Universal Music Hijacks YouTube Videos of Indie Artist

Day in and day out automated bots detect and report millions of alleged copyright infringements, which are processed by popular web services without a human ever looking at them.

Needless to say, this process is far from flawless, but YouTube’s takedown system is particularly problematic. YouTube allows copyright holders to upload their work into a fingerprint database so matching content can easily be detected.

This results in some rather hilarious mismatches, such as a cat purring video being flagged as pirated music. But there are also mistakes of a different order, where original artists are targeted over their own work.

These include Norwegian musician Bjorn Lynne who has had two of his videos hijacked by Universal Music Group (UMG) which is now running ads alongside his work.

“Can I just state publicly that I hate Universal Music Group. For the second time now, they have hijacked my music and claimed ownership of it in all YouTube videos that include my music, thereby monetizing my music,” Lynne writes.

Apparently UMG has the rights to an audiobook that uses Lynne’s music track “Kingdom of the Persians” as background music. This isn’t a problem, as his music can be freely used as long as the license fees are paid.

However, UMG have entered the audiobook in YouTube’s Content-ID system, and as a result they’ve hijacked the ads on the original video. Making matters even worse, UMG also rejected Lynne’s dispute through YouTube after he explained the situation.

“One thing would have been to have done this unwittingly, by mistake. But I have ‘disputed’ the claim on YouTube, written an explanation and told them about the origins of this music — then waited the FULL 30 DAYS that the claimant has to process the dispute, only to be told that UMG have reviewed the dispute and UPHELD their claim!” Lynne notes.

Link (TorrentFreak)

Hertz Puts Video Cameras Inside Its Rental Cars, Has ‘No Current Plans’ To Use Them

Last week we wrote about the hypothetical situation of CCTV cameras being installed in every home. It turns out that this particular dystopia is closer than we thought: an article by Kashmir Hill on the Fusion site passes on the news that Hertz is putting cameras inside its rental cars as part of its “NeverLost” navigational system:

Hertz has offered the NeverLost navigational device for years, but it only added the built-in camera feature (which includes audio and video) to its latest version of the device — NeverLost 6 — in mid-2014. “Approximately a quarter of our vehicles across the country have a NeverLost unit and slightly more than half of those vehicles have the NeverLost 6 model installed,” Hertz spokesperson Evelin Imperatrice said by email. In other words, one in 8 Hertz cars has a camera inside — but Imperatrice says that, for now, they are inactive. “We do not have adequate bandwidth capabilities to the car to support streaming video at this time,” she said.

So why did it install them?

“Hertz added the camera as a feature of the NeverLost 6 in the event it was decided, in the future, to activate live agent connectivity to customers by video. In that plan the customer would have needed to turn on the camera by pushing a button (while stationary),” Imperatrice explained. “The camera feature has not been launched, cannot be operated and we have no current plans to do so.”

But of course, Hertz would hardly go to the trouble and expense of fitting its cars with this feature unless, at some future point, it did plan to use them. Morever, that future use might go well beyond “live agent connectivity”, as Hill rightly points out:

you could imagine camera mission creep, such as Hertz using it to capture video of what a trouble renter is up to in the vehicle, or to see who is really driving the car, or to snoop on a singing — or snuggling — driver.

According to the Fusion article, Hertz doesn’t seem to be telling anyone about the camera, on the grounds that the company doesn’t plan to use it, and so there’s nothing for customers to know. But if and when it does announce its presence, there will be precisely the problem Techdirt mentioned last week: that people in front of it would naturally be worried they were being spied upon — even if assured to the contrary — and would start constraining their speech and behavior.

Link (Techdirt)

Internet Brands Targets Techdirt Post For Removal Because Of ‘Infringing’ Comment Left By A Reader

We really do need a way to properly punish abuses of DMCA takedown requests.

The DMCA takedown notice allows rights holders to perform targeted removals of infringing… I can’t even finish that sentence with a straight face. IN THEORY, it can. In reality, it often resembles targeting mosquitoes with a shotgun. Collateral damage is assumed.

