14
Peer to Peer (P2P) Peer to Peer (P2P) and Cyber and Cyber Security Security Thomas Bartlett, Apple Computer Thomas Bartlett, Apple Computer Martin Green, Esq. Martin Green, Esq. John E. Kolb, Rensselaer John E. Kolb, Rensselaer 15 July 2005 15 July 2005

Peer to Peer (P2P) and Cyber Security Thomas Bartlett, Apple Computer Martin Green, Esq. John E. Kolb, Rensselaer 15 July 2005

  • View
    218

  • Download
    0

Embed Size (px)

Citation preview

Peer to Peer (P2P)Peer to Peer (P2P) and Cyber Security and Cyber Security

Thomas Bartlett, Apple ComputerThomas Bartlett, Apple Computer

Martin Green, Esq.Martin Green, Esq.

John E. Kolb, RensselaerJohn E. Kolb, Rensselaer

15 July 200515 July 2005

15 July 2005 P2P and Cyber Security 2

Panel Panel

BackgroundBackground– TechnologyTechnology– ServicesServices– Legal environmentLegal environment

Discussion of IssuesDiscussion of Issues– LegalLegal– CulturalCultural– PolicyPolicy– TechnologyTechnology– EducationalEducational

15 July 2005 P2P and Cyber Security 3

How to Manage P2P?How to Manage P2P?

Not allowNot allow Limit through policyLimit through policy Bandwidth limitBandwidth limit Filter based on “signature” of filesFilter based on “signature” of files EducationEducation

– Including changing of cultureIncluding changing of culture

BackgroundBackground

15 July 2005 P2P and Cyber Security 5

P2P TechnologyP2P Technology

Is it a step forward in technology or a step Is it a step forward in technology or a step backwards in the use of the network?backwards in the use of the network?

– Depends on content and useDepends on content and use• Could this be a method to distribute scholarly Could this be a method to distribute scholarly

materials on all of the digital repositories that are materials on all of the digital repositories that are being created?being created?

• Could this be the technological basis for a new Could this be the technological basis for a new business and distribution model for the business and distribution model for the entertainment industryentertainment industry

Should universities provide a service or should Should universities provide a service or should they disintermediate?they disintermediate?

– iTunesiTunes

A Look at the EnvironmentA Look at the Environment

Martin Green, Esq.Martin Green, Esq.

iTunesiTunes

Thomas Bartlett, Apple ComputerThomas Bartlett, Apple Computer

15 July 2005 P2P and Cyber Security 8

How are the Services being Used?How are the Services being Used? Digital Music News (July 2005) – Napster Faces Digital Music News (July 2005) – Napster Faces

Difficult Result at University of RochesterDifficult Result at University of Rochester

Napster faced some dour survey results from the University of Napster faced some dour survey results from the University of Rochester, with most students avoiding paid downloads Rochester, with most students avoiding paid downloads on the application. Napster has been brokering deals with on the application. Napster has been brokering deals with several universities to provide students with a legal music several universities to provide students with a legal music alternative, with Rochester one college to jump on board. alternative, with Rochester one college to jump on board. Most recently, UK-based newspaper The Register seized Most recently, UK-based newspaper The Register seized on the results from the recent survey, which showed on the results from the recent survey, which showed heavy usage of the on-demand service without any heavy usage of the on-demand service without any subsequent a-la-carte purchases. subsequent a-la-carte purchases. A modest 8 percent of A modest 8 percent of respondents indicated that they actually purchased respondents indicated that they actually purchased downloads from competing stores like iTunes and downloads from competing stores like iTunes and MusicMatchMusicMatch, while a sizeable group most likely grabbed , while a sizeable group most likely grabbed additional tracks from various P2P services.additional tracks from various P2P services.

15 July 2005 P2P and Cyber Security 9

How are the Services being Used?How are the Services being Used? Digital Music News (July 2005) – Napster Faces Digital Music News (July 2005) – Napster Faces

Difficult Result at University of RochesterDifficult Result at University of Rochester

The survey points to a very difficult college crowd, though the The survey points to a very difficult college crowd, though the Napster application itself appears to be getting heavy Napster application itself appears to be getting heavy usage. usage. 86 percent of those surveyed indicated that they 86 percent of those surveyed indicated that they have actively streamed songs, or obtained a tethered have actively streamed songs, or obtained a tethered downloaddownload, both of which are covered by university fees. , both of which are covered by university fees. But the students raised concerns over the use of WMA-But the students raised concerns over the use of WMA-based DRM on permanent downloads, with most used to based DRM on permanent downloads, with most used to the freedom of unprotected MP3s. That highlights an the freedom of unprotected MP3s. That highlights an interesting usage pattern, and places a tough spotlight on interesting usage pattern, and places a tough spotlight on existing DRM strategies. For Napster, the big question is existing DRM strategies. For Napster, the big question is whether students will opt to continue their subscriptions whether students will opt to continue their subscriptions upon graduation, though so far there is not strong upon graduation, though so far there is not strong evidence that this will happen.evidence that this will happen.

15 July 2005 P2P and Cyber Security 10

Fall 2004 Course – Managing IT ResourcesFall 2004 Course – Managing IT Resources

““Only the Paranoid Survive” Only the Paranoid Survive” (by Andy Grove)(by Andy Grove)

Business Goes on to New Heights

Business

Declines

The Inflection Point

15 July 2005 P2P and Cyber Security 11

Legal ClimateLegal Climate

How many people in this room have had “take How many people in this room have had “take down” notices at your institution?down” notices at your institution?

How many have had to respond to subpoenas?How many have had to respond to subpoenas?

15 July 2005 P2P and Cyber Security 12

Where does it End?Where does it End?

MusicMusic MoviesMovies SoftwareSoftware GamesGames Etc.Etc.

15 July 2005 P2P and Cyber Security 13

How to Manage P2P?How to Manage P2P?

Not allowNot allow Limit through policyLimit through policy Bandwidth limitBandwidth limit Filter based on “signature” of filesFilter based on “signature” of files EducationEducation

– Including changing of cultureIncluding changing of culture

15 July 2005 P2P and Cyber Security 14

Some Additional InformationSome Additional Information

How Much Information 2003?How Much Information 2003?– http://www.sims.berkeley.edu/research/projects/how-http://www.sims.berkeley.edu/research/projects/how-

much-info-2003/printable_report.pdfmuch-info-2003/printable_report.pdf CacheLogic – Consumer of DataCacheLogic – Consumer of Data

– http://www.cachelogic.com/research/slide3.phphttp://www.cachelogic.com/research/slide3.php Rensselaer Policy on Electronic CitizenshipRensselaer Policy on Electronic Citizenship

– www.rpi.edu/web/comecwww.rpi.edu/web/comec Rensselaer Research Libraries – “hot topics”Rensselaer Research Libraries – “hot topics”

– www.lib.rpi.edu/services/reserves/copyrighttopics.htmlwww.lib.rpi.edu/services/reserves/copyrighttopics.html EduCAUSEEduCAUSE

– www.educause.edu/conference/policy/2005/www.educause.edu/conference/policy/2005/ Useful Legal InformationUseful Legal Information

– counsel.cua.edu/fedlaw/counsel.cua.edu/fedlaw/