The Pirate Book Warez
The Pirate Book Warez
The Pirate Book Warez
===================================================================
= === === ====== ==== == ===
= ==== ===== ====== ===== ===== ========= ====== ========
= ===== ===== ====== ===== ==== = ======== ====== ========
= ===== ===== ====== ==== ===== = ======== ====== ========
= === ====== ====== ===== === ======= ====== ====
= ======== ====== === ===== === ======= ====== ========
= ============ ====== ==== === ====== ====== ========
= ============ ====== ===== == ===== ====== ====== ========
= ========= === ===== = ======= ===== ====== ===
===================================================================
===================================================================
= ===== ====== ==== ===== ========================
= ==== === === ==== === === ==== =========================
= ===== == ===== == ===== == === ==========================
= === === ===== == ===== == == ===========================
= ==== ===== == ===== == ============================
= === === ===== == ===== == == ===========================
= ===== == ===== == ===== == === ==========================
= ==== === === ==== === === ==== =========================
= ===== ====== ==== ===== ========================
===================================================================
===================================================================
Edited by Nicolas Maigret & Maria Roszkowska | thepiratebook.net
===================================================================
THE PIRATE BOOK
===================================================================
= === === ====== ==== == ===
= ==== ===== ====== ===== ===== ========= ====== ========
= ===== ===== ====== ===== ==== = ======== ====== ========
= ===== ===== ====== ==== ===== = ======== ====== ========
= === ====== ====== ===== === ======= ====== ====
= ======== ====== === ===== === ======= ====== ========
= ============ ====== ==== === ====== ====== ========
= ============ ====== ===== == ===== ====== ====== ========
= ========= === ===== = ======= ===== ====== ===
===================================================================
===================================================================
= ===== ====== ==== ===== ========================
= ==== === === ==== === === ==== =========================
= ===== == ===== == ===== == === ==========================
= === === ===== == ===== == == ===========================
= ==== ===== == ===== == ============================
= === === ===== == ===== == == ===========================
= ===== == ===== == ===== == === ==========================
= ==== === === ==== === === ==== =========================
= ===== ====== ==== ===== ========================
===================================================================
===================================================================
Edited by Nicolas Maigret & Maria Roszkowska
Published by Aksioma Institute for Contemporary Art, Ljubljana
Co-published by Pavillon Vendme Art Center, Clichy
Produced by Aksioma, Pavillon Vendme, Kunsthal Aarhus,
and Abandon Normal Devices /
2015
Colour digital edition / free download / ISBN 978-961-92192-6-3
===================================================================
===================================================================
http://thepiratebook.net
===================================================================
This book could not have been made without the help of:
street vendors, photocopiers, bootleg recordings, double
cassette decks, cracktros, .nfo files, VHS recorders, CD burners,
scanners, BBS, copy parties, game copiers, Warez, keygens,
Napster, eDonkey, Soulseek, The Pirate Bay, UbuWeb, Library
Genesis, Karagarga, Megaupload, FilesTube, and many more
INDEX
---------------------------------------------------------------------
- PREAMBLE // Marie Lechner
---------------------------------------------------------------------
1.HISTORICAL PERSPECTIVE ECHOES OVER TIME
---------------------------------------------------------------------
- Stephen Adams && Drake
- Peter Kennedy && Bill Gates
- Pirate Bus && Google Bus
- Lionel Mapleson && Mike the Mike
- The Pirate King Trial && The Pirate Bay Trial
- Copyright Advertisement && Anti-Piracy Warning
- Statute of Anne && DMCA
---------------------------------------------------------------------
2.INSIDER PERSPECTIVE WAREZ SCENE
---------------------------------------------------------------------
- Warez Release Procedure ANSi: Razor 1911
- Warez Glossary ANSi: Fairlight
- Suppliers Methods ANSi: PWA
- Nuke List ANSi: Antitude Zero
- Supplying Guidelines ANSi: Dust N Bones
- Piracy Sub-Scenes ANSi: Partners in Crime
- Directory Naming ANSi: DVDR Standards
- 1337 5|*34|< ANSi: MOTiV8
---------------------------------------------------------------------
3.INDUSTRY PERSPECTIVE ANTI-PIRACY TECHNOLOGIES
---------------------------------------------------------------------
- Radio Detectors >= 1920
- TV Detectors >= 1950
- Security Holograms >= 1980
- CAP Code >= 1980
- Lenslok >= 1980
- Manual Lookups >= 1980
- Code Wheels >= 1980
- Sony BMG Rootkit >= 2000
- Video Game Modifications >= 2000
- Torrent Poisoning >= 2000
- Digital Rights Management >= 2000
- Bittorent Ip Monitoring >= 2000
---------------------------------------------------------------------
4.
GEOGRAPHIC PERSPECTIVE KNOWLEDGE SOCIETY
---------------------------------------------------------------------
- Pirate Video Clubs & Consoles - Brazil // Pedro Mizukami
- Shanzhai Culture - China // Clment Renaud
- El Paquete Semanal & Marakka 2000 - Cuba // Ernesto Oroza
- Malegaon Cinema - India // Ishita Tiwary
- The Downloaders - Mali // Michal Zumstein
- Music from Cellphones - West Africa // Christopher Kirkley
- Region 4 - Mexico // Jota Izquierdo
- Piracy is the Ideal Scapegoat // Ernesto Van Der Sar
---------------------------------------------------------------------
> TO BE CONTINUED url: thepiratebook.net
---------------------------------------------------------------------
THE PIRATE BOOK
+
A compilation of stories about sharing,
distributing, and experiencing
cultural content outside the boundaries
of local economies, politics, or laws
.,,,,,,,:,
:;A@A@@#@@@#@@M@G;,
5H@@@@M@A@@@r@@3A@@@@@@2s
., 3@i@@@A,iB@M@s@i@@,@@Ai@@
r9@@@, @9,2s@@HAGS@s#MA@S@Hr.@# @@@@;
rA@@@@@@@;@5.. .iM3#@i@@@@@@@;
B@@@@@@@@@Ar; ;;:;; .BS@@HA;h@@@@
r@@@XSrA@& : ;:r&S; :: i#@s@ri@@@,
3@@#A@@3#. ,:.;rAAB##@@r s: B@#s2@@@@:
r@@AS;5@A :A3B2S@H3M#M@@ri@A r@M@M5G@@:
:@H#@HX@9 ,S9@B#Gr22s. ;#G@A;3@ @AA@@@@@
##@5;G#A :&@@H23Sr::A@G hhGBih@9 @@99AA@@
,@#@@@H# rG3@#iX3XSisii3 rsrAG2M@, ,@A@iX#@:
X&@@@@#5 ;rX@@#AGh9MBi;i2.sr:ri;#HiX22 H&2A@@@H
@@@@@@H, r:.Xh2A#G22H#i;i29. 3Si h53i#@ ,@@@@@B#
Ah@@@## :r sX22AM@#@@i&&@@3 &,s@SMs&.@@ @@@@@@@
@@@##A# .S;..G3S2@@@s;r5A@@@#@Ms&5Ai;@r. #A@@@A#,
MA@M#A@ .S;.,B&s#G . @@3hX5H:i# #A#B#A@.
MHMB##@: :ir:.33:X s r. @@MAX#@M@@: .H&AAHBA
;9h3G@@9 .r;;:.. r@ @@r. #@@@#A@Bi#: 3&BAAHiX
. 39@@@@@: ;sri;;;;. .@@5 rMA: M@@@G@HHh2iA. ,@@@@#M#. ..r;.
.S@H@@@@, ,3 S@@@@@#@;;;;:rr;s;: 3@@@@s.:r@@Hr;S33A2rGG A#@@@@AA AS:S@@@iS:.,.
.5&#SA@@@@@@B, iA ;sA3X@&G;:;;Ss;rr,.,,5@@@@@@@;;:ri52GhH@9 iGiSi2i# :#.;@@@9rr,;hA@@2:
.ri;GH@9;@@@@@@Mi G 5,i5&#Bir:rs,,i&r;;... .M@@2222BX2HAM#: i#S2ssr: B :A@r,:..5@@@@@@#A,
,A@s;2s;rAHs.#@5@H;Hi . S95i2sr;2s,,:s5;rS;s5rsM5hM35H2##H@MM@:,s3&2Ss:; :, :S.. :B@@@@@@@@@@:
.i@@@@.;i;.::r. 2@r;@, ;:,;:;H@@@@rrSr2Xs3H9H#@Ah@M&HAB@G@##@Gri;;i5X: . ,H#2ii r@A@@@@@@@@ss:
,@H,#@@2,X#iHi;, ;s; ,:s9,., ..5@@@@@#r 5#2@MA#Xr;...r2XB#B#M. MM@&sr;;,. :i.;r .r,23r, :@25@@@#r,.AM
.S 2r.AA: .H@@#&r ,:5 .3@@@i ,h..@@@@@#S. @3SAX., ,2#A;; s@@@B2r, ;i,r@@@9 :A ,:, ;@AA& .:r s9;;
s rr@ ,@@@@h,;#9#9r @@@@5 s@, ;@#5r,,@r ,r: rH@@@@@G ; As ;@@AA; ss ;@@@@@s; :#,2,,@@@@3 ,@.i,..
