MIT Releases Subpoenaed Student's Info 84
An anonymous reader submits: "MIT has released the name of the alleged infringer whose information was subpoenaed by the RIAA. The student's position? He was (1) not in the country at the time of the infringement, (2) he does not own a computer, and (3) he is not, and has never been, associated with the username in question (crazyface@KaZaA). MIT initially opposed the subpeona, but the RIAA refiled with the proper court."
Let's see.. (Score:2)
Perhaps if the RIAA *pays* $2000 (Score:4, Interesting)
Re:Perhaps if the RIAA *pays* $2000 (Score:2)
I can see the RIAA coming back and saying 'Well, MIT says it was you. Cough up some dough. $2000 will do' and then leaving without so much as giving him a reach-around.
Personally, I hope that the RIAA tries to persue this guy and that MIT gets involved on his behalf. Let the two of them duke it out.
Re:Perhaps if the RIAA *pays* $2000 (Score:1)
MIT will have to get involved because how else can anyone hope to tie an IP to meatspace? Not that there's much hope anyways, depending on the network model and logging.
Re:Let's see.. (Score:2)
MIT and no computer? (Score:5, Funny)
It could happen. (Score:3)
MIT and no computer? Yeah right.
Keep in mind how they measure things when they don't have a measuring device [astrian.net]. Who says they aren't equally creative when it comes to computing things with out a computing device?
-- MarkusQ
P.S. That's what my wife (an MIT grad) claims to be doing sometimes when she stares off into space. Since the result often conflicts with my pet theory of the moment, I'm not sure how accurate the process is though.
Re:It could happen. (Score:2)
Re:MIT and no computer? (Score:3, Informative)
And I was course 6 (EECS).
When? (Score:1)
I think MIT when downhill after students were not encouraged to sleep in the SCC library.
Open post to whomever modded parent (Score:1)
Two questions:
1. Have you ever heard of Tiger Woods or Eminem?
2. Did you lose your sense of humour or did you just never have one in the first place?
Just use Athena (Score:2)
It is very, very easy to make it through MIT without your own computer.
Re:MIT and no computer? (Score:1)
I'd say the situation was "ironic" but I'm afraid someone will correct me...
Re:MIT and no computer? (Score:2)
On another note, his story is perfectly believable. We have MAC address registration at my university as well,
Er...Dude... (Score:3, Interesting)
This is getting beyond a joke. The 'registration' talked about is the @Kazaa, as far as I can see, and you can change that in seconds
This gets even sillier if they mean the IP.
Re:Er...Dude... (Score:5, Informative)
Re:Er...Dude... (Score:2)
Thanks. I'll be spending the rest of today digging egg out of my assorted facial orifices.
Re:Er...Dude... (Score:1)
Big question -
There are hardware devices (personal firewalls) that allow you to CHANGE the broadcasted MAC address on the fly. If I installed one of those in my dorm at MIT, and kept changing and re-registering my new MAC addresses, I would have, theoretically, obtained multiple IP addresses also. Or, better yet, I could just change my broadcasted MAC address to one that I know is already registered. Viola - I'm now "using someone else's computer" without physically doing so.
Re:Er...Dude... (Score:2)
Re:Er...Dude... (Score:1)
Re:Er...Dude... (Score:2)
Re:Er...Dude... (Score:4, Interesting)
So, are MAC addresses about to become as `sensitive' as social sercurity numbers? (of course, just like your SSN, your MAC address is broadcast with every packet you send out, at least to the first router :) )
Re:Er...Dude... (Score:1)
Re:Er...Dude... (Score:3, Interesting)
So, do you consider MIT to be an organization of any small size? I'm not aware of any schools that put their dorms behind a NAT. I haven't been paying attention lately, but it used to be that A&M was the only large school that even put their dorms behind a firewall (and it wasn't a NAT)!
Or an ISP? AOL is the only ISP of any size that I'm aware of that puts it's customers behind a NAT.
Re:Er...Dude... (Score:1)
I don't really know the answer to that question but I'm guessing it's "no"
My point being that any organization larger than a fe people is likely to have a firewall doing NAT-
Meaning that *only* the orginization itself will be able to see mac addresses and be able to tie them to individual users.
Contrast to "no nat", and the ISP would be able to see thse things.
Re:Er...Dude... (Score:2)
I'm not familiar with MIT specifically, but most universites *are* set up that way.
Incorrect. Businesses usually put their users behind a NAT, but ISPs rarely do, and schools rarely do as well. End users do not want usually want to be behind a NAT --
Re:Er...Dude... (Score:2)
How very clever of you to question my education!
Here's a few universities that ARE set up this way --
Re:Er...Dude... (Score:2)
A DHCP server knows MAC-addresses.