Case in point: Internet Brands recently issued two takedown requests to protect some of its cruelty-free, farmed content originating at LawFirms.com. It’s this phrase — taken verbatim from LawFirms’ “Penalties for Tax Evasion” — that has triggered the takedown notices from Internet Brands.

Tax evasion refers to attempts by individuals, corporations or trusts to avoid paying the total amount of taxes owed through illegal means, known as tax evasion fraud.

The first takedown targets several URLs, some of them merely content scrapers. Other URLs listed (like this one) target posts with comments containing parts of IB’s post — even comments providing a link back to the original article being quoted.

The second (at least according to Google’s non-numeric sorting) is a repeat of the first, except for the addition of a Techdirt post. At first glance, the targeting of this article by Tim Geigner — “Dear Famous People: Stop Attempting Online Reputation Scrubbing; I Don’t Want To Write Streisand Stories Anymore” — would appear to be exactly the sort of behavior Dark Helmet was decrying. But it isn’t.

The phrase triggering the Internet Brands takedown can be found in a very late arrival to the comment thread, more than one-and-a-half years after the original post went live. It opens up with this:

This is a very interesting. I read the whole article at New York Magazine. So someone is accused of tax evasion and then charges are dropped and then tries to clean up his reputation…. nothing wrong with that.

Then, for no apparent reason, the commenter drops in the LawFirms.com paragraph highlighted above.

 

Now, here’s the problem. If blogs and other sites are reposting others’ content without permission, that’s one thing. But targeting whole posts for delisting just because a commenter copy-pasted some content is abusive. It could very possibly take out someone else’s created content — covered under their copyright. Using a DMCA notice in this fashion can allow unscrupulous rights holders to bypass Section 230 protections — effectively holding site owners “responsible” for comments and other third-party posts by removing the site’s original content from Google’s listings.

From the looks of it, Internet Brands did nothing more than perform a google search for this phrase and issue takedown notices for every direct quote that originated from somewhere other than its sites. It didn’t bother vetting the search results for third-party postings, fair use or anything else that might have made its takedown request more targeted. Internet Brands doesn’t issue many takedowns, so it’s not as though its IP enforcement squad had its hands full. In fact, there’s every reason to believe actual humans are involved in this process, rather than just algorithms — all the more reason to handle this more carefully. Here’s a little bit of snark it inserted into a 2014 DMCA takedown notice.

The interview and photos are published on our website and permission hasn’t been granted for anyone else to republish them. Not only is the content stolen it out ranks our website in a Google search for the keyword “th taylor”. So much for Google being able to identify the source of original content!

If a company has the time to leave personal notes for Google (which doesn’t have the time to read them), then it has time to ensure its requests aren’t targeting the creative works of others just to protect its own. The DMCA notice isnot some sort of IP-measuring contest with Google holding the ruler. If Internet Brands thinks it is — or just hasn’t bothered to vet its takedown requests before sending — it’s usually going to be the one coming up short. If Google doesn’t ignore the request, those on the receiving end of a bogus takedown will make a lot of noise. Either way, it”s accomplished nothing.

Link (Techdirt)

Nobody, Including Tom Cotton, Knows What Tom Cotton Is Saying About “Corruption of the Blood”

Senator Tom Cotton (R-AR) is in the news this month. For reasons that passeth understanding he’s been offered up as a spokesperson for the 47 Republicans who wrote a letter to Iran.1 Today I noticed a number of links to 2013 reports asserting that Sen. Tom Cotton offered an amendment to a bill that would allow imprisonment without due process of the relatives of the targets or Iranian sanctions. The Huffington Post’s Zach Carter may be Patient Zero on this idea:

WASHINGTON — Rep. Tom Cotton (R-Ark.) on Wednesday offered legislative language that would “automatically” punish family members of people who violate U.S. sanctions against Iran, levying sentences of up to 20 years in prison.

. . .

Article III of the Constitution explicitly bans Congress from punishing treason based on “corruption of blood” — meaning that relatives of those convicted of treason cannot be punished based only on a familial tie.

