defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting...

25
After Napster

Transcript of defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting...

Page 1: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

After NapsterThe Inevitable Accent of Peer-to-Peer Networks, LiveHives, Smart Mobs and Massive Subscription File-Sharing Services

Page 2: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Table of Contents

Personal Information............................................................iiiPrimary Speaker’s Name*................................................................................................iii

Primary Speaker’s Title.....................................................................................................iii

Speaking on Behalf of Sponsoring Organization............................................................iii

Additional Speakers' Name(s)* & Titles..........................................................................iii

Previous DEF CON Speaking Experience.......................................................................iii

Presentation Information......................................................ivName of Presentation........................................................................................................iv

Most Appropriate DefCon Track for this Topic................................................................iv

Presentation Time Requirement........................................................................................iv

Demonstration Information...............................................................................................ivDemonstration Elements.....................................................................ivVideo Presentation: “LiveHives: theBuzz @ theBarricades” ivExpert Panel: After Napster: the Future LiveHives and Massive Peer-to-Peer Sharing Services vLiveHive.org Tour vi

New Tool Release: LiveHive 1.0........................................................................................vi

Exploit Release Information..............................................................................................vi

Audience Participation.....................................................................................................viiInstant LiveHive Demonstration..........................................................viiPanel Discussion Q & A.......................................................................viiTchotchke Spree: Got Kittyhead?........................................................viiAudience Interviews for Possible Inclusion in the Tension Structure Films Production (Post-presentation)...........................................................viiParticipation in the LiveHive Experiment (Post-presentation)...............vii

Equipment Needs..............................................................................................................vii

Detailed Outline...................................................................ix

Abstract.............................................................................xiv

Supporting File(s).................................................................................xv

DefCon Presentation Proposal: SSG-SF06-08-2003 Page ii

Page 3: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Date of Submission: Friday, June 13, 2003

Personal Information

Primary Speaker’s Name*Leia Amidon

Primary Speaker’s TitlePartner / Principal Security TechnologistSunStorm Security GroupFormer Principal, Security Technologies, Napster, Inc.

Speaking on Behalf of Sponsoring OrganizationSunStorm Security Group

Additional Speakers' Name(s)* & TitlesOmar Ahmed, CEO, Madscientest Foundation

Former VP of Operations, Napster, Inc.David McLeod, Tension Structure FilmsDirector, “LiveHives: theBuzz @ theBarricades”Harry Regan, CEO, SunStorm Security Group

Security Infrastructure Consultant to Napster, Inc.

Still Awaiting Confirmation:Shawn Fanning, Founder, Napster, Inc.

*Real Names provided

Previous DEF CON Speaking ExperienceHas the speaker spoken at a previous DEF CON? No

DefCon Presentation Proposal: SSG-SF06-08-2003 Page iii

Page 4: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Presentation Information

Name of PresentationAfter Napster: The Future of “LiveHives” and Massive Subscriber-Based Online Sharing Services [MSBOSS]

Most Appropriate DefCon Track for this TopicSaturday (August 2):[ The Big Picture ]

Presentation Time Requirement How much time does your presentation require?90 minutes

Demonstration InformationIs there a demonstration? Yes

Demonstration ElementsVideo Presentation: “LiveHives: theBuzz @ theBarricades”

Demonstration Time: 15 minutes.

“LiveHives: theBuzz @ theBarricades” is an original digital video documentary that explores the impact of “livehive” and “smart mob” technologies on protest organizing strategies and reactive tactics facilitated by messaging during live protest demonstrations.

According to Howard Rheingold, "Smart mobs emerge when social networks use mobile communication devices, pervasive computation, peer to peer and reputation management methodologies to coordinate collective action - political, social, economic." Our video explores some of the real-world applications of this emerging technology.

DefCon Presentation Proposal: SSG-SF06-08-2003 Page iv

Page 5: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

The documentary consists of interviews with San Francisco and Bay Area activists regarding their use of emerging messaging technologies: standard and video/audio-phone blogging, invitation and organizing services, smart mob messaging, and the logistics of livehive coordination of protesters executed in real-time.

Original footage of the break-away “black bloc” protesters from the January 18th, 2003 anti-war demonstration in downtown San Francisco is the introduction to our thesis. Along with analysis of the strategic demonstration to block streets entitled, “A Movable Feast,” and examination of the 10th anniversary Critical Mass ride serve to offer us a view of the potentials of livehives as a vehicle of uncensored communications broadcast and survivability.

