{"id":25,"date":"2008-06-30T10:13:22","date_gmt":"2008-06-30T08:13:22","guid":{"rendered":"http:\/\/www.ofcourseimright.com\/?p=25"},"modified":"2008-06-30T10:13:22","modified_gmt":"2008-06-30T08:13:22","slug":"time-to-takedown-successes-and-failures","status":"publish","type":"post","link":"https:\/\/ofcourseimright.com\/?p=25","title":{"rendered":"Time to Takedown:  Successes and Failures"},"content":{"rendered":"<p><strong><img loading=\"lazy\" decoding=\"async\" class=\"alignright alignnone size-medium wp-image-26\" style=\"float: right; margin-left: 5px; margin-right: 5px;\" title=\"cybercrime\" src=\"http:\/\/www.ofcourseimright.com\/blog\/wp-content\/uploads\/2008\/06\/cybercrime.jpg\" alt=\"\" width=\"138\" height=\"189\" \/>Takedown<\/strong> is a term used by Internet service providers and law enforcement officials that means the involuntary removal of a computer from the Internet.\u00a0 For instance, if a computer has been compromised and is attacking other computers, a takedown is seemingly appropriate.\u00a0 Tyler Moore and Richard Clayton have done some <a href=\"http:\/\/weis2008.econinfosec.org\/papers\/MooreImpact.pdf\">analysis<\/a> on how long it takes to get a site off the net when it is doing something anti-social.\u00a0 They look at about six different circumstances: phishing, defamation, child pornography, copyright violation, spam and bot sites, and generally fraudulent web sites.<\/p>\n<p>Not surprisingly, firms such as banks that actively defend their brand are able to expunge hosts serving bogus content the fastest, and service providers are the most cooperative (the numbers cross jurisdictional boundaries).\u00a0 Sites harboring material that exploit of children takes 10-100 times longer than banks.\u00a0 That&#8217;s an enormous difference.\u00a0 There are several likely reasons for this difference.\u00a0 First, banks are acting in their clear best interest and do not mind shouting at whoever they need to shout at to get rid of material.\u00a0 They&#8217;ve also likely developed strong relationships with service providers to speed the process.<\/p>\n<p>The data on child protection is somewhat skewed by a single source, and that source had substantial jurisdictional issues, in as much as they did not feel empowered to deal directly with certain governments and service providers outside the UK, and in particular in the United States.\u00a0 Worse, images that were removed had a tendency to re-appear on the very same web sites, indicating that either the site was re-compromised or it was poorly managed or both.<\/p>\n<p>The data points to a clear need for stronger coordination by service providers throughout the world to protect children.\u00a0 The fact that banks are able to be more successful in removing content that offends them demonstrates that it is possible when self-interest is a factor.<\/p>\n<p>In the area of copyright violation, the RIAA has had success in removing sites that are clearly violating copyrights.\u00a0 By injecting themselves into P2P networks the RIAA has been able to determine many sources of copyright violation.\u00a0 The paper does not have a data source to analyze takedown periods.<\/p>\n","protected":false},"excerpt":{"rendered":"<p>Takedown is a term used by Internet service providers and law enforcement officials that means the involuntary removal of a computer from the Internet.\u00a0 For instance, if a computer has been compromised and is attacking other computers, a takedown is seemingly appropriate.\u00a0 Tyler Moore and Richard Clayton have done some analysis on how long it &hellip; <a href=\"https:\/\/ofcourseimright.com\/?p=25\" class=\"more-link\">Continue reading<span class=\"screen-reader-text\"> &#8220;Time to Takedown:  Successes and Failures&#8221;<\/span><\/a><\/p>\n","protected":false},"author":3,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"footnotes":""},"categories":[30,4,9],"tags":[34,33,32,35,8,36],"class_list":["post-25","post","type-post","status-publish","format-standard","hentry","category-humanity","category-politics","category-security","tag-banks","tag-children","tag-cybercrime","tag-fraud","tag-phishing","tag-research"],"_links":{"self":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/posts\/25","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=25"}],"version-history":[{"count":0,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=\/wp\/v2\/posts\/25\/revisions"}],"wp:attachment":[{"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=25"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=25"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ofcourseimright.com\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=25"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}