The Social Organization of Audio Piracy On The Internet
The Social Organization of Audio Piracy On The Internet
The Social Organization of Audio Piracy On The Internet
the Internet
Jon Cooper
NEW COLLEGE OF USF
and
Daniel M. Harrison
FLORIDA STATE UNIVERSITY
In this article we describe and analyze the emerging audio piracy (MP3)
subculture on the Internet. As is evident to even the most naı̈ve observer of
the contemporary landscape, the explosion of Internet based communica-
tion is radically redefining the nature of social relationships in modern
societies, if not creating altogether novel forms of social interaction
(Lyotard, 1991; Stone, 1996). Yet sociologists have yet to take the Internet
seriously as a site of ethnographic investigation. Where sociological
observation concerning the Internet exists at all, it is through vague
generalizations and unqualified assertions about what these new virtual
forms of communication portend (Kellner, 1995) for ‘society’, which offers
little in the way of concrete social research.
We attempt to advance sociological study of ‘virtual communities’ by
embarking on an extremely focused study of one particular Internet
subculture that is literally revolutionizing the production and consumption
of popular music – audio pirates. Audio piracy, in a very basic sense, refers
to the process of methodically encoding copyrighted music and distributing
it without paying royalties. In our day, these encodings take place in a rich
and highly textured social system mediated by electronic communication
networks.
Audio pirates operate in a complex and highly structured social and
economic environment that has its own particular matrix of roles, norms
Media, Culture & Society © 2001 SAGE Publications (London, Thousand Oaks
and New Delhi), Vol. 23: 71–89
[0163-4437(200101)23:1;71–89;015482]
72 Media, Culture & Society 23(1)
and mores. We present the first sociological analysis of this system, one
that seeks to explain not only the internal social structure of the MP3
community, but which also strives to understand how the entire network of
musical distribution and production around the globe may be affected by
these developments. In analyzing the social organization of the audio
piracy subculture, we aim to communicate three main concerns: (a) the
activities of audio pirates; (b) how they maneuver in cyberspace; and (c)
the underlying motivations for the audio piracy movement.
This article unfolds in the following way. The first two sections
constitute a technical primer that we think is necessary for the reader to
understand the social interactions which take place within audio piracy
communities. Audio pirates utilize multiple (and often simultaneous)
modes of communication and speak in a dialect heavily laden with techno-
logical jargon. In order to make this language more accessible to the
reader, we first describe, in simple terms, the programs, networking
protocols, software, hardware and file formats that make up the technical
framework within which audio pirates do their work.
In section three, we begin our foray into the audio piracy subculture by
analyzing the role structure of this virtual community. Our observations
were obtained by assuming the persona of an audio pirate – _sub-bass – on
a daily basis for a period of several months in 1998–9. In section four, we
analyze the main status symbols and power signifiers that _sub-bass
discovered during his sally into the audio piracy subculture. Section five
turns to the division of labor within the subculture, before concluding with
an examination of social conflict and resolution within the audio piracy
community.
sound’s change over time. This encoded sound is then played back
dynamically by performing a mathematical translation on the stored
information to reproduce over time the song’s evolution within the timbrel
domain.
MP3 files are tremendously more dense than raw audio data. For
example, a five-minute song at standard CD quality expressed as raw data
is 52,920,000 bytes (44,100 [sampling rate] x 2 [bytes per sample] x 2
[channels] x 300 [sec] bytes), while a five-minute song compressed with
MP3 with the usual encoding options is only 4,800,000 bytes (128,000
[kbps encoding rate, 2 channel] / 8 bytes per bit x 300 [sec] bytes). This
11-fold increase in data density makes it possible for the average Internet
user to participate quite easily in the exchange of audio files. A telephone
modem (56K) can transfer one 4.8-minute song in about 11 minutes, a
cable modem can transfer one in 48 seconds, and faster links make transfer
time almost a non-issue entirely.
With the rise of commodity hard drives, storing huge amounts of MP3
files is extremely efficient and affordable. At the time of writing, a hard
disk drive capable of storing 16,800 million bytes of information (or about
3500 five-minute songs) costs US$244, which is less than 7 cents per song.
These songs are instantly available for playback and can be categorized in
an infinite number of ways using a plethora of software tools. This
playback software harnesses the massive computational ability of modern
computers to convert the MP3 file’s encoded representation of a song back
into audio data, which is then reiterated through a sound card into speakers
or an amplifier. Moreover, some varieties of playback software can save
the song as it is being converted to sound in raw format for subsequent
‘burning’ to recordable compact discs, which may then be played on
regular CD players.