2. :h# . X@@@Hi :. ;S,5@@@@5 r: ;:r @@ ;:; 9MhA@@@@@@ . : @. ;@r .;.;@@@@@H; .@,.h.:@@@@; #H :
.@5. @: . .:;i,,, A :G5;2@#; @ r;. .@9H, G5529 rr; ,s ii@#@r @9 , ;:ss ,@r;:. 2i
, i@sr2.,@ ;r.:sr : ; . s; :h& r@;rX, ;5r ,..2,s.5;: .. #2 @ AH.;#
. #@ .. @G rss, ;:B;#;59S@,#,.s.;r 9@Gi9HA@@@ 5X.:2,@ #;iG.A:; , 2& 3G @,
@5 : .@ ;XXrS h: .: rSr2;XSr@,9 , ; r: .@r , hirS;;r.::. :s; ,.:M, #,
s . :,: .93r: :.i5:# Hr &. &r::. :,;2Xr. ,, .
:3XH;G.i :., : ,2A; iAs ,. ..;;;XXM;@rh;,
.r;H39B5A93h:@;&.,. GA. ,rriHS35iHi255:::
, :.;.;,riH2AAA2r..___..&GXs:,,....
PREAMBLE
The Pirate Book by Nicolas Maigret and Maria Roszkowska
is both a visual essay and anthology, written in the wake
of the Jolly Rogers infamous skull and crossbones and compiled
during its journey across the four corners of the world. In this
book, the authors invite us to shift our perspective on piracy
itself. This polyphonic work constitutes an attempt at probing
the ambiguity inherent to piracy and at re-evaluating the issues
related to it. The Pirate Book, moreover, signifies a departure
from the one-sided approach adopted by the cultural industries
which consists in designating the figure of the pirate as public
enemy number 1.
Intellectual property was, in fact, called into existence in order
to ward off those that Cicero, in his time, called the common
enemy of all. At the outset, intellectual propertys purpose
was to protect authorship and promote innovation; however,
it eventually hindered technological progress and encouraged
cultural products, which had hitherto belonged to the public
domain, to be snatched away from it.
The Pirate Book places side by side the Statute of Anne with the
Digital Millennium Copyright Act (DMCA), the American copy-
right law of 1998 that aimed at curbing the new threats posed
by the generalisation of the Internet. The Pirate Book revisits
some of the milestones of this history of piracy, by juxtaposing
and comparing an image from the past with its contemporary
counterpart. Such is the case with the musical score of Stephen
Adams Victorian ballad, The Holy City, that became the most
pirated song of its time towards the end of the 19th century
and is presented opposite the album, Nothing Was the Same, by
the Canadian rapper Drake that became the most pirated album
of the 21st century (it was illegally downloaded more than ten
millions times).
Marie Lechner
1 http://thepiratecinema.com/
2 Adrian Johns, Piracy: The Intellectual Property Wars from
Gutenberg to Gates, Ed. University of Chicago Press, 2009
3 The Internet Dealers of Cuba, Jason Koebler
(http://motherboard.vice.com/read/the-internet-dealers-of-cuba)
4 Culture pirate et les usages du P2P, Vincent Mabillot
(Tracs. Revue de Sciences humaines, Pirater, ENS Editions)
5 Transgressions pirates, Samuel Hayat & Camille Paloques-
Berges (Tracs. Revue de Sciences humaines, Pirater, ENS
Editions) https://www.cairn.info/revue-traces-2014-1-page-7.htm
CHAPTER 1
+
Historical Perspective
Echoes Over Time
,; @QQQ,
,g#RT ,#Q|@QQS@Q
yQQ##QQQ 'T
,@S#QG@SWQM -g
.QQE@QQ^ ,gy@Q` ,
@QR ,@QQQQQQ@Qo \ ,, ]QQ#QQQQQQQg,,
@R ,,#QQQQQS@Q#QQ @ ]Q, |QQQQ@@QQQQS|QQ#Q
,#E` ,SQQQQQQQQGQL?E j '@Q |QSQQQQQQQQQQQQ@QQ#q,
'^T ,"RESQQQQQQ {Q^\@QC ]QSQQQQQQQQQQQQQQQQQ ?QQ
' " " ,@@QQg@Q @QQQ |QSQQQQ#@QQQQQQQQQQQQQQQQC 5QQp
]Qge yQQQG@Q@M "@Q"5QQQQQ@QQQQQQQQQQQQQQQQQQQ ""FQ
,sg, QM @@QQ yQ'@QQQQQQQQQQ@QQ@QQQQQQQQQU S.@Q
,Q s `Wp ?^ "QQ[|QQ '|@ ]R@^]QQQQQQQSQQQ@QQQQQQ@U |Q p
,s"` \g "g ?@QE"" ,m |Q @ | ]QQQQQ@QQSQQQQQ @QQQU |Q ]
,@Q 5M, \q ^ |Q, ,ygA` @ 'Q | @SSQQ@L ]QQQQQ @E^"QU \Q ] Q
,@QQ@Q ^ ,QQQQQ, ,,,,, ,#` R Q | QQQQS^,@QQQQQ@p`T Q |Q @ QQ
,QQ@#T" 5QQQ(QQQQQSQQQQQU ,yS""""""#QQQ | } ]QQD @QQ#QQQQQQ ' L "Q#o.Q QQ
yQSQP^ ,#qH 'RQQQQQQQQ@QQ ' ,-FT"@QQQQQE@Q 'Q 9 !T ,#QQQQQSQQ ?Q @p ]# @Q
,@QQFF ,QR ygE "F@QQ@QQQER ;^ ;gQQ |QQ@SQQQSU "T ' |@Q @ ,Q Q |QQ
yQQQR '@Q ,# y# , 9#E , ' yE^ '@QQQQQQ .@Qy, "Fgg#QygQQQQQ@U @ ,Q @E QQL ]Q
,@QQ@E "QQ@ggS^ ,gSWR .S` \ y#E^ H@QQQQQR" 'F'@QQ y 'y, "@QQQ@QQQ@Qp @ R# Q QQ# @QL
yQQQQQQ 5Q `@Q,Qy@L ,,g@Q, 9#Q ,;"yg "FWS, .ySKEE@Q @QSQQQQ, @QQQQQQQQU ^ ,Q,QQjQQQ yQR {Q
#QQQ@QQQQQg ' ; "@QQ,@QQQQQQQQQQ 'RSQQSQQEL ,, ,eQ,,,'@, @y %QQQQ @QSQQQQ@QO ;QQQQQQQSQ @QR ,QR
R@QQQQQQQQ#Q^RQ '"@QQQQQQQQQQQQQQ, "@# ,QQQQ ,Q , \"WQ "Q,`5QQQ @QQQQQ@# @SQQQQQQQQM \@QG@Q#`
P@QQ@QQQQQQ,'Rg RQQQQQQQQQQQQQS .#QS@QL 9Sg@Q,'RQQ "5 `@Q@SQQL @QU@QQQQQQQQQQQQQL ,O
FSQQQQQ@Q#Q, R ,' ?@QQQ@QQMR ,,@QQQQE^ '""\?@, ?QQ,@Q,#HQ@L 5WKPSE@QQQQQQQQQQSQ
. `F@QQQQQQQQQ "". "@ST |QSSQQL " ]M "F@QQQ '^ 'RQS@QE@Q \
|Q - 'WQQSQQ@QEQQQ ^ ,Q#BQQE ( \o ,NFNs "E@Q "FFR@QQQSQQ, 'Q@@QQQ
]Q @ , '8QQQQQQQQQQ sg ,,QQQQ@QM ygQQ#E @QQQSF^' -ggg ,@R -g ?WQQRQ @QQQQQQ'
|Q Q ,]SQ, 'RSQQQQQQEQQ, YyyM"@@QQ@Q#` @QQSQ@W @QR@Q,y#SWEWW> '"" "EWQ,, "QQQ, "QQQQ @Q##Q^.
