Open Systems Interconnection (OSI) is a reference model for understanding and developing compatible networking and communication practices. The OSI model illustrates the relationships between all components of a network and provides a framework that allows each layer to serve distinct purposes and work independently of each other according to their separate functions. Froehlich (2021) argues that the OSI model is “theoretical in nature and should only be used as a general guide,” but it serves an important purpose in creating a clear framework for understanding how a telecommunication system should work. The different terminologies and formats between the different OSI model layers help make distinctions between the specific roles and tasks that take place throughout a network and aid in the planning, design, and troubleshooting of the network. In 1984, the International Organization for Standardization (ISO) proposed Open Systems Interconnection (OSI) as a common framework for networking technology.
The OSI uses conceptual abstraction to separate the layers into compartmentalized slices based on function that can be evaluated as a piece at a time (Froehlich, 2021). The seven layers of the OSI model work in cascading hierarchy, each layer serving the layer above it and being served by the layer below it. The highest layer is the application layer which is followed by the presentation layer, session layer, transport layer, network layer, data-link layer, and finally the physical layer. The OSI model creates a framework that benefits from its adaptability, security, and flexibility; and has become a standard model in networking.
The disadvantages of the OSI model include the fact that layers cannot work in parallel with each other and they must wait for the next layer to send data to them, the session layer and the presentation layer aren’t as useful as the other layers, and it is a theoretical model that has physical restrictions on its practical implementation (Froehlich, 2021).
Upwards of 30,000 individuals have been targeted with lawsuits from the Recording Industry Association of America since their campaign against peer-to-peer file sharing began in 2003 (Electronic Frontier Foundation, 2008). Despite the years of efforts that the RIAA put into combatting peer-to-peer file sharing, the results of their campaign have only served to increase the popularity of peer-to-peer file sharing and increased the total number of users. Because such a small group of individuals were targeted with lawsuits, it is speculated that the RIAA was attempting to make an example of a few to coerce the many into voluntary compliance.
Supporting Data from Big Champagne
Over the period that the RIAA was targeting people with lawsuits (between September 2003 and June 2005), a data analytics organization called Big Champagne reported that the number of active users in peer-to-peer sharing had doubled. American users were comprising the majority of all peer-to-peer file sharers while the number of users continued to increase at a 20% rate each year after 2005. Due to the time correlation of the increase in usage and the notoriety of the lawsuits, I speculate that the rise in of peer-to-peer file sharing usage was directly due to the popularization of the lawsuits.
2007 – 2008
Throughout the 2 years following the lawsuits, the popularity of peer-to-peer file sharing services and networks continued to rise (Electronic Frontier Foundation, 2008). Teenage users started to become a new majority of peer-to-peer users because they were able to transfer the downloaded songs onto trending media players like MP3 players and iPods. Though downloading to digital media devices was a very popular method for file sharers of the time, the number of users was dwarfed by the amount of people that were simply making copies of compact disks. The New York Times reported the results of a poll from that period stating that 69% of teens assumed that it was completely legal to make copies of compact disks and distribute them to friends. The RIAA admitted that the copying of compact disks was such a problem that it accounted for 37% of all file sharing. Other smaller avenues of file sharing have been revealing themselves as time goes on, such as file transfer over messaging applications or invite-only networks.
Enforcement and Public Education
It is interesting to question whether the RIAA intended the lawsuits against individuals to draw attention to a policy that the public would generally overlook due to a lack of interest and education. A lawyer for the RIAA, Cary Sherman, reportedly said “Enforcement is a tough love form of education” which leads me to believe that the RIAA was using the lawsuits to spread awareness about their intentions (Electronic Frontier Foundation, 2008). The RIAA explained some of its intentions in stating that they were unable to pursue justification with the peer-to-peer file sharing networks themselves because they had been protected by a previous court ruling, thus they decided to bring charges against individual users of the services. Although I can understand why the organization ultimately took the actions that it did, I think that they could have done a better job at creating awareness around the issue before the lawsuits and perhaps developed alternative methods to create an accountability for all users in violation of their policies. A survey that was taken years after the lawsuits were instigated gave indications that awareness of the possible consequences of illegal file sharing. However, the increasing popularity did not seem to wane after the rise in awareness of peer-to-peer file sharing’s illegality. Another survey suggested that most young computer users were more worried about receiving a computer virus when downloading than receiving an RIAA lawsuit. After 2006, the RIAA stopped popularizing their attempts at enforcement and resultingly experienced a decrease in public awareness.
Creating Legal Incentivization
The Electronic Frontier Foundation (2008) reported that legal mainstream services have experienced increasing popularity in the wake of the RIAA lawsuits. The largest U.S. retailer of music was stated to be Apple’s iTunes which compromises about 30% of the market revenue in the nation. Other schools of thought and methods of legitimate file sharing have been tested in the market such as DRM-free work; but none of these methods have slowed the use of peer-to-peer file sharing networks which remains as the most likely way listeners obtain music.