Encoding software is the flip side of the same coin. It converts a song in
raw audio format into an MP3 file. Again, this process requires an
incredible amount of computational power. Compressing a 5-minute song
might take up to 25 minutes due to the asymmetric nature of the mathematical
transformations involved, a process that makes encoding the most time-
consuming part of contributing a new MP3 file to the community.
Another important piece of technology are play-list editors, which allow
an audio pirate’s collection to be categorized, subdivided and put into
logical units for playback. For example, a pirate could design one play-list
to randomly play jazz songs, one to randomly play hip-hop songs, and one
to play only works written by, for example, Tom Petty, and only those
songs that were recorded in 1996. It is thus significantly easier to find a
given song within a collection when listening to MP3 music than it is when
listening to music in conventional recording formats.
Another characteristic that differentiates MP3 music from music conven-
tionally recorded is that, until recently, MP3 files could only be heard by
74 Media, Culture & Society 23(1)
/join #mp3leech
Now talking in #mp3leech
> Has anyone got the new Method Man album, Tikal 2000?
< _sub-bass > Has anyone got the new Method Man album, Tikal 2000?
< z0rtie > beta is big h0zer
< fleg > yuh
In this example we asked the bot (‘MAJOR’) when another user (‘edz-’)
was last seen in the channel. Bots create an additional level of social
infrastructure in the IRC beyond simple chatting. They can be used to
protect a channel from hostile takeover, to enforce class distinctions, to spy
on other channels, to send asynchronous messages to other users, and to
also catalog and transfer files.
A special kind of bot is the FServ bot. These bots provide a library of
audio files which may be downloaded either free of charge or in exchange
for a certain ratio of files which the user ‘uploads’ into the channel (more
on which later). Another example should be illustrative:
/join #mp3jazz
> !swingman
76 Media, Culture & Society 23(1)
in and day out. Above all, however, their raison d’être is to move data at a
dizzying pace. Let’s wade in.
The audio piracy community’s nominal purpose is to exchange high-
quality audio files between people, making it easy to locate, share and store
them for later playback and re-transmission. There are three dominant
modes or roles into which a pirate’s online activities may fall, that of leech,
trader and citizen, which we now address in turn. The links to existing
sociological discourse on social action will be made by applying these
constructs to the three main routes of ‘getting action’ found in network
theorist Harrison White’s (1992) recent work, Identity and Control.7
Files obtained via the leech approach are provided to the receiver
completely free of charge and without social obligation, as noted above. An
agent locates a file that is available gratis either by waiting on an IRC
channel for an FServ bot to offer it for download or by using a search
engine on the Web or as part of a bot. Having found the file, the user then
downloads it via FTP or DCC, and moves on to obtaining the next one he
or she desires. When a file is received under the sign ‘leech’, the person
offering it is not expecting a favor or even necessarily a word of thanks; he
or she is simply doing it for the good of the community as a whole. In
White’s terminology, the leech would fit in the scheme of getting action by
‘reaching through’ the MP3 network. No objective change in social
position or status is obtained by acting as a leech. According to White,
Reaching through is a phenomenological term about strategic efforts to get
action and control through and despite . . . complex deposits of social
organization. . . . Reaching through is a matter of occasion and process as much
as structuration. . . . Reaching through is as much selectivity as it is persevering
through multiple connections. (White, 1992: 260)
Leeches that ‘reach through’ to get action are mainly treading water. New
information is sought out and short-term connections established, but none
of this involves a longer range plan for further control and action within
the subculture.
A trader’s approach is based on a system of pure exchange value.
Someone who is trading files will typically enter a chat channel and request
a specific song or album he or she desires, hoping to find someone who has
it in their collection. Upon finding a person who possesses the file, a deal is
struck to exchange the desired file for another file or set of files that the
requesting user either has in his or her collection, or knows where to go to
find it. Here is a simple example of a trading session:
< _sub-bass > anyone got DJ Qbert’s ‘Demolition Pumpkin Squeeze Music’
japanese promo?
*m1x* yuh
*m1x* u got other turntablism shit?