|Q @WWQ S `ZQQQQQQQ@QQ ;QQQQQQL jQQQ "R ,QQ##W ' ,,,,,,,,,,,,,-#,, `WQ,|QQ@QQQQQQQ Q#QQS ;
]QU#Q |QQ|eo-Q "@QQQ@QQ@QQQQQgQL .QQ@L ],jQQQQ ,{Q@QQQQQQQQQQQQQQQ,, ?#q @QSQQQQQQQ@Q "QQ@Q
]Q @QQSS#Q, ]QQ,,, `RQQQ@QQ@#@Q#^ ]QQE ]QQQQQQQQQQQQQQQ@EQQ@QQQQQQQQQQQ, "HQQQQ@QQQQQQQQ @QQ^ "
]Q `5Q @R"@QQQ ]Q "@QQQ|@QM ]QQQ @QQQQQQQQQQSQQ@QQQQQQQQQQQQQQQQQQQ#QQ """"TRQQQQSQQ-{@QQ h
]QQggQQQ#QQ ]QQQe ?Q , "RQQL @QL @QQQQQQQQQQQQQ "@QQQQQQQQQQQQQQQQQQQ#Q"QQg#QyQQQQQQQQ "Q
]QQR` #QQQq,@QQ# R ,QQ ,# yQQQQQQQQQQQQQQQQQ "SQQQQQQQQQQQQQQQQQQQQQ@QQQQS@QQQQQQ # !QM |
]QR 5#^ @, RQO ;QQQQQQQQQQQQQQQQQQQSQQ @QQ@QS"@QQQ@QQQ@QQQQQQQQQQQQQQQQQQ' ,Q ]Q
]Q 'Q |jQ ]Q "@M ''@Q ]QQQQQ#QQQQQQQQQQS@QQ, %QQ@Q,`?SQQSQQQQQQQQQQQQQSSQQQ#^ ,R {Q
]Q # @Q@Q ]o-@Q Q;# ;C '@QQQQQQQQQQQQQQQQ@QQ, @QQ@Qy, `RW@QQQQQQ@QQQ@QQWR` @` @@Q
]Q | 9"@ ] QQ {M .Q @QQQQQQQQQQ#QQQQQQ@QQ ]QQ'R@QQgQ '^^""""^ ,@R yQQT
]Q (S@Q \ QQ QQ,g@Q \Q "@QQQQQQQQQQQQSSQQQ, `RQQ, '"~ ,yQR^ ,gQQT"^
@Q Q, ,@QQQ,,, ,( QM |QQQQQQQ %Q,]QQQQQQQQQ`""WWEFT^`` ``` ,,ee#FT` ,Q#RF"
]QD?T `"@ `"EEPRQQ |QQQQQQ@Q, ]Q@QQQQQQQQQQgg,,,yeH# ;QS` ;R gggRW
]Q ,FFF "@QQ -ge,,;QO 5QQQQQQ@QQEQQQQQQQQQQQQQQQQER ]QQ#T '"@L @QU'" ,,g,, gQ9"R |
]QMSR" ?P"5Q#T ,S#, ""5Q `YQQQQQQQQQQQ@QQQQQE""^ jg# ]T @ {'@Q `"Y^ , Q#"R"""F ,!WQ | |Q
]Q @#W , ]^ 9 "Q "g `RQQQQQQQQQ^ ,,QQQQR ,#^\Q M @Q y ,S^ @O\g '8o @Q | @
]Q @Q ,@QQ ]Q QQ ,, '- "@QQQQQQQQQQQQQWWQQQQR @E @Q'p | @Qp @Q 5 `` @ 5Q H \ |Q |
]Q @QR 5QQ^ "F QO ,, ' '\ ]QQ@QMF"^ ,#M" yT ;QQ^; | ]QQQp @p ' . @QQQQQQ \ | Q j
]Q QU |@Q | QQ ""WSQQ,, '@g@E^ ,g##QQ#R" ,#` ,QQR Q L ]QQ@U 5@Q S\pjR""?QQQp ] 'E ]
]Q Q |QQ ] QO @Q,,, ^^R | ]Q@QQQT` ,;#^ ,QR {L ] ]QQQQ,]QU@Q"" , \s-@Q# | ! ] |^
]Q @Qgag,,,#SWeooo-eB QQ `?WQQQQQQ ]Q@Q#R ,,@QQM` ,@M @Q, @Q %R^?ERFWQQQ,' h. ! S^ :
]QQQ@SR !QQQ `RFER 9R"QO yg#@QQ@# @QM ,# ,-g,-y @,,,yQ,,
"""""RFg,\s .s-,,g-gggySKT 'RQ,]QQQ##QQ@Q@Q ,QS5SM .#Q ,Q@#^"`' ' ^^`^"""""^"""
'"^` ," `^"RWSSEEMWRW,@QQ` 5Q(Q *##S##@@#@Q#Q#@QQ#Q#@##S##S##Q###
:e#Sm ,,,, gQQQQ##@@QQ#Qgg,, "WM"^``^"MeSM . ' , s --n- g
s-s ?FFFRESSWERESS#Q@QS#QSm KSogos+n-+<***--HRFFFFFFW-n-WESMF
,,,, |QQ,,,gg,,,,, , ,,,,,,,,, ,,,,,,, ,,,,,,,,,,,,, ,, ,
PUNCH vol. 131, July 4, 1906
ECHOES
OVER TIME
It is the beginning of a new century, and the music industry
is facing a crisis. New technology, new media, and innovative
business practices are challenging the copyright principles
that have underpinned the industry for as long as anyone can
remember. Taking advantage of a revolutionary process that
allows for exact copying, pirates are replicating songs at a tre-
mendous rate. The public sees nothing wrong in doing business
with them. Their publicity, after all, speaks of a mainstream
music industry that is monopolistic and exploitative of artist and
public alike. The pirates, by contrast, are ostentatiously freedom
loving. They call themselves things like the Peoples Music
Publishing Company and sell at prices anyone can afford. They
are, they claim, bringing music to a vast public otherwise entirely
unserved. Many of them are not businesses on the traditional
model at all, but homespun affairs staffed by teenagers and run
out of pubs and even bedrooms. In reaction, the recently booming
dot companies band together to lobby the government for a
radical strengthening of copyright lawone that many see as
threatening to civil liberties and principles of privacy. In the
meantime they take the law into their own hands. They resort to
underhand tactics, not excluding main force, to tackle the pirates.
They are forced to such lengths, they say, because the crisis of
piracy calls the very existence of a music industry into question.
Stephen Adamss The Holy City song, probably the most pirated
musical piece (on printed sheet music) prior to the Internet.
MOST PIRATED MUSIC ARTIST
(EARLY 21ST CENTURY)
Drakes Nothing Was the Same, the 7th best-selling album of 2013
with over 1.34 million copies sold in the US alone was pirated,
at least, an astounding 10 million times (MP3 files). According to
ExtraTorrent, this makes it the most pirated music album after
the arrival of the Internet.
PETER KENNEDY
PHYSICIAN (1730)
Above: Pirate Bus in Regents Park, during the General Strike, 1926
In late 2013, Google private shuttle buses have become a focal point
for social justice protests in San Francisco. Protesters viewed
the buses as symbols of gentrification and displacement in a city
where the rapid growth of the tech sector has driven up housing
prices. Activists also opposed the unpaid use of public bus stops
by private companies, which transit officials said leads to delays
and congestion.
BOOTLEG RECORDINGS
BY LIONEL MAPLESON (19001904)
Mike Millard, nicknamed Mike The Mike was an avid concert taper
in the 1970s and 1980s, recording mostly Led Zeppelin, Pink Floyd,
and The Rolling Stones concerts in California, especially at the
Los Angeles Forum. Starting with a basic mono recorder in 1974,
Millard upgraded to a Nakamichi stereo recorder with AKG Acoustics
microphones for the 1975 Led Zeppelin shows in the area. He often
used a wheelchair to conceal his equipment, pretending to be disabled.
Unlike most 1970s audience bootlegs, Millards recordings are noted
for their great sound quality, and are to this day considered some
of the finest audio bootlegs available.
THE PIRATE KING TRIAL
(1904)
Hans Fredrik Neij, Per Gottfrid Svartholm Warg, Peter Sunde Kolmisoppi
The Pirate Bay / Trial: 2008-2009, Sweden
Le Figaro, April 18-19, 2009, page 26
ADVERTISEMENT FOR COPYRIGHT
(1906)
The Anti-Piracy Warning (APW) Seal has been approved by the U.S.
Attorney General as an official insignia of the FBI and the U.S.
Department of Justice. The purpose of the APW Seal is to help detect
and deter criminal violations of U.S. intellectual property laws
by educating the public about the existence of these laws and the
authority of the FBI to enforce them. Any copyright holder who complies
with the conditions of 41 CFR Section 128-1.5009 can use the Seal.
The FBI, Federal Bureau of Investigation
STATUTE OF ANNE
(1710)
PETER KENNEDY
Johns, A. Piracy, 23.
Kennedy, P. 1739. A Supplement to Kennedys Ophthalmographia.
BILL GATES
https://en.wikipedia.org/wiki/Open_Letter_to_Hobbyists
LIONEL MAPLESON
https://en.wikipedia.org/wiki/Mapleson_Cylinders
ANTI-PIRACY WARNINGS
https://www.fbi.gov/about-us/investigate/white_collar/ipr/download-
the-fbis-anti-piracy-warning-seal
STATUTE OF ANNE
https://en.wikipedia.org/wiki/Statute_of_Anne
+-----------------+
| SUPPLIERS |
+-----------------+
|
|
|
V
+-----------------+
| CRACKERS |
+-----------------+
|
|
|
V
+-----------------+
| PACKERS |
+-----------------+
|
|
|
V
PREING
|
|
|
V
TOP SITES
|
|
|
V
+-----------------+
| COURIERS |
+-----------------+
|
|
|
V
SITES
|
|
|
V
+-----------------+
| SEEDERS |
+-----------------+
|
|
|
V
STREET MERCHANDS
WAREZ GLOSSARY
1. SUPPLIERS
Member of a warez group who obtains a legitimate copy of the content to be
released; methods of obtaining files include copying from producers, hacking
into corporate networks, videotaping movies, and retail purchasing.
2. CRACKERS
Member of a warez group who removes copyright protection from content in
preparation for release to the warez scene and P2P networks. Every application
and game on the market contains some type of copy protection. Despite all
the time and money invested in copy protection techniques, crackers can still
defeat the most elaborate and complex copy protection technology, often hours
before it is placed on a store shelf. It is a mental competition: software
developers create a lock and crackers digitally pick it as fast as possible.
3. PACKERS
When a releases dupe status is cleared and a title is ready to be released,
the product must be packed into scene-compliant volumes. Many groups have
dedicated packers who pack releases night and day. Packers act as living tools
for release coordinators, informing them when a new release needs to be packed
and uploaded. It takes only minutes for an experienced packer to pack a large
release and then upload it to a private group site, ready for the next stage.
4. PREING
The stage in which the release is uploaded to a groups affiliated sites and
released. Group-affiliated sites want a groups release to be uploaded first;
therefore, many sites insist on groups using internal prescripts.
5. TOP SITE
Underground, highly secretive, high-speed FTP servers used by release groups
and couriers for distribution, storage and archiving of warez releases.
Topsites have very high-bandwidth Internet connections, commonly supporting
transfer speeds of hundreds to thousands of megabits per second, enough
to transfer a full Blu-ray in seconds. Topsites also have very high storage
capacity; a total of many terabytes is typical.
6. COURIERS
Member of a warez group who distributes pirated content between top-level warez
servers. They are the worker ants of the scene, carrying releases from site
to site, ensuring that each release is spread from the top-sites down to the
smallest sites.
