This isn’t a foolproof process. When copyright holders first started monitoring peer-to-peer networks for their content, they used strategies that could easily generate false positives; back in 2008, one group of researchers was able to generate copyright violation notices for wireless devices, like printers, that couldn’t possibly be sharing files. In MarkMonitor’s case, work is being audited by an outside contractor. But the contractor that the Center for Copyright Information was using last year, at least, was Stroz Friedberg, which spent years lobbying for the RIAA—“hardly an ‘independent’ reviewer,” the Electronic Frontier Foundation, which is deeply skeptical of the copyright alert program, pointed out. Gigi Sohn, the president of the digital rights group Public Knowledge (who also serves on the Center for Copyright Information board) said in a statement that she was urging everyone involved to be “more open and transparent” about the inner workings of the system. One way to increase transparency, she suggested, would be for the content companies and ISPs to provide information to alleged infringers about what file they were being accused of sharing and when. 


There is a way for customers to appeal. Within 14 days of receiving a fifth or six alert, they fork over $35 to have the alerts independently reviewed by the American Association of Arbiters. They must choose from among six possible defenses, explain their basis for making that claim, and provide back-up materials in their defense. 

Prevailing in this review process won’t be easy, though. Two of the defenses are relatively straightforward: If you can prove the work was published before 1923 and not subject to copyright law, you win, and if you can provide proof that you were authorized by the copyright owner to share the work, you win. 

After that, it gets harder. One possible defense is to argue that someone used your Internet service without authorization—a stranger jumped onto your Wifi and started downloading movies willy-nilly. But the arbiter won’t accept this defense unless you can show that you tried to keep your network secure. (EFF and other groups are worried that this system will start closing down the open Wifi movement and will stop the culture of coffee shops and other public spaces offering free Internet.)

It’s also possible to defend your actions on fair use grounds, but the Center for Copyright Information’s website makes this sound tricky—it advises enlisting a lawyer before even trying. But you likely have a better chance of winning on this defense than on “misidentification of account” and “misidentification of file.” When presented with either of those two defenses, it’s up to the challenger to prove that the automated systems didn’t work in accordance with their specifications—a hard case to make, given how little information there is about them.

But will it work?

In this presentation, for instance, the RIAA’s deputy general counsel lays out the case for the copyright alert system. She cites a study of digital music that found that almost two-thirds of music changes hands without anyone paying, through digital lockers, hard drives, burned and ripped CDs, or peer-to-peer networks. In 2010 and 2011, according to the study, peer-to-peer transfers actually were less of a problem than people trading hard drives or ripping music. But the presentation argues that, in countries like France and New Zealand, programs like the copyright alert system have both cut into illegal peer-to-peer downloading and increased sales. 

That may be an optimistic view of how well these programs have worked. In France, only a handful of people have received three strikes—the maximum number of warnings in that system—and last year the government cut funding for the program by a quarter. According to a French government report, fewer people were illegally downloading content, and more said that they were likely to download music and movies from legitimate sources. But there are also some indication that, contrary to what they tell the government, people in France are simply switching from peer-to-peer networks to streaming or digital lockers in order to access music and movies.

No one involved thinks that these alerts will stop determined downloaders. It’s simple enough to shield an IP address that anyone who wants to keep snagging movies or music from networks like BitTorrent should be able to figure out how, well before their ISP gets around to sending a fifth of sixth warning.

Disclosure: CJR has received funding from the Motion Picture Association of America (MPAA) to cover intellectual-property issues, but the organization has no influence on the content.

If you'd like to get email from CJR writers and editors, add your email address to our newsletter roll and we'll be in touch.

Sarah Laskow is a writer and editor in New York City. Her work has appeared in print and online in Grist, Good, The American Prospect, Salon, The New Republic, and other publications.