ISPs Asked To Block Pirate Sites

virgin_media_pirate_bay_block-611x420.jpg

UK Internet service providers have been asked to block access to dozens of URLs that are suspected of linking to pirated content.

Content providers regularly update the lists of sites they want blocked and the latest one includes popular file-sharing index Demonoid. The list was started in 2012 when ISPs were forced to block access to the Pirate Bay.

At least 23 new URLs are on the latest list being sent to the main UK ISPs.

Content providers must apply for a court order to block individual sites such as Pirate Bay but, after that, they can add URLs that link to that particular site without any formal order. The sites they choose link to pirated software including music, films, TV shows and e-books.

Content providers say that they carefully target sites whose sole purpose is to make money from other people's content. In response to the latest requests, BT told the BBC: "BT will only block access to websites engaged in copyright or trademark infringement when ordered by a court to do so. The list of websites that BT has been ordered to block access to can be found here."

The list includes content from the Football Association, the Motion Picture Association of America and even some watchmakers - such as Cartier and Montblanc - who have requested that counterfeit sites be shut down.

But by far the largest number of requests comes from members of the BPI, which represents UK music labels. "The recent expansions show that copyright holders remain concerned about people circumventing blockades, which is a common practice among users," said Ernesto Van der Sar, editor of technology news website TorrentFreak. "New unblocking opportunities continue to appear so this is the only way to ensure that the efficacy of existing court orders isn't further diminished. It's a never-ending game of whack-a-mole." How effective such blocks are remains open to debate.

A study conducted in May, by US universities Carnegie Mellon and Wellesley College, found that blocking the Pirate Bay had little impact on the rise in legal channels - instead people just turned to other piracy sites, Pirate Bay mirror sites or virtual private networks that allowed them to circumvent the block. But, on the other hand, researchers found that bulk blocking, where multiple sites are shut down, was much more effective. 

Following such blocks in 2013, use of legitimate sites such as Netflix rose by around 12%, they found.

BBC:

« Cyber London for Europe’s Brightest Cyber Security Start-ups and Entrepreneurs
Cyber Attack Recovery Times Cause Big Concerns »

CyberSecurity Jobsite
Perimeter 81

Directory of Suppliers

The PC Support Group

The PC Support Group

A partnership with The PC Support Group delivers improved productivity, reduced costs and protects your business through exceptional IT, telecoms and cybersecurity services.

Resecurity, Inc.

Resecurity, Inc.

Resecurity is a cybersecurity company that delivers a unified platform for endpoint protection, risk management, and cyber threat intelligence.

Jooble

Jooble

Jooble is a job search aggregator operating in 71 countries worldwide. We simplify the job search process by displaying active job ads from major job boards and career sites across the internet.

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

ON-DEMAND WEBINAR: What Is A Next-Generation Firewall (and why does it matter)?

Watch this webinar to hear security experts from Amazon Web Services (AWS) and SANS break down the myths and realities of what an NGFW is, how to use one, and what it can do for your security posture.

ManageEngine

ManageEngine

As the IT management division of Zoho Corporation, ManageEngine prioritizes flexible solutions that work for all businesses, regardless of size or budget.

Global Knowledge Training

Global Knowledge Training

Global Knowledge is a worldwide leader in IT and business training, featuring Cisco, Microsoft, VMware, IBM, security, cloud computing, and project management.

Cyber Defense Media Group (CDMG)

Cyber Defense Media Group (CDMG)

CDMG is the leading global media group for all things cyber defense.

EfficientIP

EfficientIP

EfficientIP helps organizations drive business efficiency through agile, secure and reliable network infrastructures.

SolarWinds

SolarWinds

SolarWinds as a worldwide leader in solutions for network and IT service management, application performance, and managed services.

Performanta

Performanta

Performanta offer a consultative approach to people, process and technology, focusing on security projects in line with adversarial, accidental and environmental business risk.

CIRT.GY

CIRT.GY

CIRT-GY is the national Computer Incident Response Team for Guyana.

Deep Instinct

Deep Instinct

Deep Instinct provides comprehensive defense that is designed to protect against the most evasive unknown malware in real-time, across an organization’s endpoints, servers, and mobile devices.

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

Department of Justice - Computer Crime and Intellectual Property Section (CCIPS)

The Computer Crime and Intellectual Property Section (CCIPS) is responsible for implementing the Department's national strategies in combating computer and intellectual property crimes worldwide.

VectorUSA

VectorUSA

VectorUSA is a premier technology solution provider. We design, build and maintain cybersecurity, data center, wireless and managed solutions – transforming business needs into technology solutions.

Immuta

Immuta

Immuta empowers data engineering and operations teams to automate data governance, security, access control & privacy protection.

Ballistic Ventures

Ballistic Ventures

Ballistic Ventures is a new kind of venture capital firm, built by and for cybersecurity entrepreneurs and investors.

FPG Technologies & Solutions

FPG Technologies & Solutions

FPG Technology is a technology solutions provider and systems integrator, specializing in delivering IT Consulting, IT Security, Cloud, Mobility, Infrastructure solutions and services.

CommandK

CommandK

CommandK provides companies with infrastructure to protect their sensitive data. Built-in solutions to prevent data-leaks and simplify governance.

Pixee

Pixee

Pixee fixes vulnerabilities, hardens code, squashes bugs, and gives engineers more time to focus on the work that counts.

CardinalOps

CardinalOps

The CardinalOps platform continuously assesses your detection posture and eliminates coverage gaps in your existing detection stack so you can easily implement a threat-informed defense.

SoConnect

SoConnect

SoConnect provides safe, secured, and taken care of IT, with infrastructure built around you and your business.