Link (Popehat)

CIA Worked With DOJ To Re-Purpose Foreign Surveillance Airborne Cell Tower Spoofers For Domestic Use

The CIA’s recent rebranding as Valhalla for US cyberwarriors notwithstanding, the agency’s general focus has been intelligence gathering on foreign governments, corporations and people. That it has often mistaken “torturing people into saying whatever they can to make it stop” for “intelligence gathering” isn’t necessarily germane to the following discussion, but it’s worth noting that the CIA is almost single-handedly responsible for destroying the term “extraordinary rendition” — a formerly innocuous (and complimentary) term previously used to highlight something like, say, Johnny Cash’s amazing cover of Soundgarden’s’ “Rusty Cage.” (That Cash’s two best covers are “Hurt” and “Rusty Cage” is not germane to the discussion of CIA torture programs, but what a coincidence!)

But the emphasis here is foreign. Which is why the following news makes so little sense.

The Central Intelligence Agency played a crucial role in helping the Justice Department develop technology that scans data from thousands of U.S. cellphones at a time, part of a secret high-tech alliance between the spy agency and domestic law enforcement, according to people familiar with the work.

The CIA and the U.S. Marshals Service, an agency of the Justice Department, developed technology to locate specific cellphones in the U.S. through an airborne device that mimics a cellphone tower, these people said.

Link (Techdirt)

How the FBI Created a Terrorist

Osmakac was 25 years old on January 7, 2012, when he filmed what the FBI and the U.S. Department of Justice would later call a “martyrdom video.” He was also broke and struggling with mental illness.

After recording this video in a rundown Days Inn in Tampa, Florida, Osmakac prepared to deliver what he thought was a car bomb to a popular Irish bar. According to the government, Osmakac was a dangerous, lone-wolf terrorist who would have bombed the Tampa bar, then headed to a local casino where he would have taken hostages, before finally detonating his suicide vest once police arrived.

But if Osmakac was a terrorist, he was only one in his troubled mind and in the minds of ambitious federal agents. The government could not provide any evidence that he had connections to international terrorists. He didn’t have his own weapons. He didn’t even have enough money to replace the dead battery in his beat-up, green 1994 Honda Accord.

Osmakac was the target of an elaborately orchestrated FBI sting that involved a paid informant, as well as FBI agents and support staff working on the setup for more than three months. The FBI provided all of the weapons seen in Osmakac’s martyrdom video. The bureau also gave Osmakac the car bomb he allegedly planned to detonate, and even money for a taxi so he could get to where the FBI needed him to go. Osmakac was a deeply disturbed young man, according to several of the psychiatrists and psychologists who examined him before trial. He became a “terrorist” only after the FBI provided the means, opportunity and final prodding necessary to make him one.

Since the 9/11 terrorist attacks, the FBI has arrested dozens of young men like Osmakac in controversial counterterrorism stings. One recent case involved a rudderless 20-year-old in Cincinnati, Ohio, named Christopher Cornell, who conspired with an FBI informant — seeking “favorable treatment” for his own “criminal exposure” — in a harebrained plot to build pipe bombs and attack Capitol Hill. And just last month, on February 25, the FBI arrested and charged two Brooklyn men for plotting, with the aid of a paid informant, to travel to Syria and join the Islamic State. The likelihood that the men would have stepped foot in Syria of their own accord seems low; only after they met the informant, who helped with travel applications and other hurdles, did their planning take shape.

Link (The Intercept)

Malibu Media attorneys reveal defendant’s identity despite the order prohibiting that. Judge is not amused

Malibu Media v. John Doe (OHSD 14-cv-00493) is one of the cases I list on the “Cases to watch” page. A mere fact that the defendant is represented by Jason Sweet means that it is worth attentively watching how this case progresses.

I wrote about this lawsuit half a year ago. That post was mainly about the defendant’s argument that the plaintiff didn’t need to know the Doe’s identity because his/her attorney would happily accept the service. The motion exchange revealed that Malibu’s local Yousef Faroniya is merely a stooge who files shakedown lawsuits and forwards email to/from the troll center in Miami. Not surprisingly, he avoids talking to the opposite party’s attorneys at all costs; hence I named the post “Copyright troll Yousef Faroniya and his telephonophobia.”

