued under new domains, undeterred." Only one of the sports-streaming services went dark, while sites related to file-sharing simply set up shop using a new domain. One of them, the operator of Torrent-Finder, also is protesting the seizure in court, since he only linked to files, rather than hosting them.

Nevertheless, industry trade groups have been pushing for greater fines to serve as a stronger piracy disincentive. In March, Victoria Espinel, White House intellectual property enforcement coordinator for the U.S., recommended that Congress make illegal streaming a felony, hit organized criminals with stiffer fines for stealing copyrighted material, and also "increase the U.S. sentencing guideline range for repeat intellectual property offenders."

The Recording Industry Association of America (RIAA), a trade group, applauded her recommendations. "We commend the administration for these thoughtful and common-sense reforms that will significantly advance the public conversation about the most effective ways to promote creative innovation and protect the rights of the music community," RIAA chairman and CEO Mitch Bainwol said in a statement.

However, some business and legal experts suggest that today's heavy-handed legal approach to combating privacy is stifling innovation. Notably, James Allworth, a fellow at the Forum for Growth and Innovation at Harvard Business School, says that the strategy of "Big Content"--music and movie groups--risks "damaging America's position as a world leader in innovation." Furthermore, new laws won't stop current copyright infringers, but may be used "to stop legitimate uses that the content industries don't like," he says.

Guess the result: "If you're the next YouTube, would you want to locate here in the U.S. and risk having the government simply switch off your site at the behest of Big Content?" he asks. "Or might it not be easier to find a more benign environment to create your business in?" As a result, piracy might actually be costing music and movie groups less than what those groups are costing us as a society.

Furthermore, piracy may largely stem from these groups' inability to bring their business models and supply approaches in line with consumer demand. On that front, Michael Geist, who teaches Internet and e-commerce law at the University of Ottawa, recently detailed a pioneering, six-year study of piracy in six emerging economies--including Brazil and India—that ultimately concludes that "piracy is chiefly a product of a market failure, not a legal one."

In particular, the report finds no strong connection between organized crime and piracy, and also "rejects the conventional wisdom that tougher penalties provide a strong deterrent to piracy activities," Geist says, especially since overworked judges must often deal with much more serious matters, such as violent crime. In addition, it found that piracy typically results from there being no non-pirated distribution channel (in developing countries) or because businesses are setting product prices too high, based on actual consumer demand. In other words, big content companies have a business-model problem, not a legal one.

The industry may argue otherwise, but when the former head of Warner Music in Britain recommends dropping the price of an album to $1.60--both to eliminate piracy and increase revenues--it's time to stop the "more of the same" approach. Despite the macho image and self-promoting rhetoric that "getting tough" on pirates may give trade groups, prioritizing the legal approach is a waste of our time and money.


Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
News
FluBot Malware's Rapid Spread May Soon Hit US Phones
Kelly Sheridan, Staff Editor, Dark Reading,  4/28/2021
Slideshows
7 Modern-Day Cybersecurity Realities
Steve Zurier, Contributing Writer,  4/30/2021
Commentary
How to Secure Employees' Home Wi-Fi Networks
Bert Kashyap, CEO and Co-Founder at SecureW2,  4/28/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
How Enterprises are Developing Secure Applications
How Enterprises are Developing Secure Applications
Recent breaches of third-party apps are driving many organizations to think harder about the security of their off-the-shelf software as they continue to move left in secure software development practices.
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-31755
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setmac allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31756
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /gofrom/setwanType allows attackers to execute arbitrary code on the system via a crafted post request. This occurs when input vector controlled by malicious attack get copie...
CVE-2021-31757
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setVLAN allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31758
PUBLISHED: 2021-05-07
An issue was discovered on Tenda AC11 devices with firmware through 02.03.01.104_CN. A stack buffer overflow vulnerability in /goform/setportList allows attackers to execute arbitrary code on the system via a crafted post request.
CVE-2021-31458
PUBLISHED: 2021-05-07
This vulnerability allows remote attackers to execute arbitrary code on affected installations of Foxit Reader 10.1.1.37576. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file. The specific flaw exists within the handlin...