Almost anything behind the NAT has ready access to the MAC-addresses.
Anybody who actually knows anything about this stuff could expound further.
Re:Er...Dude... (Score:1)
Re:Er...Dude... (Score:1)
Apparently the ip address of the infinger was the MAC address that got registered as this guy. He says he may have borrowed someones computer but doesn't remember (He probably does but is trying to cover I bet if stuck with being sued he'll probably tell).
Re:Er...Dude... (Score:2)
Only if he's weak/doesn't have a good lawyer.
I'm not in USA, but I would guess that he can't be prosecuted for poor memory. The RIAA would have to prove he can remember and then sub-poena him for the name of the dude he borrowed the PC from.
If he didn't
Twisted (Score:3, Informative)
Sounds like the guy in question had unofficially let someone else use his computer, account, etc.
I kind of like the idea of RIAA making a big fuss and pursuing legal action and then turning out to be wrong.
It helps shine a light on their gestapo tactics.
It may not slow them down too much, but the publicity helps to make them look like ravenous wolves out to get "whoever".
That kind of PR will erode their support from government.
Re:Twisted (Score:5, Informative)
Not quite. From what I can gather MIT have a system whereby as soon as a un-recognised MAC-address hits the network, the machine is DHCP-d a temporary IP and a all web-traffic is relocated to a registration page.
On this page, a valid MIT id and password is entered then the temporary IP becomes 'attached' to that MAC address with the MIT id used stored in a DB somewhere.
Hence just having an IP registered to a particular user is just an indication that that guy/guyess was the first to use the machine, not that its theirs or that they even have an account on it.
In fact, if all MIT students registered their machines under a common id (e.g. riaasuckmyballs) then there would suddenly seem to be one big pirate there :)
The system as it stands will probably just match an IP to a person who once used the machine in question.
Re:Twisted (Score:1)
I suspect that MIT has a clause in their AUP stating that you're not to let others utilize your machine and that you are responsible for anything that any other person may do with the resources you've been assigned. The RIAA can trot that out and it will probably convince a judge or jury that the someone else was using my account defense is invalid. As I see it, the only real option in this case is to try to show that you were hax0red (in essence that whoever used KaZaa on that system had no permission to
Re:Twisted (Score:2)
Re:Twisted (Score:2)
as the system works just so that every new mac address to get activated one has to enter user/pass once for that mac.
of course, this doesn't sound like a very good system to me, as you can quite easily end up completely lost on who is using it actually. heck, somebody could be reselling pre-activated cards, or have some driver that allowed changing of mac and go through dozens or just use one he knew to work, but that wasn't in the same segment..
here they'll know pr
Re:Twisted (Score:2)
Proxies won't matter; the RIAA will simply go after the proxy operator. A strong legal argument could be easily made that the operator of the proxy is responsible for all traffic relayed by the proxy.
As to Freenet, that's what the RIAA wants. If they make it so that it takes a day to get a song, the casual users will disappear.
Re:Twisted (Score:3, Informative)
all the popular top ten hits would get very well spread i would say, even now you can get selected mp3's at ~10-30kbyte/s easily from freenet, i guess much faster if you run a permanent node with a big datastore(heck, run a big enough datastore and the chances are that those pop songs are in your store mostly already and you'll get
Re:Twisted (Score:1)
Really? Then I hope no drug dealers get busted in front of my house, on the sidewalk I am legally obligated to maintain.
Re:Twisted (Score:1)
Among other things, bringing the violation of a contract into the court (it is germane to the case as the violation is admitted to as part of the defense) would be used to reflect on the character of the defendant. It would also be used to demonstrate that the defendant can't in good faith use that defense.
Re:Twisted (Score:1)
Re:Twisted (Score:1)
That still doesn't change the fact that he violated the AUP by allowing someone else to use resources owned by or registered to) him.
Re:Twisted (Score:3, Insightful)
If he's got an alibi, then he didn't infringe the plaintiff's copyright. If they say "but you must have broken the AUP!", he can say "I guess I must have, but I didn't download those files."
If MIT then want to have a go at him for breaking the AUP, that's fine, but I imagine they're not in the habit of suing their students.
That doesn't follow (Score:2)
MIT would probably have handled this best by
Re:Twisted (Score:2)
MIT may have this, but it's more than likely not legal.
Good example, your car... I am not responsible for the damages you cause if I loan it to you and you crash into a gas station. Now, I will have to prove to the cops that it wasn't me driving if you hit and run, but beyond that,
You ARE responsible if they crash your car (Score:2)
If some extremely unpredictable act happens your insurance will be liable before theirs, if your insurance covers that person driving (most do) In that way you're being fiscally responsible.
