FACT Confirms Premier League Anti-Piracy Action Against IPTV Suppliers

The Federation Against Copyright Theft has confirmed that last month it helped to serve cease-and-desist notices to individuals at 16 premises in the UK connected to the supply of illegal sports streaming services. The action was taken in collaboration with the Premier League and law enforcement agencies.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

Last month, the North West Regional Organised Crime Unit (NWROCU) said it had targeted people involved in the supply of ‘pirate’ IPTV subscriptions and the sale of modified set-top boxes.

Its ‘disruption team’ reported working with GAIN (Government Agency Intelligence Network) and the Federation Against Copyright Theft, targeting people in Wrexham and Blackburn. It now transpires that a broader operation took place.

This morning, FACT revealed that following a collaboration with the Premier League, aimed at disrupting the availability of illegal sports streams ahead of the new 2019/2020 football season, it had teamed up with law enforcement agencies to serve cease-and-desist notices.

FACT’s Eddy Leviten, who has just returned to the anti-piracy outfit following a period at the Alliance for Intellectual Property as its Director-General, informs TorrentFreak that actions were “taken across the country”.

In total, 16 premises were targeted in the operation, with cease-and-desist notices served on individuals suspected of supplying illegal sports streams.

Leviten declined to be more precise on the exact nature of the targets at this stage, but confirmed that “those involved were all engaged at a level sufficient to attract our interest.”

However, FACT does note that those targeted were all “promoting unauthorized access to premium television content” which combined with NWROCU’s earlier comments about IPTV could be compatible with lower-level IPTV subscription re-sellers.

These are individuals who operate no service of their own but buy ‘credits’ from bigger players in order to offer packages to the public. NWROCU previously mentioned “cracked online television boxes” too, which are potentially Android-style devices configured for piracy. Again, no further details are currently available.

Nevertheless, the involvement of the Regional Organised Crime Unit (ROCU) Disruption Teams may raise alarm bells with those operating in a similar niche. FACT, in conjunction with its Premier League partner, hopes that the cease-and-desist notices will stop the activity in hand while “deterring others from getting involved.”

Kieron Sharp, FACT Chief Executive says that last month’s activity is just one of the tactics being deployed against people committing offenses that affect both rightsholders and broadcasters.

“We have a program of continuous activity targeting different elements of the global piracy landscape, with consideration given to the scale of the offending so that the most effective and proportionate response is deployed,” Sharp says.

“The message is clear. If you are involved in any way in providing illegal streaming services, on any scale, you are not invisible or immune from action from FACT, rights owners and law enforcement.”

National GAIN Coordinator Lesley Donovan adds that the serving of cease-and-desist notices is intended to send a message to those “trying to make a quick buck” out of illegal streaming.

“Their actions are feeding a wider illicit industry which not only denies the economy of millions both in copyright theft and undeclared income but poses a direct risk to our communities due to their lack of parental controls and fire safety,” Donovan says.

“This type of activity is also often a cog in a larger criminal machine, often ultimately funding drugs, weapons and people trafficking.”

The claims of higher-tier offending such as those detailed by Donovan are often cited in connection with all forms of piracy. However, it is extremely rare (perhaps unheard of) for those claims to be backed up with publicly-available evidence. There have been claims in the media that paramilitary groups are involved in some way in Ireland, but no evidence beyond that.

Just recently, TorrentFreak spoke with one IPTV provider who contested the notion that most players in the market are high-level criminals involved in anything other than the supply of unlicensed streams. Since the matter has now been raised again, we’ll reestablish contact to see if they are prepared to respond to the allegations.

Source: TF, for the latest info on copyright, file-sharing, torrent sites and more. We also have VPN reviews, discounts, offers and coupons.

EUV-Halbleiterfertigung: Wie Chips aus Plasma-Fladen entstehen

Weder ist das Nanometer-Rennen vorbei noch Moore’s Law tot: Mit extrem ultravioletter Belichtung entsteht die nächste Generation von CPUs, GPUs und weiteren Chips. Von 5G-Smartphones bis zu Cloud-Servern wäre das ohne deutsche Laser und Spiegel und nie…

Weder ist das Nanometer-Rennen vorbei noch Moore's Law tot: Mit extrem ultravioletter Belichtung entsteht die nächste Generation von CPUs, GPUs und weiteren Chips. Von 5G-Smartphones bis zu Cloud-Servern wäre das ohne deutsche Laser und Spiegel und niederländische Systeme nicht möglich. Ein Bericht von Marc Sauter (ASML, Prozessor)

Anonymous “Anonymous Cowards” are, for now, not welcome on Slashdot

Site’s president calls change “temporary,” says it is already helping moderators.

What's to come of Slashdot's Anonymous Coward feature? It was down, then it came back with a change; will it get changed once more?

Enlarge / What's to come of Slashdot's Anonymous Coward feature? It was down, then it came back with a change; will it get changed once more? (credit: Aurich Lawson)

On August 9, tech news aggregator Slashdot quietly removed one of its earliest features, which had been available to all visitors since its founding in 1997: the ability to post comments as an "Anonymous Coward." And while the feature returned within five days, it returned in a largely nerfed format.