The documentary's soundtrack is an appropriate score for this work exploring the emerging technologies of messaging as it has been entirely composed of remixes of samples of ringtone and ambient sound.

This version of the documentary has been edited expressly for inclusion in this submission, and customized with the DefCon community's interests in mind.

Expert Panel: After Napster: the Future LiveHives and Massive Peer-to-Peer Sharing Services

Demonstration Time: 15 minutes

Leia AmidonFormer Principal, Security Technologies, Napster, Inc.

Omar AhmedFormer VP of Operations, Napster, Inc.

David McLeodFilmmaker “LiveHives: Street Buzz”

Harry ReganSecurity Infrastructure Consultant, Napster, Inc.

Tentative: Shawn Fanning, Founder, Napster, Inc.

DefCon Presentation Proposal: SSG-SF06-08-2003 Page v

Page 6: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Demonstration Objective

Panel discussion experts shall each answer two of the following possible questions, as it applies to their hypothesis of the future of massive peer-to-peer networks.

Towards participant spontaneity, the determination of which question any particular panel member will address, they will be asked (or they may designate a proxy from the audience) to draw a question from a fishbowl.

Example questions:

“In massive subscriber based peer-to-peer systems, does size matter? That is, which is more important: Fat Pipe or Open Shortest Path First?”

“Fill in the Blank, and then explain your answer: ‘The RIAA was ________, but now the RIAA is _______.’”

LiveHive.org TourIntroduction and walk-through of livehive.org.(Requires live Internet connection.)

New Tool Release: LiveHive 1.0Are you releasing a new tool? Yes

At livehive.org we shall be introducing a social collabrative messaging system: LiveHive 1.0.

There also is a collateral CD-ROM handout that includes livehive.org information

Exploit Release InformationAre you releasing a new exploit? No

DefCon Presentation Proposal: SSG-SF06-08-2003 Page vi

Page 7: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Audience ParticipationIs there audience participation? Yes.

Instant LiveHive DemonstrationWe shall coordinate a spontaneous attempt to demonstrate LiveHive information messaging using the available audience device capability.

Panel Discussion Q & AOur subject-matter expert panel will take questions from the audience.

Tchotchke Spree: Got Kittyhead?Over 1000 original “Napster Kittyhead” buttons, guitar picks, and stickers will be given away to all presentation attendees, along with a genuine Napster t-shirt as prizes for audience participation segments.

Audience Interviews for Possible Inclusion in the Tension Structure Films Production (Post-presentation)

Tension Structure Films will be conducting an interview session after the presentation where, if so inclined, an attendee who wishes to share their experiences and views about file sharing, smart mobs, and livehives.

Participation in the LiveHive Experiment (Post-presentation)The audience will be encouraged to participate in the LiveHive Experiment at livehive.org. How do people use livehives and smart mobs?This is a pure research project.

(How to’s and links to phone/photo blogging sites will also be at this site.)

Equipment Needs

Will you require more than 1 LED projector?No. We shall require only 1 LED projector.

Will you require wireless internet access?No

DefCon Presentation Proposal: SSG-SF06-08-2003 Page vii

Page 8: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Will you require wired internet access? Yes.

We’d like access from our presentation computer for the livehive.org tour.

Will you require a white board? Yes.

Our panel has indicated that they would appreciate a white board for the question and answer audience participation segment as many questions may best be answered via illustration.

Are there any other special equipment needs that you will require? No

DefCon Presentation Proposal: SSG-SF06-08-2003 Page viii

Page 9: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Detailed OutlineAfter Napster: The Inevitable Accent of Peer-to-Peer Networks, LiveHives, Smart Mobs and Massive Subscription File-Sharing Services

1) Napster: The File-Sharing Invasion a) Do You Want to Know a Secret?: Introducing Napster and Shawn Fanning’s Vision

i) Created the Napster file-sharing utility in 1998ii) Written to share files with his friends on campusiii) Popularity of the Napster service and software grows

b) From Me to Youi) June 1, 1999: Napster begins operations, allowing people to swap music files.ii) August, 1999: Shawn’s uncle, John Fanning, invested initial seed moneyiii) Napster appoints the first CEO, Eileen Richardsoniv) First negotiations with major record companies fall throughv) December 7, 1999: RIAA sues on the basis of copyright infringement asking for

damages of $100,000 each time a song is copied.vi) March, 2000: Scores of universities ban Napster because heavy student use is

overwhelming their computer systems. Students circulate online petitions, urging administrators to lift their Napster bans.