Normally I would edit the post to append a new information, but because at least three major events happened since my last update, a new article is appropriate. These events are:

the judge’s order denying the defendant’s motion to quash, and striking parts of the plaintiff’s complaint;
the defense’s motion to dismiss for failure to timely serve;
the plaintiff’s violation of the court’s order and the resulting motion to show cause.

Unfortunately, Judge Timothy Black was not persuaded by Sweet’s argument and on 1/21/2015ruled that the plaintiff is entitled to know the defendant’s identity. Nonetheless, while the judge didn’t explicitly order not to identify the defendant publicly at that time, the tone of the order suggested the assumption that the defendant would proceed pseudonymously.

Denying the motion to quash didn’t mean that Judge Black was happy with the plaintiff’s conduct. The following paragraphs from the complaint piqued his attention:

25. IPP’s software also logged Defendant’s IP address being used to distribute third party files through BitTorrent. This evidence indicates that Defendant engaged in BitTorrent transactions associated with 2732 files between 06/23/2013 and 05/13/2014. Collectively, this evidence is referred as the “Additional Evidence”.

26. Plaintiff has the Additional Evidence on a document and can produce it.

27. The Additional Evidence demonstrates that Defendant is a persistent BitTorrent user.

28. Many of the titles to the third party works may also be relevant to proving Defendant is the infringer because they correlate to the Defendant’s hobbies, profession, or other interests.

Those who follow these cases remember that Malibu Media and its attorney Mary K. Schulz wassanctioned twice in Wisconsin for filing an infamous irrelevant and scandalous “exhibit C” — the list of filenames, many of which are embarrassing, purportedly shared from the defendant’s IP address. The judge thought that the above paragraphs from the complaint are nothing but a concealed “Exhibit C,” so he sua sponte ordered to strike this travesty.

Link (Fight Copyright Trolls)

After Petraeus Plea Deal, Lawyer Demands Release of Stephen Kim

The lawyer for imprisoned leaker Stephen Kim has asked the Department of Justice to immediately release him from jail, accusing the government of a “profound double standard” in its treatment of leakers following a comparatively lenient plea deal for former Gen. David Petraeus.

Petraeus avoided prison time for disclosing a trove of classified information to his lover and lying to the FBI about it. Kim, meanwhile, was sentenced to 13 months in prison for violating the Espionage Act by talking to a Fox News reporter about a single classified report on North Korea. Kim pleaded guilty after a five-year legal battle that depleted his finances and sent him to the brink of suicide. Petraeus, in the wake of his plea arrangement, is expected to continue his lucrative career working for an investment bank and giving speeches.

Kim’s lawyer, Abbe Lowell, noted in a scathing letter to the DOJ that Petraeus, in his plea deal, admitted leaking a range of highly sensitive material “at least as serious and damaging to national security as anything involved in Mr. Kim’s case” to Paula Broadwell, his lover and authorized biographer. Petraeus also acknowledged that when he was director of the CIA he lied to the FBI about leaking to Broadwell, as well as about keeping classified information at his home.

Yet while Kim, a former State Department official, was prosecuted under a draconian law against leaking — even though he merely discussed a single document that a government official later described in court filings as a “nothing burger” — Petraeus was allowed to plead guilty to a misdemeanor offense of mishandling classified information, and he was not charged at all for the felony of lying to the FBI. Under the deal, he is expected to be placed on probation for two years and pay a fine of $40,000.

“The decision to permit General Petraeus to plead guilty to a misdemeanor demonstrates more clearly than ever the profound double standard that applies when prosecuting so-called ‘leakers’ and those accused of disclosing classified information for their own purposes,” Lowell wrote in his two-page letter, which was dated March 6, just three days after the Petraeus plea deal was announced. “As we said at the time of Mr. Kim’s sentencing, lower-level employees like Mr. Kim are prosecuted under the Espionage Act because they are easy targets and lack the resources and political connections to fight back. High-level officials (such as General Petraeus and, earlier, Leon Panetta), leak classified information to forward their own agendas (or to impress their mistresses) with virtual impunity.”

Link (The Intercept)

New Zealand Used NSA System to Target Officials, Anti-Corruption Campaigner

New Zealand’s eavesdropping agency used an Internet mass surveillance system to target government officials and an anti-corruption campaigner on a neighboring Pacific island, according to a top-secret document.

