High-profile panel suggests major escalation in war on intellectual property thieves. Guess who's behind this lunacy It’s not like we needed any more proof the content cartel will stop at nothing to achieve its goals, that there is no argument too base and no tactic too vile for the champions of copyright abuse. But thanks to The Commission on the Theft of American Intellectual Property (TCOTAIP), we have it in spades.Last week, TCOTAIP published its recommendations on what the U.S. government should do to combat the scourge of piracy. The seven-person commission is made up of professional bureaucrats and former high-tech CEOs, and it’s co-chaired by former GOP presidential candidate Jon Huntsman and ex-director of national intelligence Dennis C. Blair. Though the report has China’s counterfeiting and trade-secret thievery in its crosshairs, the implications extend easily to any file-sharing, copyright-mocking scallywag.[ Cash in on your IT stories! Send your IT tales to offtherecord@infoworld.com. If we publish it, we’ll keep you anonymous and send you a $50 American Express gift cheque. | For a humorous take on the tech industry’s shenanigans, subscribe to Robert X. Cringely’s Notes from the Underground newsletter. | Get the latest insight on the tech news that matters from InfoWorld’s Tech Watch blog. ] The 84-page report spends most of its time outlining how we got where we are today, the methods of attack used by cyber thieves and spies, and the costs of international theft of IP. It’s fascinating reading, if you also enjoy browsing phone directories and software manuals. But right around page 81 it gets interesting. That’s when the Commission offers up one possible solution to copyright violations:Software can be written that will allow only authorized users to open files containing valuable information. If an unauthorized person accesses the information, a range of actions might then occur. For example, the file could be rendered inaccessible and the unauthorized user’s computer could be locked down, with instructions on how to contact law enforcement to get the password needed to unlock the account.As Boing Boing’s Cory Doctorow notes, there’s already a term for that technique popular among organized gangs of cyber criminals: ransomware. He writes:It’s just more evidence that copyright enforcers’ network strategies are indistinguishable from those used by dictators and criminals. Do two wrongs make a right? But that’s just the beginning. In the next section, the Commission recommends something more heinous — infecting cyber thieves’ systems with malware:While not currently permitted under U.S. law, there are increasing calls for creating a more permissive environment for active network defense that allows companies not only to stabilize a situation but to take further steps, including actively retrieving stolen information, altering it within the intruder’s networks, or even destroying the information within an unauthorized network. Additional measures go further, including photographing the hacker using his own system’s camera, implanting malware in the hacker’s network, or even physically disabling or destroying the hacker’s own computer or network.Note the use of every government’s favorite literary technique, the passive voice: “There are increasing calls for….” Who’s calling for that, exactly? I’ll give you one guess. Back in 2008, then-RIAA president (now CEO) Cary Sherman floated a similar scheme. One of the RIAA and MPAA’s favorite senators is Orrin Hatch (R-Utah), who hails from the same state as Huntsman. Consider the dots connected.Here, though, even the Commission backs away from this idea because “it is not supported by established legal precedents and norms” — yet — but calls for “new statutes to be considered.” Congress, you now have your marching orders. Big benefits for Big Pharma tooJust to give you an idea of where these guys are coming from: The report also recommends that the United States withhold funding for the UN’s World Health Organization until it swears allegiance to IP protection — that is, stop distributing cheap generic knockoff drugs instead of expensive brand-name medicants as a large gift to Big Pharma.But the most chilling part of this report occurs on page four, when TCOTAIP recommends the following: Designate the national security advisor as the principal policy coordinator for all actions on the protection of American IP. The theft of American IP poses enormous challenges to national security and the welfare of the nation. These challenges require the direct involvement of the president’s principal advisor on national security issues to ensure that they receive the proper priority and the full engagement of the U.S. government.If I am reading that passage correctly, it seems the Commission is calling for copyright, patent, and trademark enforcement — and the pursuit and possible infection of alleged perps — to fall under the purview of the NSA. Forget civil suits, forget ISPs as copyright cops; they want this to be handled by the spooks as a “national security issue.”Anybody else got a problem with that? If so, place your hands against the wall and spread ’em.Is intellectual property theft really a national security issue? Weigh in below or email me: cringe@infoworld.com. This article, “Today’s malware attack has been brought to you by the RIAA,” was originally published atInfoWorld.com. Follow the crazy twists and turns of the tech industry with Robert X. Cringely’s Notes from the Field blog, and subscribe toCringely’s Notes from the Underground newsletter. Technology IndustryIntellectual PropertyHacking