7. SITES
Scene sites are impressive, secure data warehouses that are used for piracy.
Each release group must be affiliated with several decent sites if they intend
to release anything.
8. SEEDER
A client that has a complete copy of the data of a certain torrent. Once your
BitTorrent client finishes downloading, it will remain open until you click the
finish button. This is known as being a seed or seeding.
SUPPLIERS METHODS
1. PHYSICAL INSIDERS
Someone who works for the company that produces, prints or packages the content
(music albums, movies, software, books, images etc.), copies it, and uploads
from the job site.
4. SOCIAL ENGINEERING
One of the most creative methods used is the fake magazine scam, a mixture
of social engineering and plain old hard work. The suppliers create a semi-
legitimate looking magazine; game publishers usually send press organizations
copies of games a few weeks before the official retail release date, thereby
allowing the magazine to write a review and hopefully increase sales of the
product when it becomes available.
5. DEMO CDS
Commercial license managers are popular with software developers because they
give them the ability to distribute an application while limiting its usability
with a license code or file. A license is the only difference between a retail
product and a demo or evaluation copy. Once the suppliers figure out the
license scheme and have a retail license generated by a group cracker, the
group has a functioning retail product that is ready for release.
6. LEGITIMATE RETAIL
Suppliers use this method to watch product web sites and to find out exact
release dates. The goal is to buy the software first, and then get the copy
cracked and released, all while racing two or three other groups that are
trying to do the same.
NUKE LIST
+-----------------------------------------------------------------------------+
| |
| Nuker | Nukee | Amount | Reason |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxxx | xxxxxx | 1x 4.4M | not.working.5.burn.limited |
| |
| Age: 3h 56m | Dir: Lavavo.CD.Ripper.3.1.9.WinALL.Regged-XMA0D |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxxx | xxxxxx | 1x 4.4M | not.working.5.burn.limited |
| |
| Age: 3h 59m | Dir: Lavavo.CD.Ripper.3.1.9.WinALL.Regged-XMA0D |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxxxxx | xxxx | 1x 6.0M | grp.req |
| |
| Age: 12h 40m| Dir: Alcohol.120.v1.9.5.2722.Multilingual.WinALL.Cracked-D |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxxx | xxxxxx | 1x 24.4M | empty.dir |
| |
| Age: 15h 51m| Dir: INTEL.CPP.COMPILER.v8.1.025.NiTROUSINTEL.CPP.COMPILER |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxxx | xxxxxxx | 2x 14.3M | incomplete |
| |
| Age: 15h 52m| Dir: Charles.River.Media.Mobile.Device.Game.Development.Oc |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxx | xxxxxx | 1x 127.0M | stolen |
| |
| Age: 16h 0m | Dir: Kao.the.Kangaroo.2.Multi-TECHNiC |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxx | xxxx | 1x 1.7M | bad.dir.its.v1.1.1.1 |
| |
| Age: 16h 25m| Dir: Fax.Server.Remote.Submit.v1.2.1.1.WinAll.Cracked-HS |
| |
+-------------|-------------|---------------|---------------------------------|
| |
| xxxxxxx | xxxxxxx | 1x 4.6M | mu.031705 |
| |
| Age: 17h 43m| Dir: ACTUALTESTS.Cisco.642-661.Exam.Q.and.A.03.24.2005.LiB |
| |
+-----------------------------------------------------------------------------+
Read site rules to avoid being nuked :)
+-----------------------------------------------------------------------------+
SUPPLYING GUIDELINES
1. FINAL RELEASE
Each supplied release must be final (no beta, alpha, build, or technology
preview, and the release cannot be different from the retail version).
3. COMPLETE
A release cannot be missing any vital parts needed for installation,
and it must be true to form (e.g., if a release is labeled a CD image,
it must be a complete CD image).
4. NOT FREE
The golden rule of piracy: you have to pirate something copyrighted.
Each release must have a retail value.
5. USEABLE
The release must be useable by any member of the general public. It cannot
require additional hardware and must work the first time after installation.
Games such as Everquest, which require an online account, technically
are not useable by anyone who downloads them, and thus are not pirated.
6. LATEST VERSION
The release must be the latest version available; there is no point in
releasing Photoshop v6 if Photoshop v7 is in the stores.
1. GAMES
Game pirates are under a large amount of stress and pressure. Games are fast
and hard-hitting, and require a tremendous level of dedication. With few games
released each year, the competition is huge. Crackers go days without sleep
because they love the rush of piracy; however, all of the high stress and work
they invest can easily turn into a waste of time if another group releases
the game first.
2. APPLICATIONS
Applications groups may have a release for weeks or even months before they
release it. With so many applications on the market, there is less hurry and
less competition.
3. E-BOOKS
With the growth of portable e-book readers and the growing popularity of
digital media, e-books are fast becoming the preferred method of reading media.
Also, many e-library web sites now exist, where subscribers can quickly pay for
access to any printed book or just a chapter of a book. () Books are possibly
the hardest media to protect from piracy.
4. VIDEOS
The video piracy scene is also different than the other scenes. These pirates
are video buffs that commonly work in projection booths and video distribution
companies. To them it is all about risk, about pulling out their beta-CAM
recorder during the first screening of a highly anticipated movie. It is a
thrill beyond compare.
5. TV
Although TV piracy is not as epic as Hollywood movie piracy, it is growing in
popularity and becoming a full-fledged piracy scene. Groups are becoming very
efficient at releasing high quality, digital TV versions of sitcoms, cartoons,
and other popular late night shows. Suppliers of pirated TV range from
professionals to home users.
6. MUSIC
Music is not protected as strongly as games or applications, and music groups
do not require dedicated crackers to focus on the protection routines. Music
piracy requires less time commitment than other types of piracy, and although
pirating music can be risky, there have been only a few pirates arrested for
releasing music into the piracy scene.
7. PORN
No one seems to care about the theft of pornography. Copy protection methods
are non-existent and the film producers can do nothing to stop them. No one
will even look for the supplier of Teen Scream Lesbians #36.
I dont see any police trying to catch us. No one really cares because its
the pornography world. These days, if a director called the police demanding an
investigation, there would be a demonstration regarding police man-hours being
wasted on pornography.*
8. EVERYTHING ELSE
If it has a price tag, someone will pirate it, and if it has a copyright,
someone will distribute it. This is the nature of piracy. All you have to do
is look at the piles of specialized software being released daily, applications
that only a handful of people know how to use (schematics, royalty-free images,
fonts, etc.).
Matrix.Reloaded.(2003).720p.x264.MULTI.VFF.VO.AC3.5.1.MULTISUBS.FR.EN.[YIFY]
1. GENERAL
1.1. Release size MUST be between 4.33-4.37 GB unless the source is DVD5.
If the release cannot achieve the minimum size allowed, a valid
explanation is required in the NFO, e.g., the source was less than
4.33 GB after removing the full screen cut, etc.
1.2. PAL after NTSC and NTSC after PAL is allowed.
1.3. Different regions do NOT dupe each other.
1.4. Widescreen releases are allowed after Full-screen.
1.5. Full-screen releases are NOT allowed after Widescreen.
1.6. Box sets are recommended to be released as separate single DVDs,
e.g., MOVIE.TITLE.EXTENDED.EDITION.DiSC1.STANDARD.DVDR-GROUP
1.7. Protections, limitations, and warnings MUST be removed. Logo
removal is optional but recommended.
1.8. Trailers and previews are recommended to be removed but are NOT
required to be.
1.9. Releases MUST follow the DVD-Video standard. Releases that do
not follow the standard decrease overall compatibility with
players, and will NOT be tolerated.
1.10. Releases SHOULD include source proof. SCREENERS and BOOTLEGS
are exempt. If proof provided, refer to section 16.
()
13. DIRECTORY NAMING
13.1. The appropriate directory tags MUST be used in accordance with
the standards specified in the sections above.
13.2. ALL releases are to include production year, except for
current year and TV series.
13.3. Directory name MUST include video standard (NTSC or PAL) except
for first release of a title in regards to a retail release.
13.4. Source region number MUST be included in the directory if the
release is duping an existing standard, e.g., R1 NTSC release after
a R3 NTSC release MUST include the R1 tag, etc.
13.5. Acceptable characters are as follows:
ABCDEFGHIJKLMNOPQRSTUVWXYZ
abcdefghijklmnopqrstuvwxyz
0123456789.-_
13.6. COMPLETE tag SHOULD be used for DVD5 and DVD9.
MOVIE.TITLE.COMPLETE.STANDARD.DVDR-GROUP
13.7. Releases are to be named as:
1st release - MOVIE.TITLE.DVDR-GROUP
All others - MOVIE.TITLE.REGION.STANDARD.DVDR-GROUP
13.8. TV-DVDR: Season and Volume tags may be used. If disc/box says
Season, use Season; if it says Volume, use Volume; if it says
Season and Volume, use both.
()
1337 5|*34|<
For the purposes of this text, leet is defined as the corruption or modification
of written text. Therefore its not a new language; it just modifies existing
languages. It is a system whereby certain letters are replaced either by
numbers or symbols which look like the letter being replaced. As you may have
noticed, 1337 uses numbers and symbols to replace letters, but often there is
a re-spelling of word involved too. For example, the in leet speak is teh,
and owned is pwnd or 0wn3d. There are no rules to define how this works,
but it is generally phonetic. A simple form or leet speak is for example: i
pwn u (I own you). A more complicated form of leet speak is for example: j00
4r3 $tup1d (you are stupid). This complicated form is not used much by people
in the scene; more often its used by young gamers or the so-called br33z@h
sluts.