Users can now only access the "Anonymous Coward" feature if they are logged in with a valid account, thus attaching some form of tracked use for anybody on the site. Slashdot administrators say this change is currently "temporary."

“Absolutely, only” meant to combat spam

The decision comes after a surge of public pressure against anonymous imageboard services—particularly 8chan, where a deadly shooter's manifesto was apparently posted. That pressure prompted cloud provider Cloudflare (and other replacement services) to stop offering services to the sites.

Read 10 remaining paragraphs | Comments

Sachsen: Telekom kündigt ISDN vor dem VDSL-Ausbau

In einem Ort im Leipziger Umland wurde von der Deutschen Telekom ISDN abgeschaltet, aber die Betroffenen bekamen keine Alternative. Jetzt bietet ein lokaler Netzbetreiber eine Lösung, von der die Betroffenen bisher nichts wussten. (ISDN, VoIP)

In einem Ort im Leipziger Umland wurde von der Deutschen Telekom ISDN abgeschaltet, aber die Betroffenen bekamen keine Alternative. Jetzt bietet ein lokaler Netzbetreiber eine Lösung, von der die Betroffenen bisher nichts wussten. (ISDN, VoIP)

Gravitationswellen: Forscher erfassen, wie schwarzes Loch Neutronenstern frisst

Das sieht nach einer Premiere aus: Die Observatorien Ligo und Virgo haben Gravitationswellen erfasst, deren Ausgangspunkt mutmaßlich die Verschmelzung eines Neutronensterns mit einem schwarzen Loch ist. Die Forscher suchen nach weiteren Hinweisen, sie …

Das sieht nach einer Premiere aus: Die Observatorien Ligo und Virgo haben Gravitationswellen erfasst, deren Ausgangspunkt mutmaßlich die Verschmelzung eines Neutronensterns mit einem schwarzen Loch ist. Die Forscher suchen nach weiteren Hinweisen, sie haben aber nur geringe Zweifel an ihrer Entdeckung. (Gravitationswellen, Internet)

Gesundheit: Umweltbundesamt präsentiert Luftqualitäts-App

Mit einer neuen App für Android und iOS will das Umweltbundesamt über die aktuelle Luftqualität in Deutschland informieren. Nutzer können leicht auf einer Karte die Daten für Feinstaub, Ozon und Stickstoffdioxid ablesen, die an naheliegenden Messstatio…

Mit einer neuen App für Android und iOS will das Umweltbundesamt über die aktuelle Luftqualität in Deutschland informieren. Nutzer können leicht auf einer Karte die Daten für Feinstaub, Ozon und Stickstoffdioxid ablesen, die an naheliegenden Messstationen ermittelt werden. (Medizin, Internet)

AI-Station und AI-Laptop: Schenker bietet konfigurierbare Linux-Workstations an

Wie der Name vermuten lässt, sind die AI-Station und der AI-Laptop leistungsfähige Workstations, die für Machine Learning geeignet sind. Deshalb sind Linux- und Open-Source-Frameworks vorinstalliert. Mit Geforce RTX 2080 Ti im Tower und Intel-CPU könnt…

Wie der Name vermuten lässt, sind die AI-Station und der AI-Laptop leistungsfähige Workstations, die für Machine Learning geeignet sind. Deshalb sind Linux- und Open-Source-Frameworks vorinstalliert. Mit Geforce RTX 2080 Ti im Tower und Intel-CPU könnten sie aber auch als Gaming-Hardware durchgehen. (Schenker, Intel)

Zahlungsdienstleister: Mastercard schließt Bonusprogramm nach Datenleck

Rund 90.000 gekürzte Kreditkarten-Nummern sowie weitere persönliche Daten enthält eine Datenbank, die aus einem Datenleck bei einem Bonusprogramm von Mastercard stammen soll. Der Zahlungsdienstleister spricht von einem “Problem” und stoppt das Programm…

Rund 90.000 gekürzte Kreditkarten-Nummern sowie weitere persönliche Daten enthält eine Datenbank, die aus einem Datenleck bei einem Bonusprogramm von Mastercard stammen soll. Der Zahlungsdienstleister spricht von einem "Problem" und stoppt das Programm. (Datenleck, Freenet)

Remote Code Execution: Doppelte Hintertür in Webmin

In der Systemkonfigurationssoftware Webmin waren offenbar für über ein Jahr Hintertüren, mit denen sich übers Netz Code ausführen lässt. Den Angreifern gelang es dabei offenbar, die Release-Dateien des Projekts zu manipulieren. (Backdoor, Server-Applik…

In der Systemkonfigurationssoftware Webmin waren offenbar für über ein Jahr Hintertüren, mit denen sich übers Netz Code ausführen lässt. Den Angreifern gelang es dabei offenbar, die Release-Dateien des Projekts zu manipulieren. (Backdoor, Server-Applikationen)