Once again a post-career opportunity in crime is knocking on my front door. This time around it actually arrived via a hole in my home network’s firewall, but let’s not let semantics get in the way of a good story. My point is that I have unwittingly stumbled upon a lucrative future in the theft and distribution of Hollywood intellectual property. Look for me at your town’s local flea market — I’ll be the guy selling nondescript DVD’s with unique and alternate spellings of well-known films.
I’m pretty confident that this won’t pose any problems with my pension. The agreement the federal government made with me when I left its service stipulates that I need to jump through bureaucratic hoops if I wish to work for them again. But they never said anything about working against them. So by virtue of this blog post as notification of my new intentions, I declare my ducks to hereby be in a row.
I wonder if LinkedIn has an appropriate career category for larceny?
This all arises from a missive I recently received from my cable and Internet provider, Comcast. The good folks there tell me that I inadvertently infringed copyright for the 2015 movie Jurassic World. “Inadvertent” is actually my characterization of the allegation because I’m pretty sure that I didn’t do it. I have never seen the film, I don’t ever watch movies on my computer, and I must sheepishly confess to never having seeing any of the earlier Jurassic Park series films (I’m not much of a fan of blockbusters).
Still, my computer’s IP address was caught red-handed by the ever observant Hollywood security apparatus, and I do take these guys seriously. I remember many years ago when their brethren in the music industry were throwing the parents of teenagers into debtors prison because of the online antics of their children. The cute little tykes were downloading songs illegally and the record companies showed no mercy at all. Parents were fined extraordinary sums, sometimes amounts of up to a hundred thousand dollars or more.
These entertainment moguls don’t play — just ask Rob Lowe when he deigned to hang out with Snow White for a mere fifteen minutes of song and dance without paying a royalty. Disney was not amused.
So just how did I get into this position?
Wanting to get to the bottom of my newly established bona fides in the criminal enterprise arena, I called Comcast to see if I could find out a little more than their e-mail was telling me. A heavily accented customer service rep named “Kevin” took all of my information. He then asked me if I was using any kind of peer-to-peer or “P2P” technology on my computer. I told him that I was not.
P2P allows for a group of individuals to form a network of interlinked computers to share data with one another. So if one person has, say, an illegal copy of Jurassic World on a computer for viewing, all of the other computers and users on that same network can each share in the enjoyment of the film instead of having to find a way to get it themselves. Share and share alike. This is pretty much what the kiddies were doing on Napster back in the late 1990’s and early 2000’s that so enraged the music industry. Another name for this is called File Sharing.
“Comcast Kevin” really wasn’t interested in a long phone conversation with me. I got the impression that these kinds of intrusions into Hollywood servers happen quite frequently, and Internet providers such as mine duly report the action to their offending customer in a rote and systematic manner. In other words, “Dude, if you did this you’re totally busted, and this is also your first waning; If you didn’t do it, just ignore.”
Kevin did encourage me to tighten up my home network’s security because he said it was more than likely that one of my neighbors probably found a way of using our WiFi as a way to connect to a P2P network.
As much as I hate to be an accessory to a crime, I am getting a grin out of the fact that the offending hacker is a fellow resident living in my own retirement community. This takes “Jurassic” into an entirely different realm. I bet this guy doesn’t wear the required wrist band when visiting the pool either.
After he was finally able to end our phone conversation (I audaciously kept asking questions), Kevin e-mailed me instructions on how to strengthen the security of our WiFi network. It was an eye-opener to see that when logging into our settings, the password for our modem was actually the word “password.” Oh, those amusing contractors for Comcast who do the installations. They obviously enjoy playful tomfoolery when setting up new customers.
It didn’t seem to matter if my WiFi password was complicated enough when the modem was itself so vulnerable! So in addition to changing the modem’s password, I came up with a new name for our network, and I also changed the WiFi password for good measure.
I realize I’m not fooling anyone, though. The only people who will encounter problems logging into our network will be us. Our passwords are now made up of so many numeric and special characters that Gorgeous just stared at me in disbelief when I showed them to her. I am making an attempt at due diligence, but I also know that the average teenager can probably break my codes in five minutes or less. My 67-year-old neighbor I assume will do it in seven minutes.
So call off your goons, Hollywood. I am not your bogeyman. The worst it ever gets from my computer is watching clips that someone else has uploaded to YouTube. If you’re coming after me for the many views of Ralph and Norton in old Honeymooner clips, then I’ll just save you the time and declare myself guilty because that’s about the extent of my infringement. As a criminal I’m a bit of a lightweight.
Until next time…