The most common leet speak letter replacement in the scene is I. The
uppercase I letter is practically always replaced by the lowercase i. The
original reason for this was that the uppercase I and the lowercase l were so
similar that it was very hard or not possible to see which one it was. Nowadays
its still being replaced, for the traditional reason and because it looks
cool. Examples: iNTERNAL (releasetag), ADDiCTiON (releasegroup).
pr0n Stands for porn. The origin of this word is that by typing
porn this way, the message/text wouldnt be filtered by
content/language filters.
SOURCES
SUPPLYING GUIDELINES
A NUKE LIST
SUPPLIERS METHODS
PIRACY SUB-SCENES
Paul Craig, Software Piracy Exposed, Syngress, 2005
DIRECTORY NAMING
http://www.sbytes.info/wp/
IMAGES ANSi
https://defacto2.net
CHAPTER 3
+
Industry Perspective
Anti-Piracy Technologies
TV detector van, UK (1963)
ANTI-PIRACY
TECHNOLOGIES
When a California company sets up a spurious Bit-Torrent site
in a bid to snare the unwary downloader, the lay observer
can be forgiven for failing to see at first which is the real pirate.
When a multinational media corporation quietly installs digital-
rights software into its customers computers that may render
them vulnerable to Trojan horse attacks, what has happened
to the customers own property rightsnot to mention privacy?
When a biotechnology company employs officers who turn agents
provocateurs in order to catch unwary farmers in the act of
seed piracy, one may wonder where the authenticity and account-
ability lie. It is not new for problems of privacy, accountability,
autonomy, and responsibilityproblems at the core of traditional
politicsto be enmeshed in those of intellectual property. But
to account for that fact demands a specifically historical kind of
insight.
The French HADOPI law was introduced during 2009, providing what is
known as a graduated response as a means to encourage compliance with
copyright laws.
IP Monitoring
If you use popular file-sharing programs to download films and
music from the Internet, the chances are that your computers
virtual address has been logged, a study has claimed. Computer
scientists at the University of Birmingham monitored what is
perhaps the largest file sharing site, The Pirate Bay, over the last
three years. The team discovered that the most popular files
on the site, often illegal copies of hit TV shows or films, were
monitored by, on average, three secretive parties including
copyright enforcement agencies, security companies and even
government research labs. The monitors are believed to be
logging the IP address of the user potentially identifying where
the file is downloaded to.
Letter from BBC Television Licensing (November 2014)
More letters on http://www.bbctvlicence.com
SOURCES
RADIO DETECTORS
Piracy, Adrian Johns, p. 393.
TV DETECTORS
http://www.telegraph.co.uk/culture/tvandradio/bbc/10340804/Myth-of-
the-TV-detector-van.html
SECURITY HOLOGRAM
https://en.wikipedia.org/wiki/Security_hologram
CAP CODE
https://en.wikipedia.org/wiki/Coded_anti-piracy
LENSLOK
MANUAL LOOKUPS
http://www.gamespy.com/articles/115/1150951p3.html
CODE WHEELS
http://www.vintagecomputing.com/index.php/archives/174
TORRENT POISONING
https://en.wikipedia.org/wiki/Torrent_poisoning
IP MONITORING
http://www.dailymail.co.uk/sciencetech/article-2201611/If-steal-
films-music-copyright-companies-IP-address-hours.html
Political Context
Video became a big thing in Brazil during the 80s. I remember
how hard it was to purchase a VCR video player in Brazil when
I was growing up. It was very expensive. So it took a lot of time
for families to save enough money to purchase a videocassette
player in Brazil, and, for the most part, only families that were
well off could afford it.
Video Clubs/Stores
The video clubs progressively transitioned into the video rental
market. Rental stores began to appear where you could actually
rent movies, so you would not have to contribute new movies
and so on. You could just go there and pay a fee for each of the
movies that you rented. According to an estimate from 1987
(this is an industry estimate, so we can question its accuracy),
about 80% of the archives in Brazilian video stores around 1987
were pirated. There was actually no official market that could
supply the home video market with the number of titles that
it needed.
Legal Distribution
Getting a video tape legally distributed in Brazil involved a
series of bureaucratic steps. Lets suppose that you were a firm
licensed to distribute a movie from Warner Bros. in Brazil.
You would have to get authorization from Concine (Concine
was the government body that supervised the entire film
industry in Brazil), you would have to register with them, you
would have to prove that you have a license to distribute the
video and you would have to acquire a stamp, a small sticker
that would be put on the videotape. The stamp was usually what
people used to distinguish between pirated video and legitimate,
official video. It was printed by the government and attached
to the tapes. The legal tapes would also, of course, have profes-
sionally produced covers and packaging, which was certainly
not the case with pirated videotapes.
If you look at the Brazilian pirate market now, there are varying
degrees of how professionally produced the covers are, but
at that time a sticker was typed on a typewriter with the title of
the movie, maybe with a brief synopsis, and the cover would
probably include the name of the video club or the video rental
store. In terms of aesthetics, it wasnt very well produced.
Pirate VHS tapes, 1982 & 1987, Brazil
These were the main factors that were used to distinguish
between a pirated videotape and an original, licensed one. There
was no big conversation around copyright then; it was mainly
a question of whether the government authorized distribution
of the video on Brazilian territory or whether there was a sticker
on the tape. If there was no sticker, it meant that this was
either a pirated tape or an alternative tape. Alternative was
a euphemism that was used in order to market these tapes; there
wasnt really a stigma attached to the word piracy, but it did,
of course, link people to the idea of illegality.
Crackdown
In 1987 distributors, representatives of big studios, and film
producers started to organize themselves in Brazil. They began
to pressure the government and managed to crack down on
the pirate video market. From 1987 to 1989 there were several
crackdowns on numerous video stores and video clubs. These
were very effective. I remember when growing up that one week
you would have access to the entire range of film production
in the world, and after the crackdown you would be restricted
to legally distributed tapes, which of course, only represented
the major blockbusters. And even so, the market was under-
served, both due to the bureaucratic hindrances involved with
getting the sticker from the government, and the approach of
the distributers themselves, who preferred to serve the market
with the minimum common denominator in terms of content.
So you can imagine what it was like for a 10-year-old boy in the
countryside near So Paulo, going to the video store in order
to rent a movie, and going from a whole universe of productions
to a very small number of major American blockbusters or
major European productions. From one day to the next, it was
as if 80% of the catalogue was down, and with it a lot of content
that you wouldnt be able to find elsewhere, not in theatres, and
not on TV. It was a major drought in terms of access to content
in Brazil. The crackdown on Brazilian video stores could be
likened to the burning the Library of Alexandria or a situation
Official Concine labels, Brazil
where 80% of the content on peer-to-peer file sharing websites
disappeared after a successful enforcement attack from the
major motion picture organizations. It took from 1990 to the
late 90s for the market to actually meet the demand for less
mainstream titles.
Dynavision II by Dynacom, the first Nintendo Entertainment System
clone in Brazil, 1989
CONSOLE CLONES MADE IN BRAZIL
Local Customizations
What is interesting is that there were local customizations of
video games, even with official and licensed games. Tec Toy, for
instance, would produce versions of games with characters
that were popular in Brazil at the time. We had a very popular
series of comic books called Turma da Mnica, Monicas Gang
in English. Tec Toy produced versions of games using characters
from Turma da Mnica, one was called Mnica no Castelo do
Drago (Monica at the Dragons Castle) released in 1991. The
original game was called Wonder Boy in Monster Land; they
just removed Wonder Boy from the cartridge, inserted Monica
and Monica related characters, and commercialized that. Thats
Wonder Boy in Monster Land, video game by Sega, 1987
Mnica no Castelo do Drago, video game clone released by Brazilian
Tec Toy, 1991
an official modification, but of course there were pirated ones
as well. And there were also leaked, pre-released versions
of games. I remember very clearly World of Illusion, a Mickey
Mouse game. The version that we could rent in shops was a
developer version (a pre-release), and it was actually much more
interesting than the later commercialized one. The source of
most of the pirated versions of console games was Paraguay,
and during the NES era, most of the rental market of cartridges
was pirated. It was very hard to find an official game, even
from the USA, Europe, or Japan. Those eventually got into the
market, but in small quantities.
The Free LanceStar, TV24, September 7, 1985, page 13
NOT A MORAL ISSUE
PICTURES
PIRATE VHS
http://redutovhs.blogspot.fr/2013/09/do-alem.html
http://redutovhs.blogspot.fr/2014/07/enxofre-melaco.html#uds-search-
results
http://redutovhs.blogspot.fr/2013/10/the-overthrow.html
CONCINE LABELS
http://redutovhs.blogspot.fr/2013/02/labels-etiquetas-3.html
DYNAVISION II
http://allaboutnes8-bits.blogspot.fr/2012/01/era-dos-clones-nes-
parte-5.html
MORTADELO ESPECIAL
www.flickr.com/photos/90481761@N00/
Bandits Brought Technology
To This World
Shanzhai Culture
(China)
by Clment Renaud
researcher & artist
Government officials look on as pirated publications, including DVDs,
CDs, etc., are placed on the ground before being destroyed during
a campaign against piracy in Taiyuan, Shanxi province on April 20,
2015. (picture Reuters/Jon Woo)
INTRODUCTION
Copycat Learning
In 1980, less than 3% of Shenzhen workers had attended middle
school.4 History books will tell us that good managers from
NASDAQ companies came to China to train those people and
that teachers from the Communist Party helped turn them into
skilled workers. Reality shows something else: when you have
no resources, no proper education system, and no mentors at
your disposal, then you just learn from your surroundings. You
copy, you paste, you reproduce, you modify, you struggleand
you eventually improve.