More importantly, if the plaintiff can show that you knew or should have known they were a poor driver, you then can be liable for having put a weapo
Re:Twisted (Score:2)
Re:Twisted (Score:2)
Re:Twisted (Score:1)
Sometimes, if a "community" computer needs renewing, or if you're using i
Bound to happen (Score:5, Insightful)
The real question is how long this sort of trawling will be allowed. The student could get the case dismissed on summary judgement, and the RIAA seriously admonished about bringing frivolous lawsuits.
Re:Bound to happen (Score:1)
With the RIAAs gill-net fishing technique, they're bound to catch some innocents.
Looks like they got themselves a dolphin here.
aha! (Score:5, Funny)
So that means he's actually under the authority of the Romanian Industry and Art Association right?
Re:aha! (Score:1, Funny)
Re:Misleading title (Score:2)
MAC address can be changed (Score:5, Informative)
And according to the article, he was out of town (way out, like Romania) and therefor could not be the person who set up the computer. Since he can prove that he was out of the US I don't think that he will have to make any deals to save his ass.
NarratorDan
Re:MAC address can be changed (Score:1)
His name was Claudiu Prisnel. (Score:2, Funny)
His name was Claudiu Prisnel.
A Setup?? (Score:3, Interesting)
Re:A Setup?? (Score:2)
i suppose that could mean MIT has to face legal trouble for record-keeping negligence, but since some ISPs offer lack of records as a privacy service, i imagine not.
i'm not a lawyer, but don't get your hopes up that a loss here would mean anything big or in any way stop or slow the RIAA
The RIAA is on a roll (Score:3, Funny)
A modest proposal (Score:3, Interesting)
Get a bunch of fellow college students together (the more, the merrier) and organize a group buy of a bunch of NICs.
Everyone registers their NIC with the university, and then swap the cards amongst yourselves in a double-blind fashion. When questioned about it later, just call it an administrative screw-up or just say you sold the card to another university student and you no longer remember who it is.
If this activity is rampant enough, we can regain anonymity on college campus networks.
Re:A modest proposal (Score:2)
Every time you share on a P2P network, RIAA kills a kitten.
Please think of the kittens.
Oh, but I do.
I hate kittens.
So what's RIAA Strategy here? (Score:2, Funny)
Hey Martha - Get out the Nachos. This s**t's gonna be
RIAA: {looks at list of IP #'s) There's the Perp's PC with IP Address we're looking for! Seize it!
Company: Nope, that's just a Dos Print Server.
RIAA: {looks at list
You don't know how true this is (Score:1)
These organizations really do sometimes have bad information.
scheduling files (Score:2, Insightful)
The MIT student could have scheduled the files to download at a certain time, though I'm not aware of a specific program that does this.
Of course it would be damn hard to prove that he did so, especially if they haven't gotten a chance to look at the computer.
It is possible (Score:3, Informative)
It is very possible, especially over the summer, for one of the temporary residents (females from other schools typically at the fraternities) to just pick an IP from the block assigned to the house and end up looking like the user who originally registered the IP. There are no network checks to verify a MAC address unless you are using DHCP.
And if you registered a computer you borrowed under your account with DHCP, unless you specifically unregister it someone else could continue using the computer even though it's IP entries are registered to you (I even don't know how to do that on MIT's network, and I go to school there).
So, long story short, this guy's claims are very possible, especially if he has people that back up his claim that he borrowed the computer. If this guy really was in Romania, I imagine someone else actually committed the infringement, but those records would be impossible to find since you don't have to log in with your MIT account every time you use MIT's Internet access.
More info from The Tech (Score:2)
You're all missing a very big point (Score:4, Insightful)
Get that through your head.
It's entirely conceivable that this guy left Kazaa running while going away to Romania, with all his stuff shared.
I dunno- that's kinda how the shit works when you've got a permanent connection.
To give back, you leave the stuff running even while you're not there.
Re:You're all missing a very big point (Score:1)
*You're* missing a very big point (Score:2)
It's entirely conceivable that this guy left Kazaa running while going away to Romania, with all his stuff shared.
With what computer? RTFA: "Prisnel says he has never owned a computer in the United States, a fact to which 20 other students signed a statement attesting on his behalf."
Re:*You're* missing a very big point (Score:1)
Myabe he doesnt "own" it.
Maybe he rented it, leased it, or maybe it's "owned" by his parents, and he just uses it while at school.
I don't fucking know- the point of my post is that just because hes away in romania doesnt mean he couldnt have been sharing files.
Re:You're all missing a very big point (Score:2)
RIAA motives (Score:1)