decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
rootkits | 401 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
IP Theft Commission Report - selected quotes
Authored by: Anonymous on Monday, May 27 2013 @ 04:48 AM EDT
The annual losses are likely to be comparable to the current annual level of U.S. exports to Asia—over $300 billion. The exact figure is unknowable, but private and governmental studies tend to understate the impacts due to inadequacies in data or scope. The members of the Commission agree with the assessment by the Commander of the United States Cyber Command and Director of the National Security Agency, General Keith Alexander, that the ongoing theft of IP is “the greatest transfer of wealth in history.” [p.2, emphasis added]
Translation, We don't know how big it is, but if we fire at random we must eventually hit something
Perhaps more importantly, vulnerability- mitigation measures have proved largely ineffective in defending against targeted hackers, who are hired specifically to pursue American corporations’ intellectual property.
Translation, Our systems and networks are useless to withstand attacks, but we buy them from a Big American Corporation, what else can we do?

The Report frequently observes "that Chinese-origin IP theft is disproportionately large in size and impact" without observing that the Chinese market for software, music and movies is driven to pirate copies because of outside suppliers' inability or unwillingness to timely supply Chinese versions. I have purchased pirate copies on dvd of recent release movies because they appear on the market, professionally dubbed, with subtitles, and playable in region 0 a week after initial release in their home market, and a year before the scheduled studio release of Chinese versions.

The IP Commission Report PDF, 1.7MB, 84pp

United States Trade Representative - 2013 Special 301 Report PDF, 590kB, 59pp

[ Reply to This | Parent | # ]

it's worse than that - USA Intellectual Property Theft Commission Recommends Malware ! ! !
Authored by: jonathon on Monday, May 27 2013 @ 12:14 PM EDT
This is simply one more reason why the system one uses for real
work/entertainment is not connected to any networks.

[ Reply to This | Parent | # ]

rootkits
Authored by: digger53 on Monday, May 27 2013 @ 12:46 PM EDT
Seems they want to install rootkits on all computers.

[ Reply to This | Parent | # ]

it's worse than that - USA Intellectual Property Theft Commission Recommends Malware ! ! !
Authored by: Anonymous on Tuesday, May 28 2013 @ 05:33 AM EDT

But amidst all that crazy, there's a bit that stands out as particularly insane: a proposal to legalize the use of malware in order to punish people believed to be copying illegally.

The report proposes that software would be loaded on computers that would somehow figure out if you were a pirate, and if you were, it would lock your computer up and take all your files hostage...
Rumours have it that the original virus was such an attempt - it was a deliberate anti-copyright infringement program that I presume was meant to cause "deserved" havoc with the copyright infringing bod; only it went slightly wrong and has been seized upon by others.

How long after the "legal" virus is written will others take it for their own nefarious uses?

What's going to happen to all the false positives that may result? Is there going to be fines for the authors (/commissioners) of the software if they hijack a totally innocent user's machine? (At least compensation for the inconvenience - doubled or tripled to ensure proper malware is written?)

[ Reply to This | Parent | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )