RIAA Outsources Fingering of Students Who Share Music Illegally

The RIAA is outsourcing the hunt for music thieves. Its largest target currently is those who operate from within colleges and universities, a move that has piqued the attention of Educause.

A representative from the Recording Industry Association of America (RIAA) demonstrated to The Chronicle of Higher Education how the organization catches students sharing copyrighted music. The process involves the use of LimeWire, a peer-to-peer file-sharing program that boasts "The Fastest File Sharing Program on the Planet," on its Web site.

As the article explained, the RIAA has a database of the songs owned by its member organizations. It has outsourced the job of running LimeWire and researching who is offering songs through the network to MediaSentry, a firm that does online content protection and promotion services for companies in the entertainment and software industries,

Through public, online databases, MediaSentry compares the IP addresses of people who are sharing files to those that belong to colleges and universities. According to reporting by The Chronicle, MediaSentry has automated much of the mundane research with "scripting software that types in the songs, grabs the IP addresses, checks them, and forwards the information to the RIAA."

As part of the process, the company sends a request to the college involved, asking it to remove the suspect content. This "takedown notice" program is "solely university-focused," The Chronicle reported.

In major breaches, the RIAA also may send out "prelitigation settlement letters" to individuals, in which it requests monetary settlements in lieu of taking them to court.

To prove that a breach has happened, MediaSentry establishes that a copyright has been infringed through the use of software that checks for the existence of a "digital fingerprint" on each suspect file to confirm that it matches up with the fingerprint on a file in the RIAA database. When a match isn't made, MediaSentry downloads the song and uses a program from Audible Magic to compare the sounds waves of the audio file being offered against the one it knows is copyrighted. If that doesn't result in a match, a human being listens to the song.

In a notice posted this week on one of its listservs, Educause VP Mark Luker acknowledged that his organization was investigating a "recent spike" in notifications sent by RIAA to schools. Part of the increase, he wrote, has to do with changes to the mechanism used by RIAA to detect the presence of infringing files. According to Educause, "notices are frequently triggered by the presence in a 'shared folder' of a file whose distribution from that shared folder would be unauthorized, rather than by observation of an actual unauthorized transmission of such a file." In other words, MediaSentry is going after people and schools for having copyrighted files in a shared folder, whether or not that file has actually ever been shared.

Luker concluded, "The number of DMCA notices received by any campus thus cannot be meaningfully correlated with the amount of actual infringement taking place on the campus network. For this reason, Educause believes that counting DMCA notices is a completely inappropriate measure of success in combating infringement and an equally inappropriate basis for comparing the amount of infringement taking place campus-to-campus or year-to-year."

About the Author

Dian Schaffhauser is a former senior contributing editor for 1105 Media's education publications THE Journal, Campus Technology and Spaces4Learning.

Featured

  • student reading a book with a brain, a protective hand, a computer monitor showing education icons, gears, and leaves

    4 Steps to Responsible AI Implementation

    Researchers at the University of Kansas Center for Innovation, Design & Digital Learning (CIDDL) have published a new framework for the responsible implementation of artificial intelligence at all levels of education.

  • three glowing stacks of tech-themed icons

    Research: LLMs Need a Translation Layer to Launch Complex Cyber Attacks

    While large language models have been touted for their potential in cybersecurity, they are still far from executing real-world cyber attacks — unless given help from a new kind of abstraction layer, according to researchers at Carnegie Mellon University and Anthropic.

  • Hand holding a stylus over a tablet with futuristic risk management icons

    Why Universities Are Ransomware's Easy Target: Lessons from the 23% Surge

    Academic environments face heightened risk because their collaboration-driven environments are inherently open, making them more susceptible to attack, while the high-value research data they hold makes them an especially attractive target. The question is not if this data will be targeted, but whether universities can defend it swiftly enough against increasingly AI-powered threats.

  • magnifying glass revealing the letters AI

    New Tool Tracks Unauthorized AI Usage Across Organizations

    DevOps platform provider JFrog is taking aim at a growing challenge for enterprises: users deploying AI tools without IT approval.