Analysts from Government Communications Security Bureau, or GCSB, programmed the Internet spy system XKEYSCORE to intercept documents authored by the closest aides and confidants of the prime minister on the tiny Solomon Islands. The agency also entered keywords into the system so that it would intercept documents containing references to the Solomons’ leading anti-corruption activist, who is known for publishing government leaks on his website.

XKEYSCORE is run by the National Security Agency, and is used to analyze billions of emails, Internet browsing sessions and online chats that are collected from some 150 different locations worldwide. GCSB has gained access to XKEYSCORE because New Zealand is a member of the Five Eyes surveillance alliance alongside the United States, the United Kingdom, Canada and Australia.

A number of GCSB’s XKEYSCORE targets are disclosed in a top-secret document that was obtained by The Intercept and New Zealand newspaper the Herald on Sunday. The document raises questions about the scope of the surveillance and offers an unprecedented insight into specific people monitored by New Zealand’s most secretive agency.

The targets list, dated from January 2013, was authored by a GCSB analyst. It is contained in a so-called “fingerprint,” a combination of keywords used to extract particular information from the vast quantities of intercepted data swept up by XKEYSCORE. None of the individuals named on the list appear to have any association with terrorism.

Most of the targets, in fact, had a prominent role in the Solomon Islands government. Their roles around the time of January 2013 suggest GCSB was interested in collecting information sent among the prime minister’s inner circle. The targets included: Barnabas Anga, the permanent secretary of the Ministry of Foreign Affairs and External Trade; Robert Iroga, chief of staff to the prime minister; Dr Philip Tagini, special secretary to the prime minister; Fiona Indu, senior foreign affairs official; James Remobatu, cabinet secretary; and Rose Qurusu, a Solomon Islands public servant.

The seventh person caught up in the GCSB’s surveillance sweep is the leading anti-corruption campaigner in the Solomon Islands, Benjamin Afuga. For several years he has run a popular Facebook group that exposes corruption, often publishing leaked information and documents from government whistleblowers. His organization, Forum Solomon Islands International, has an office next door to Transparency International in Honiara, the capital city of the Solomon Islands. GCSB analysts programmed XKEYSCORE so that it would intercept documents sent over the Internet containing the words “Forum Solomon Islands,” “FSII,” and “Benjamin Afuga.”

Link (The Intercept)

Court Tosses Child Molestation Charges After Prosecutor Falsifies Confession Transcript

Kern County, California, is apparently no place to seek justice. The Kern County Sheriff’s Department is infamous for its handling of residents — both inside and outside the jail it controls. During a four-month stretch in 2013, the Sheriff’s Department was involved with three in-custody deaths. In two of the three cases, deputies applied a ton of force to arrestees, resulting in de facto death penalties for the crimes they allegedly committed.

The Kern County DA’s office is seemingly no better, although its members aren’t as likely to take such a hands-on approach. Instead, they’d be more apt to falsify confession transcriptions, like assistant DA Robert Murray did.

Kern County prosecutor Robert Murray added two lines of transcript to “evidence” that the defendant confessed to an even more egregious offense than that with which he had been charged—the already hideous offense of molesting a child. With the two sentences that state’s attorney Murray perjuriously added, Murray was able to threaten charges that carried a term of life in prison.

Here’s what Murray added to the transcript:

(Detective): “You’re so guilty you child molester.”

(Defendant): “I know. I’m just glad she’s not pregnant like her mother.”

Murray added this to the English translation of the confession transcription, but not to the Spanish version — the language used for the entire interrogation. He then handed this off to the defense, just as it was advising the defendant to consider a plea deal. It wasn’t until the defense requested the original recordings that Murray finally admitted adding statements the defendant never made — nine days after he turned his edited version over to the defendant.

Here’s Murray’s defense of his actions:

It was only after defense attorney Ernest Hinman confronted Murray about the altered version. Murray said he meant it only as a joke to be kept between the two men [Hinman and Murray].

Haha. Life and liberty are hilarious. It’s only someone’s life in the balance. No better place to deploy a little prosecutorial wit than in the transcript of a police interrogation.

Link (Techdirt)