c) 300,000 Fans Can’t Be Wrongi) APR. 13, 2000: Rock band Metallica sues Napster for copyright infringement.ii) MAY 9, 2000: Napster, in order to show concern over copyright infringements,

removes over 300,000 members from its service for downloading Metallica songs.

d) With A Little Help From My Friendsi) May 21, 2000: Hummer Winblad invests $15 million in Napster.

e) Help! RIAA Wars Begini) JUNE 13, 2000 The RIAA files a motion for a preliminary injunction to block all

major-label content from being traded through Napster. Napster hires former A&M Records exec Milton Olin

ii) JUNE 13, 2000 The RIAA files a motion for a preliminary injunction to block all major-label content from being traded through Napster.

iii) JULY 24, 2000 Napster announces plans to work with digital-rights technology company Liquid Audio to try to make its music downloads safe for copyright holders.

iv) JULY 26, 2000 U.S. District Judge Marilyn Patel rules in favor of the record industry and orders Napster to stop allowing copyrighted material to be swapped over its network by midnight two days later.

v) JULY 28, 2000 Hours before Napster would have had to shut down, the Ninth U.S. Circuit Court of Appeals rules that the company should be allowed to continue its operations.

vi) OCTOBER 2, 2000 Appeals court hears oral arguments regarding the injunction.

DefCon Presentation Proposal: SSG-SF06-08-2003 Page ix

Page 10: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

f) Come Together i) OCTOBER 31, 2000 Napster announces partnership with German media company,

Bertelsmann AG, to develop a membership-based distribution system that would guarantee payments to artists.

g) I’m Downi) FEBRUARY 12, 2001 Federal appeals court rules that Napster must stop trading in

copyrighted material and may be held liable for copyright infringement.

h) We Can Work It Out i) MARCH, 2001 Napster puts in place a file filtering system designed to block users

from downloading specific music files specified by an initial list provided by record company attorneys.

ii) MARCH, 2001 Judge Patel rules that the burden of notification is on the recording industry, thus lessening the legal burden on Napster.

iii) JULY, 2001 In response to the court's demands, Napster begins to utilize Playmedia systems' secure encoding and playback technology in its new membership service.

i) Let It Bei) JULY 11,2001 Despite a 99% effectiveness rate by Napster's security technology in

identifying and screening out noticed music copying abuses, a district court judge issues an order prohibiting Napster from enabling file transfers unless it reaches a 100% success rate. This order essentially shuts the Napster file sharing service down

ii) SEPTEMBER 25, 2001 Napster reaches a deal with songwriters and music publishers. The settlement says that Napster will pay 26 million to them as well as a percentage of the money it takes in when it begins its paying service scheduled to begin in the first part of 2002.

j) Hello Goodbyei) May 2002-July 2002, Internal lawsuits bring Napster to bankruptcy court.ii) November 2002: Roxio buys the Napster brand, trademark, and all remaining

intellectual property.

k) Imagine: The Future of Filesharingi) Current filesharing services ii) Whither the recording industry?iii) Utopian visions

DefCon Presentation Proposal: SSG-SF06-08-2003 Page x

Page 11: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

2) The Napster Engine

a) Subscribe to Napster: 98 Million Users Can’t be Wrongi) The Numbers Game

18,000,000 people have broadband at home now (IBID) 34% of U.S. population regularly streams music today (Arbitron/Edison Media) Napster enlisted more users in 1 year than AOL did in 15 years. (Arbitron/Edison

Media) 34% of U.S. population regularly streams music today (Arbitron/Edison Media) 40% of U.S. population will be listening to Internet radio by 2003 (Webnoize) Digital downloads will grow from 3% of online music sales in 2001 to 30% in 2006

(Jupiter Media Metrix)

Napster enlisted more users in 1 year than AOL did in 15 years. (Arbitron/Edison Media)

The Napster architecture: 118 servers serve the globe.