AAA
The quality of fake products in a market like Chinas varies
tremendously. You can buy a (fake) pair of Ray-Bans for 20 cents
or 60 dollars. The 20 cent one will last a day and break, while
the expensive version will be exactly like the real one, including
the (fake) guarantee card. The classification for counterfeit
goods is pretty casual for Chinese people: A-goods (A) are
the best and are almost indistinguishable from the real ones.
B-goods are lower quality (B), and it goes down until you
reach Z, which are just big jokes disguised as actual products.
Many online retailers will advertise their AAA-goods which
are super-perfect, even better than the original like a pair
of Nike shoes with an extra Adidas logo on them. There is of
course craftsmanship in counterfeiting: it is no easy task to
retro-engineer the minds of 10 Stanford graduates by opening
the latest phone model. Still, the more straightforward way
are the day-night factories: you make shoes for Nike during the
day, then you make Nike shoes for you during the night.
Whiteboxing
In the 90s, the PC market was still in its infancy. Intels founder
Gordon E. Moore and its famous law on computation7 opened
the door for the exponential growth of computing power.
The new gold rush was turning sand into silicon so fast that
computers barely had time to hit the shelves before becoming
outdated. Manufacturers just couldnt follow. In 1995, a
Ghana phone:
- price: about 25 to 38 USD - comes with Facebook
- can hold up to 3 SIM Cards and WhatsApp pre-installed
- built-in FM radio - doubles as a power bank
- LED flashlight to charge small electronics
shipment of PCs lost 1.5% of its value per week.8 The trip from
China to the US took several weeks and this was becoming
intolerable for Intel, who couldnt sell their new Pentium CPU
as fast as they wanted to. They decided to introduce the ATX
platform by providing all technical drawings and specs, so
everyone could start making motherboards for the latest models.
In a matter of months, tons of very small companies in Taiwan
started to produce white-box computers, machines without
brands or even product numbers. They were assembled and
shipped from Taiwan, and the processor was added directly in
the shop upon arrival. After less than 10 years, those no-brand
computers had become the leaders in the global market9 with
more than 30% of overall PCs.
Open-Source Manufacturing
The Shanzhai industry is an exemplary case of market-driven
modern technological innovation: fast, consumer-centric,
incremental product development. Design theory could sure
learn a thing or two from those Chinese guys. Here, a good
design derives from the availability of starter kits to build on,
the capacity to copy and integrate existing features, and the
facility to access production means in an almost trivial manner.
Still, before discussing the Shanzhai model of innovation in
salons, lets not forget some other key elements for success: a
cheap labor force and a strong political framework. The Chinese
Communist Party and its enforcement of broken work regulations
should take credit in todays design and innovation frenzy.
Another interesting feature of Shanzhai industry is that because
they were the pirates secretly working in remote factories, they
built a vast system for cooperation and competition. They shared
plans, news, retro-engineering results and blueprints on instant
messaging groups. Despite not having a promotional label
like open-source and the like, they were actually practitioners
of distributed manufacturing. In many regards, Shenzhen echoes
the dream of a fab city15 where design houses and small
factories collaborate for the public and private good. The con-
tinuation of Shanzhai is open-source manufacturing, and local
MySensors_Humidity_V1, open source hardware, Seeed Studio, China
players like Seeed Studio or Cubietech have understood it
completely. This new generation of Chinese makers is gathering
a large community of tech followers, with all the best practices
from documentation, community care and promotion. You
can freely check the quality of their designs and have nice and
enjoyable tours in their factories in Shenzhen. Far from the grim
world of pirates, they publish methodologies and plans online,
support their users, and will even make your crowd funding
campaign a success if you ask them. They know that products
arent born in the mind of a designer, but in the hands of a
factory worker.
PICTURES
SHANZHAI PHONES
http://jinge.typepad.com
www.ubergizmo.com/2009/11/cigarette-pack-phone/
http://www.designboom.com/technology/the-first-mobile-phone-with-a-
cigarette-lighter/
www.chinawhisper.com/shanzhai-mobile-phones-in-china-top-1/
www.itechnews.net/2009/03/20/cool758-razor-phone-does-shave/
GHANA PHONE
https://medium.com/product-notes/the-mystery-of-the-power-bank-phone-
taking-over-accra-344adbb56919
MAKERSPACE IN SHENZHEN
http://english.gov.cn/premier/photos/2015/01/04/
content_281475034064167.htm
BLOCKBERRY / OBAMA
http://www.cnetfrance.fr/news/barack-obama-fait-de-la-pub-pour-le-
clone-du-blackberry-storm-39702146.htm
SPECIALMAN
http://www.espacebuzz.com/faites-plaisir-a-vos-enfants-ne-leur-
achetez-surtout-pas-ces-27-cadeaux.html
El Paquete Semanal
& Marakka 2000
(Cuba)
by Ernesto Oroza
designer & artist
Copies of design books distributed to the students by the Institute
of Design in Havana (originals and pirate copies)
INTRODUCTION
Anti-Paquete
El Paquete became a big problem in Cuba because the
government is particularly afraid of this mode of content distri-
bution. According to the authorities, not only is it out of control
and promotes contamination by American culture, its artistic/
intellectual level is also quite low, as its full of American
blockbusters and Mexican soap operas. The government claims
that Cubans instead need educational material for young
people, something that is good for the new generation, not films
with sex or violence. Nevertheless, I remember that for many
years every Saturday at 9 p.m. you could watch two or three
pirated American movies on national television, blockbusters like
Die Hard for example. People loved it, and it was common
to say in a conversation that something was like Saturdays
film, meaning that it had sex and violence.
But when the phenomena of El Paquete started, the real
preoccupation of the government wasnt the artistic quality
Ad from a collector & seller of pirated movies and other materials
in Cuba. This ad was distributed in El Paquete 8-8-2015.
of its content, but politics; they didnt want it to be used for
spreading information against the government. This USB
package was spontaneous, unpredictable, and impossible to
control. Of course it quickly became illegal; if you were caught
selling it, you could go to prison or the government could
confiscate your computer. But some other methods to stop
El Paquete were also tested.
One example was the creation of a direct rival: the authorities
made their own Paquete named Maletn or Mochila, which
means a bag or backpack in English. Inside, instead of US
blockbusters, you could find classical movies and music and
educational materials. Actually, people found it very boring and
nobody liked it, so this anti-Paquete system was a total failure.
And of course it was just as pirated as the clandestine one: the
government did not pay for its contents either; it was all stolen.
Another attempt involved the creation of anti-Paquete propa-
ganda: I remember a very dramatic report on the TV news about
computer virus attacks all over the world that showed USB
and El Paquete iconography and claimed that hackers could use
these viruses to steal your information or destroy your computer.
Another faction of the government, mostly intellectuals, are
proposing to contaminate El Paquete with cultural contents,
I guess Godard, Glauber Rocha, and Bergman, but for many this
will be an extension of the indoctrination that Cubans have
endured for more than 50 years through information, education,
and cultural systems. Anyway, before the government pro-
posed it, some cultural producers such as reggaeton singers,
filmmakers, designers and editors, among others, began using
El Paquete for the distribution of their works and activities.
There are even some original materials created specifically for
this distribution channel. There are many local bands which
created video clips especially for El Paquete: national television
does not promote them and YouTube is banned, so they use
El Paquete for distribution and promotion (e.g., La Diosa
El Paquete http://youtube.com/watch?v=3rcZlGiwh-M with
a strong message: If youre not inside the Paquete, you dont
exist!).
Home-made Wi-Fi antenna, Cuba
Web in a Box
Revolico is the Cuban version of Craigslist, a website where
people can directly publish small ads to sell or exchange
different kinds of goods and services: cars, jobs, clothes,
animals, electronics, etc. The problem is that people need to
have access to the Internet to use it, and in Cuba its mostly
impossible. People in Cuba love and need Revolico because its
the only way to exchange materials, information, and goods.
So Revolico went inside El Paquete as a list of small ads.
In a recent interview I conducted with the creators of Revolico,
Hiram (a co-founder) explained that they are now working
on a new offline version of this platform that will be ready soon
to take advantage of the El Paquete distribution system.
SNet
Today, in Cuba more and more people have computers and
other electronic devices such as tablets and smartphones, but
home Internet and Wi-Fi access remains forbidden unless you
have special permission from the Ministry of Communications
(recently the government opened 35 points with public Wi-Fi
around the country with a cost of 2 CUC per hour, and service
is limited). As a consequence, there is a new phenomenon
called SNet (Street Net), a sort of clandestine network. At the
beginning young people started to use telephone cables to
connect computers in the neighborhood in order to play games
in a network. Later, they found a way to connect the computers
using Wi-Fi. Today, this network consists of about 10,000
computers. The police also access the system to monitor the flux
of information. The government warns that if you share
counter-revolutionary material or other forbidden content, it
will break the whole SNet system. Despite this, SNet has become
one of the main avenues for playing collective games and
information distribution.
Besides SNet, there is also a governmental Internet, a very slow
and monitored intranet. Every e-mail that is written in Cuba
is tracked by the political police. There are many systems to
monitor key words. Some government employees or institutions
An advertising for El Maletn, governmental anti-paquete
have a faster and more direct Internet connection, with access
to Yahoo, Hotmail, etc., but its still impossible to access other
big international platforms such as YouTube and Google Maps.
Recently, I collaborated with some SNet administrators to test
the possibilities of the net. We designed a small program and
inserted it to produce a collective poem based in the exquisite
corpse method. We got a poem of 3,000 words in just a week,
meaning that many users of SNet were involved.
Marakka 2012 documentary, by Magdiel Aspillaga & Ernesto Oroza
MARAKKA 2000
Intro
How did you read Papillon (Henri Charrire, France, 1969)?