Domestic Leeching and Offshore Uploading
On a peer-to-peer file sharing network, the act of downloading files without sharing them is known as leeching. Because the RIAA chose to only target people who were uploading files to the file sharing networks, there was an assumption among users that leechers would not be targeted which resulted in the popularity of this downloading strategy. If the user who is sharing the files is uploading from outside of the country, it also becomes more difficult to enforce for the RIAA who operates nationally. New solutions have been since created like software that further obfuscates the identity of a user and private social network groups that are used to continue to share files with little fear of RIAA enforcement.
The Perspective of the Electronic Frontier Foundation
According to the authors at the Electronic Frontier Foundation (2008), the continued efforts of the RIAA to discontinue the prevalent use of peer-to-peer file sharing applications and networks among the many listeners in the United States has utterly failed. Technological creativity and advancement will continue to pressure the music industry in new and exciting ways and the music industry should develop channels that appeal to their customer base and the technologies they like to use. The EFF describes the normalcy of copyright disputes between copyright holders and the makers of popular new technological platforms, and the level of adaptation required to maintain high levels of interaction with their listeners. They advocate for a music service that has a free tier for listening but also allows users to pay for supplementary features. The prospective service could use engagement analytics to determine the amount of revenue distributed to the owners of the content.
Conclusion
The Electronic Frontier Foundation (2008) reported only increases in peer-to-peer file sharing usage through the entire RIAA campaign to eliminate the problem of peer-to-peer file sharing. The continuous rise of popularity of file sharing services both throughout the period of the RIAA lawsuits and since has proven to the market that peer-to-peer file sharing is a valuable technology that must be appropriately utilized by the music industry to be dealt with. It is of my own conclusion that the RIAA has made no substantial effect to reduce the amount of loss of revenue due to peer-to-peer file sharing because their own actions caused them to increase the popularity of the undesired action. I think that the most helpful campaign for the RIAA to prospectively undertake is to co-develop a music sharing platform with their user base that conversationally addresses all the needs of the listeners, the artists, and the regulating bodies based on concrete feedback and continuous revision.
Government and Business Applications of Facial Recognition
The federal government utilizes facial recognition software commonly at federal points of interest such as border crossings and within their own records for FBI investigations. There are policies in place that restrict the ability of the FBI to use photographs as positive identification within a case, however the organization is free to utilize photographs as clues to possible identifying evidence. The FBI uses a large repository of photographic data called the Interstate Photo System (IPS) and acts upon this data with a Next Generation Identification System (NGIS). This data corroborates individuals’ corresponding fingerprint data with face photos and other identifying information for the access of the FBI. According to Brandom (2021), on the state government level, a few states such as Massachusetts and Maine have passed legislature with intent to limit the ability of state governments to use facial recognition software.
ACLU and Criticism of the Technology
The American Civil Liberties Union (ACLU) has made criticizing statements regarding the privacy issues surrounding facial recognition software and have stated that they are handling the issue with seriousness and concern. Balli (2021) stated that the creators of Facebook, the Meta company, decided to stop utilizing facial recognition software within their platform in response to the declared privacy concerns of their users and those of government. Brandom (2021) stated concerns about an innate racial bias within facial recognition technology that raises additional significant issues surrounding the topic.
Facial Recognition and Individual Privacy
Facial recognition technology becomes in direct opposition to individual privacy when installed in public spaces. The technology could be implemented to use as a biometric authentication method for retail purchases, entrance keys, or even for criminal penalties. According to PrivacyRights.org (2011), prevalent use of facial recognition software in a public space would lead to complete loss of individual anonymity while improving the commercial ability of demographic targeting in marketing and sales. I believe that our individual anonymity is a large part of what makes us feel comfortable and safe in public environments. I think that with broad application of facial recognition software we would lose that sense of comfortable anonymity within society’s public spaces.
Private Businesses’ Potential Abuse of the Technology
The capabilities of facial recognition technology are not yet common knowledge, and the ethical considerations of its possible applications are still being considered by the technology community. Facial recognition is often used in military applications for targeting individuals, but the same basic technology is also available for commercial use by private business. The scalability of facial recognition software can easily create an over-arching and controlling architecture that has a high risk of important personal data being leaked in the case of a breach.
Advocacy for Facial Recognition
There is a market understanding that many customers will push back at a privacy over-reach if it becomes too concerning. However, the commercial world will utilize any tool at its disposal if it aids in reaching more customers, making more sales, or increasing profit margins. Facial recognition allows businesses to give personalized experiences to customers as they enter a store or could target them with coupons after they were recognized at a corresponding location. The ethical components of facial recognition technology will find polarizing effect upon the minds of technology leaders, some of whom will embrace the technology while others will choose not to use it citing ethical concerns.
IT Manager’s Perspective
As an IT manager, I would not encourage the use of facial recognition software in commercial applications. On the government level, I think that facial recognition software has valuable and viable applications in crime prevention and international security. The policies I would support as an IT manager would prioritize the individual privacy rights of my organization’s customers over leveraging technology with possible ethical ramifications. As a business, I would not want the legal responsibility of housing and protecting sensitive personal data from possible data breaches, even with the use of a third-party partner. I stand for proper authentication methods and a minimalist, need-to-know style of personal data sharing.