b) Peer-to-Peer-to-Powerfuli) From Doom to Tunes

MMOGs and Online Gaming In the beginning there were games

The global demand for music Economic forces

The recording industry RIAA and other interested parties DMCA and copyright law

c) It’s the Primal App, Stupidi) Napster as a Killer Appii) Why some peer-to-peer systems failiii) How to build a successful peer-to-peer system

d) Fractal Networksi) Let the system architecture do the heavy liftingii) If you believe in it, let it goiii) Managing chaos

e) Napster’s Paradox to the Three Laws of Thermodynamics: You Can Win, You can Break Even, and you Never Want to Get Out of the Game

f) Napster Nosferatu: The Architecture of the Second Coming of Napster

DefCon Presentation Proposal: SSG-SF06-08-2003 Page xi

Page 12: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

3) LiveHive: theBuzz

a) Constant access to communication devices allows people to communicate more directly with more people

b) Faster communications among groups of peoplec) Global scale of communication is greatly expandedd) Communication technologies are becoming more pervasive

More mobile telephones are being installed in the United States than land lines High-speed internet access is becoming as common as television access

e) Communication is becoming decentralized f) The nature of the devices makes the nature of the communication more decentralizedg) People are no longer so dependant on centralized government or broadcasting agenciesh) People to organize in ways that they hadn’t been able to beforei) Desktop computers has have become considerably more powerful

DefCon Presentation Proposal: SSG-SF06-08-2003 Page xii

Page 13: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

j) Most computers now have Internet connections.k) Networking allows for collaborate on unprecedented scalesl) Communications are now at higher speed than ever

4) LiveHives: Collaboration Amperagea) Compound Eye

i) Total Information Awarenessii) Communities Onlineiii) Organizingiv) Sharing Visions

b) A Global Colonyi) Political Reformii) Environmental Awarenessiii) Commercial and Humanitarian Aid Efficiencies

c) From Wax to Swarming (Analog to Networked)i) The Trajectory of Global Networkingii) Electronic Pollinatorsiii) Information’s Supremacy over Machines

d) The Planetary Moshi) Putting the Universe in Universityii) Dangers of the Dance: A Cautionary Tale

DefCon Presentation Proposal: SSG-SF06-08-2003 Page xiii

Page 14: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Abstract

From Napster to the current emerging techno-social phenomena of livehives and smart mobs, the evolution of peer-to-peer networks is exhibiting an exponential profligacy both in use and popularity, and actually influencing the evolution of human social interaction on both a local and a global scale.

Beginning with Napster, the popular Internet file sharing software created in 1999 by Shawn Fanning, arguably a revolution has taken place.

Napster was at the forefront of the one of the most important electronic debates of the 20th century’s fin-de-siecle: DMCA and various attendant copyright debates.

However, the perhaps the most important role that Napster played was as a “proof of concept” on a grand scale (98 million globally at it’s peak) of the power of peer-to-peer communications.

Wireless data communication devices have screamed onto the networking scene in and may be poised to revolutionize social intercourse. Blogger journos can instantly upload text, audio, and video to their weblogs from the scene of breaking news events. With conventional cellular telephones tactical organization of crowds, “smart mobs,” can be coordinated in political actions.. The newest breed of communication technologies can document in real-time documentation of an event without the need to rely on traditional media reports.

In “proof of concept” exercises, recent anti-war protests have utilized “livehive” and “smart mob” technologies to out flank police actions and effectively shut down city centers and targeted economic targets.

“After Napster” will follow the evolution of peer-to-peer networks and their evolution as social communities of affording a new level of global awareness and action.

DefCon Presentation Proposal: SSG-SF06-08-2003 Page xiv

Page 15: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

Supporting File(s)

Additional files/materials? Yes or No

Type of file(s): Powerpoint, Word, PDF or Other

Additional supporting materials such as code, white papers, proof of concept, etc should be sent along with this email to talks<a>defcon.org. Note that additional files that may help in the selection process should be included. We are NOT asking for a complete presentation for submission along with the CFP.

DefCon Presentation Proposal: SSG-SF06-08-2003 Page xv

Page 16: defcon.org€¦  · Web viewType of file(s): Powerpoint, Word, PDF or Other. Additional supporting materials such as code, white papers, proof of concept, etc should be sent along

DEF CON CFP SubmissionSunStorm Security Group 775 Post Street, Suite 304

San Francisco, California 94109-6187

DefCon Presentation Proposal: SSG-SF06-08-2003 Page xvi