Well, Papillon was a book you could find in Cuba in the 1970s.
I was never able to get it as I was in prison at that time. But,
my wife was able to get it and she started to make a handwritten
copy of it in notebooks and desk pads, letter by letter. And
that was how we managed to get the book inside the prison
of Quivicn, which was a high security facility. She spent nearly
4 or 5 months hand-writing the book, and thats how I was
able to read Papillon in Cuba.
DVD cover designed by Marakka 2000 / Cuba de Ayer
Starting Marakka 2000
It all began in 1983, a long time ago, as a result of nostalgia.
One day, a man told me, Hey, I have a Cuban film here.
And I said to myself, Wow! A Cuban film in the United States?
It was The Man from Maisinicu. Then, I was overcome with
nostalgia and I wanted to watch the movie. I had been in the
U.S. for three years, and I was feeling a little bit homesick.
Back then, it was not like today when you can easily make
a copy. I had to rent a VCR to make a copy of the video, a very
bad copy by the way. It was so bad that you almost needed
to include signs to recognize actors. But I watched it, and I felt
homesick. Then, I said to myself, If this happened to me that
I dont want to hear anything about Cuba, then everyone can
feel homesick.
So, I started to get Cuban movies, and I sold more films from
Cuba than from any other country. Se permuta was followed by
Los pjaros tirndole a la escopeta (Birds Shooting the Shotgun),
and the rest is history. I continued selling Cuban movies, and
it was tremendous. And it is because of nostalgia that I began
DVD cover designed by Marakka 2000 / Nostalgia Cubana
collecting things. Then, in 1987, I decided to sell my workshop,
and I dedicated myself entirely to the film business. But, the
time came when I reached the conclusion that it was better to
sell only because today, once you rent something, they can make
10,000 copies just like I make them, and then its not a good
business for me.
Legality
Legally, I can have all these archives, and I can make as many
copies as I want. I mean, theres something called public domain.
The movies are not copyrighted in their entirety; the movies
that were shot in Cuba 40 or 50 years are not copyrighted here
in the United States.
Theres the case of many American films that are in the public
domain, but they have, for example, the lion of the Metro
Goldwyn Mayer studios. So, perhaps the movie is not registered,
but the lion is. In that case, you eliminate the lion and you
can use the movie.
You make a film in the United States, and you dont register it.
However, the Copyright Office automatically gives you the
copyright because you made it. But, if I make a copy of it, you
cant do anything against me because you have not registered it.
For you to be able to sue me, you have to register it first, and
then, after that date, I dont make any more copies.
There are things that people dont copy for ethical reasons.
But, in general, people copy everything. Marakka is not the
only one who makes copies. There are 200 Marakkas in Miami.
And, as the saying goes, the law is made to be broken. First,
they invented the Macrovision copy protection system, but soon
others came up with an anti-Macrovision machine. And the
same goes for the DVDs. Everything can be pirated.
Covers
I make most of the covers. There are designs, photos that I take
from the original pictures. Most of them are in English,
so I change them to Spanish. I do it myself or someone working
with me does it. Its very easy to make a cover. I have made
thousands and, on other occasions, I can also take a picture
directly from the film and I use it as a cover.
DVD cover designed by Marakka 2000 / La Habana de los Anos 50s
Nostalgia Series
There are three volumes. The first one is from the old Cuban
newscasts. Its the only remaining color film material of Cuban
panoramic views of the 1930s, 1940s, and 1950s, all before
1959. And the rest I got it from people who have traveled to
Cuba, of movies that include parts of different landscapes. And
then you get a piece from here and a piece from there, you
edit it, and you make it like that, splicing them.
The first one was made during the time of the video cassette
and the others, many years later, as a compilation. Cubans
of all ages are the ones who buy this. You go to a fair that is held
once every year, the Cuba Nostalgia convention, and there you
can see very old people, even 80-year-olds, and very young ones
too. Some of them go because they are overcome with nostalgia
for what they didnt know and some others because they feel
homesick. So, people of all ages buy these materials until the
present day.
First, I have the idea of what I want to do and then I look for
the material. I might be editing already and I remember that
there is an excerpt in a film that could be useful and then
I include it or change it. I know exactly which movie has what
I need. For instance, you ask me for a man killing a lion. I have
17,000 films. I have thousands of the jungle, of Tarzan; there
has to be a man killing a lion in one of them.
DVD cover designed by Marakka 2000 / Cuba: Un Poco de Historia
Sometimes there are movies with their beginnings missing,
so, I include it. For example, if they were made by the Cuban
Institute of Cinematographic Art and Industry (ICAIC),
I add a screen reading The Cuban Film Institute and I add
some music as well, so that they have a decent beginning.
And I do the same with movies from anywhere in the world,
with westerns, anything. And some others lack their final
credits, and I add a sign reading The End and some music,
something like that.
PICTURES
https://www.cubanet.org/actualidad-destacados/las-relaciones-
diplomaticas-y-el-fin-del-paquete/
EL MALETN
http://www.14ymedio.com/reportajes/Mochila-vs-paquete-guerra-
asimilacion_0_1649235066.html
The First Wave of Media Piracy
Malegaon Cinema Industry
(India, 1980s2000s)
by Ishita Tiwary
researcher
Mithun Chakraborty in National Network advertisement
THE FIRST WAVE OF MEDIA PIRACY
Pirate Equipement
Video piracy was not limited to cassettes but was extended to
equipment as well. The duties levied on video technology were
around 300% in the country, which made equipment difficult to
buy for the common man.10 This led to the emergence of black
Screen, May 17, 1985
markets and marketeers who traded in smuggled electronic
goods. For instance, during my interviews with marriage video-
graphers, almost all of them admitted to buying tapes from the
black market. These were used tapes from Germany and the U.K.
which had some show recordings. The wedding videographers
used these tapes to film the marriage videos.11 Important to note
is that these wedding videographers were middle class entrepre-
neurs and would not have been able to afford to buy the video
equipment from the white market.
Economy/Morality
Thus, the effect of piracy can be gauged through two dominant
narrativeseconomic and moral. Economically, the narrative
was that the industry was bleeding financially while pirates were
making huge profits. Despite the video boom in the country,
the trend was of falling exports of Indian feature films (celluloid
as well as pre-recorded video cassettes). Moreover, only the
big budgeted multi starrer feature film was simultaneously
released across all territories in the country. Medium or small
budget films did not release across all territories at once. This
led to losses for exhibitors as these films would circulate in the
country as pirated copies and thus cut their revenues.12 As one
exhibitor stated, Video is eating into our profits. For big films,
video acts as a trailer. If people like the film, then they come
and see it in the theatres. In such cases video is desirable. But
for bad films, video has ruined all the chances for it being
an average grosser.13
Piracys impact was not debilitating as the industry and the press
would have wanted the public to believe. Scouring through
readers letters, one notices how readers express that its because
of piracy that they are now able to access international and
parallel cinema which would ordinarily never get a release in
smaller towns and cities.17 Moreover, they alertly pointed out
the infrastructural breakdown of cinematic practices that led to
the rise of piracy. They noted that video could not replicate
the experience of watching a 70mm film. The movie theatre has
a social atmosphere where people meet their friends and avail
facilities such as air conditioning, the snack bar, as well as
superior projection and sound technology. This visual pleasure
could not be experienced through a VCR. What was leading
to the rise of video piracy was the exorbitant ticket price,
inadequate number of screening venues for feature films, and
big budgeted multi starrer films which were poor in content
and hence flopped at the box office.18
Supermen of Malegaon, the documentary, 2008
MALEGAON CINEMA INDUSTRY
Context
The post-economic liberalization period in India witnessed
the proliferation of non-legal media practices such as the rise
of local cable television and film, and music piracy opening up
contested networks of production, circulation, and consumption.
Access to new technologies has moved film and music into
informal markets. The local circuits of digitally based economies
have opened up newer industrial spaces. As Ravi Vasudevan
(2010) observes, there is a growing production of digital films
produced in Mumbai, Manipur, Punjab, and Uttar Pradesh.
These circuits are probably not entirely distinct from that of the
larger film industry. In some instances, actors and technicians
are caught between the local set up as well as the circuits
operating in Bombay. But these currents have a distinctive
engagement with their specific markets and audiences, and point
to a complex entanglement of cinema and cheap digital forms.19
One such circuit is Malegaon. Malegaon, situated roughly
296 kilometres from Mumbai, is a nondescript place with a
largely poor Muslim majority population and a power loom
weaving industry in crisis. It has made headlines for the post
1993 Babri Masjid riots and has also been much discussed
for the 2006 bomb blasts.20
Origins
But how did this film making practice emerge in this town?
How exactly can we trace its origins? Irfan Iliyas, an actor, and
Akram Khan, actor, director, editor, cinematographer, and
dubbing artist, point to the local practice of stage plays. Every
week a group of interested locals would come together and
write an original dramatic script that would address local issues.
A dose of comedy was also essential in the formal schema of
these plays. This foreshadowed the formal devices articulated
in the films of Malegaon. On the other hand, Sheikh Nasir, who
directed the first ever film of Maliwood, hailed from a family
that owned one of 14 video parlours that existed in Malegaon.
His friends helped him in the marriage video business, where
they used cheap video cameras (PD 170). This also gave them
the experience of wielding a camera. One night all of them
where sitting together and bouncing off ideas and then decided
to make Sholay as it was an iconic Hindi film. They gathered
the towns Amitabh Bachchan, Dharmendra, Amjad Khan and
Supermen of Malegaon, the documentary, 2008
Sanjeev Kumar lookalikes to act in the film. Commenting on the
choice of using comedy/parody for the film, Sheikh Nasir said,
I realized that people still loved Charlie Chaplin even though
its 50 years old. But no one likes action or horror films from
that period. Comedy from back then is still a hit. A comedy lasts
forever its eternal. Thats why I decided to make Sholay a
comedy film.24
PICTURES
ELEPHANT
http://www.rediff.com/business/slide-show/slide-show-1-nehru-place-
among-worlds-top-notorious-it-markets/20121214.htm
The Downloaders
(Mali)
by Michal Zumstein
photographer
Pictures: Michal Zumstein/Agence VU
Mali, Bamako, 22 May 2015, close to the city center on Fankl Diarra
Street, shops providing digital file exchange have multiplied. A
music track or a music video costs 50 CFA francs (0.08 US$), a movie
100 CFA francs (0.16 US$). Customers provide their own USB flash
drive or mobile phone, and illegally download hundreds of files.
THE DOWNLOADERS
African-style iTunes
Mali is a country of musicians with a long-standing tradition
of griots and of incorporating influences from other cultures,
especially as regards musicians from outside of its borders. The
local music culture is well-established and very popular with
Malians. However, some of the people I met, young girls in
particular, told me that they were on the lookout for Cline Dion
songs. If a new album, single, or performance recorded on
Canadian television were to become available, they would set
their sights on purchasing it from the downloaders. The down-
loader system is to some extent an ersatz for an almost non-
existent Internet. Downloaders themselves can access a proper
Internet connection and, as such, make available content from
Mali and elsewhere to those who do not benefit from such
access. This arrangement could be considered an African-style
iTunes. It conveys the idea of sharing, with the main difference
being that the connection speed is nowhere near as fast as
in Europe nor is it available in the comfort of ones own home.
This is a system where files are collected offline in the street
and loaded directly onto SD memory cards or USB sticks. The
pricing differs greatly from elsewhere as basically everything is
pirated and, consequently, resold at heavily discounted prices
at less than one centime per track on average.
Pictures: Jan Bogaerts & Seydou Tangara
This phenomenon primarily concerns music, but impressive lists
of American and French films as well as the latest commercial
releases alongside minor software for computers and phones
are also on offer. On occasion, clients seek advice on the latest
offerings available from their downloaders. Whereas Apple en-
sures that certain features are automatically proposed to iTunes
users, the sellers and their customers know each others tastes,
and the downloaders thus update their clients accordingly with
the latest content available. As such, they act as middlemen,
bringing to their customers attention any novelties relevant to
their needs. In doing so, the downloaders endeavour to tailor-
make their musical selections according to their customers in
order to sell the tracks they have on offer.
Urban Presence
The downloaders stands actually take the form of small desks
on which they set up their PCs and connection kits, complete
with the full range of plugs and cables for all the models of
phone on the market at that time. It is not uncommon for the
stands to be equipped with large speakers blaring ear-splittingly
loud music. Sometimes the downloader desks vie against one
another in a battle of decibels, before the calm eventually
returns. Fankl Diarra Street is home to around 15 down-
loaders who draw in customers, alongside the likes of repairers,
telephone vendors or those offering the service of unlocking
European phones. This is indeed the local digital market.
Picture: Seydou Tangara
BIOGRAPHY
PICTURES
Introduction
It all started when I was traveling and working in West Africa.
My project was to collect and document local music with my
field recorder. One day while riding on a bus I noticed that I was
listening to three different songs playing on three different
phones, and this went on for the entire ten-hour bus ride. I made
some field recordings of it, and I think it was my first docu-
mentation of this type of practice. It got me thinking that I could
start recording music from peoples cellphones. So I started
talking to people about their phones. After that, I remember
another moment that stood out. I met some people showing me
their new phones with all these different recordings that they
had made on them, and it was sort of wild when I realized I had
access to so much documentation. One guy was a Touareg*,
and he had his own cellphone that could do basically all that
my field recorder does. This gave me the idea that maybe I
could start collecting and documenting data from cell phones.
Social Function
Cellphone data sharing is an element of social life in Western
Africa. I think that theres a relatively slower pace of life here:
one of the biggest places where I saw a lot of exchanges happen-
ing was while sitting around drinking tea. Drinking tea is a
huge part of social life in West Africa, and it takes a while. At
some point, when people are sitting silently and just passing
time together, they start playing around with their phones and
playing a song or passing the phone around and sharing pictures.
Theyd say, Hey, let me see your phone, and then they would
flick through the photos or look through songs. Everyone is just
showing off their collections of whatever. This is not really done
in the Occident, where it mainly happens through social media.
How It Works
In Africa its okay to play music in the public space. You can
walk down the street while playing a song on your phone. People
dont get told to turn off their phones; its a loud and noisy
environment. And when someone is walking by playing a song,
you can also stop that person and ask for that song. So, in
this environment of constant music being played, youre also
being advertised music all the time. You hear it and you can just
take it, whenever you want, just by asking someone. Ive done
it plenty of times with total strangers. The sharing is primarily
done through Bluetooth, where you pair the devices and you
send media from one phone to another.
Downloaders
The individual files are shared from person to person with
Bluetooth. The other form of transfer is made with MP3 down-
loaders (people, not software), cellphone vendors who also
sell bulk MP3s. So if you get a new cellphone or a new memory
card and you want to load it up with music, you wouldnt go to
your friends and transfer file by file. It would take a lot of time.
Instead, you just go to someone who can fill up entire gigabytes
from their computer. Theres no real MP3 market. People just
understand that wherever theres a cellphone being sold, there
are MP3s. All these places are interlinked. It revolved around
cellphones vendors having computers and being able to unlock
phones. They also started to collect music, so every time some-
body would bring a phone in, theyd copy all the data off the
memory card before they had to reformat it. So they started this
massive collection, and then they understood that well, I can
also sell these songs. You can just go into a shop, ask for hip-hop
or whatever and buy it; they sell them as bulk of MP3s. A lot of
cellphone vendors started hooking up speakers to their comput-
ers and just playing music constantly, so everyone knows that
thats where you go to buy music.
Local Characteristics
The downloading happens pretty much everywhere Ive been,
in Senegal, Mali, Nigeria In Niger theyve actually cracked
down on piracy, and prevented music vendors selling Nigerian
music, but they can sell music from anywhere else, such as
Western music for example. With regards to the music and whats
available, everything is, but of course theres going to be more
specific music depending on the country or ethnicity. In Agadez
there are a lot more Touaregs and house music; in Bamako,
much more Bambara; and in Mauritania, a lot more Hassania
music. So it does depend on where you are. If you want to be
really specific, it depends on each region rather than countries
because culture is much more related to regional ethnicities.
BIOGRAPHY
PICTURES
Introduction
Mexico is a big country, close to the US and Central America,
with limited access to the Internet and a large informal
economy. For the upper classes a connection to the Internet,
to fashion, to what we call the first world is easy. But for most
of the population, piracy is a necessity; it means access to
culture, development, and education, but most of all its about
the economy, a way of living, culture, and a way of consuming
modernity. Anthropologist Ravi Sundaram speaks of a pirate
modernity, a way for popular classes to enter modernity.
Mafias and narcos have never been involved in it, except the
last few years. And they are considered the real problem in
Mexico, not copyright infringement. We are in a post-colonial
situation, so we have to copy. It is very important to understand
piracy from the South: its not peer-to-peer; its not sharing;
its the piracy of necessity.
Street Markets
One of the particularities in Mexico are the open street markets
where you can find everything you need or youre looking for.
The main place for markets and piracy distribution in Mexico
City is a central neighborhood called Tepito, but you can also
find markets around most transport hubs, like any connection
between a subway station and a bus stop. In such places its
very easy to find all kinds of pirated goods, like the last
Hollywood blockbuster, for example.
Sonideros not only play music, but also make live dedication
messages like Hey, hello to my mother and my brother living
in Texas that are also recorded on the CD. This community
spirit and close to the crowd mentality is very important for
them. Its not only music. Sometimes you go there and you cant
even listen to the music because they are sending greetings
all the time!
New Originals
Some people buy those CDs to sell them again on the street
music is always in movement. Others, like Discos Benjy
Studio, for example, come to three or four Sonideros perfor-
mances every weekend, record them live with a camera,
edit them, and a few days later a new video is out on the street
markets. Then you can see your friends and yourself on
the video with the dedication messagesits a souvenir and
a testimony that you were there!
PICTURES
Market Mystery
If digital piracy were such a problem, one would expect that it
would mostly hurt digital sales, but these are booming instead.
Many people dont even own a CD-player anymore, yet the music
industry sees digital piracy as the main reason for the decline
in sales. Thats odd because digital piracy would be most likely
to cannibalize digital sales.
On the other hand, when American Sniper broke nearly all box
office records in the U.S. in early 2015, piracy wasnt mentioned
at all. This was despite the fact that a high quality copy of the
WIRED Magazine (November 2012) WANTED: Mega-Hacker Kim Dotcom
movie was available on pirate sites before its theatrical release.
In other words, piracy is just a convenient scapegoat used
selectively to cover up failures that have very little to do with
illegal streams or downloads. The overall pattern is that piracy
is brought into the discussion as one of the main reasons for
disappointing results. But if records are broken, piracy is not
mentioned at all.
PICTURES
http://thepiratebook.net
The Pirate Book was released in the framework of Masters & Servers
www.mastersandservers.org
This project has been funded with support from the European
Commission. This publication reflects the views of the author only,
and the Commission cannot be held responsible for any use which
may be made of the information contained therein.
2015
All texts are copyleft; images are subject to their original licenses
PUBLISHED BY AKSIOMA.ORG