< _sub-bass > yep, got cut chemist, prince paul, and umm I think some dj
shadow
Cooper & Harrison, Audio piracy on the Internet 79
A typical trader repeats this simple interaction many times a day. Traders
sometimes impose more stringent conditions for a swap if a file is
particularly difficult to find, for example, if it is a pre-release copy or a
‘bootleg’ of a live show. Occasionally a trader will demand a file the
requesting trader does not have in his or her collection, and the requesting
trader will be forced to seek out the file in order to make the trade. An
ability to fulfill difficult requests is a sign of status within the audio pirate
community (more on which later).
< _sub-bass > has anyone heard of ‘swollen member’ out of new york? I think
they have everlast from house of pain
< spinner > nope
< daz > pretty ill, right?
< daz > my boy in ny got a copy, it’s only on vinyl, mad underground shit
*daz* what u got to trade?
< _sub-bass > got some dj rectangle, squarepusher, the new xzibit
*daz* nah fuck that spacy shit
*daz* what u got datz underground?
< _sub-bass > what are you looking for?
*daz* hmm.. dj honda?
< _sub-bass > huh hang a few I think I saw it on a site
The trader role appears to fit nicely in to Harrison White’s second mode of
getting action, that of ‘reaching up’ (White, 1992: 256). Reaching up is a
matter of shifting one’s social location, from present position to someplace
‘upstream’. Traders reach up into a channel to obtain a coveted file and in
the process often, in fact, ‘upload’ files into that domain. They are the
entrepreneurs who get action by reaching up to become further embedded
in the subculture. The more upward their orientation, the larger their net of
audio files, and thus their social action potential.
80 Media, Culture & Society 23(1)
Essentially, the trader brags about the speed of his or her connection and
the amount and type of files he or she possesses, and then site operators
offer temporary trial accounts to see if the trader can really deliver the
goods. It is social protocol to upload a large amount of files before
downloading from a site in order to thank the site operator for the account.
However, if the trader perceives the site operator or the site to be ‘lame’ –
in the sense that it doesn’t contain files of interest – he or she may not
upload at all or upload only enough files to get the files he or she wants.
Citizens represent the highest social strata of the audio piracy subculture.
There exists some overlap between the role of trader and the role of
citizen, but the main difference is that traders are primarily focused on their
own data acquisition, while citizens are more attuned to social interaction
82 Media, Culture & Society 23(1)
and status. This is not to say that citizens are uninterested in transferring
files (as data exchange is the central activity of this subculture), but citizens
are distinguished by taking an active interest in one another as human
beings rather than mere bargaining chips. Those who act in citizen role are
the philanthropists of the subculture, and they run the FServ bots that serve
the leeches. They gain social status through these activities. Citizen users
make up the majority of the members of pirate groups and channel
operators because they enjoy the status and power of their social position
as much and sometimes more than the actual exchange of files.
We interviewed a citizen-class user about why he participates in the
MP3 subculture. Part of this exchange is reproduced here:
< _sub-bass > thanks for letting me interview you.
< Magias > np
< _sub-bass > so, a) why do you run an FServ?
< Magias > It’s kind of nice to give people things that make them happy, and it
only takes me like ten minutes a day to give a lot of leeches a lot of recent
music. What goes around comes around, you know?
< _sub-bass > you don’t get anything in return but social status?
< Magias > I’m not really sure I get social status. I mean people give me shell
accounts and accounts on their sites, but that’s not really why I do it. Well I
guess I do get social status but I’m not in it to compete, just to have fun.
< _sub-bass > yeah. b) where do you get the mp3s you put onto your FServ?
< Magias > From my sites. From other people I know. The usual. I just have
some good sites.
< _sub-bass > c) would you call the people you know online ‘friends’?
< Magias > What?!
< Magias > Ummmm. . .huh. Well some of them are, of course. It’s just like any-
thing else, some people are dicks and some people are just like aquaintances
and some people I talk to almost every day. It all depends.
Most of the pirates we interviewed, however, had for the most part failed
to think reflexively about their involvement with the audio piracy sub-
culture. Some even expressed contempt at our attempt to document and
analyze the power relations within their community, viz.: ‘*tim* FUCK
YOU, COLLEGE BOY’.
For the most part it seems that audio pirates view this social system as
just another network in which they participate. They talk to the people they
like, ostracize those they don’t and, on the whole, seem to have a pretty
good time in the process. As in all social organizations, there are power
relations among the social actors, and in the audio piracy subculture, these
relationships shape the flow of data between participants.
dissemination and accumulation of data are the primary activities for the
members of this subculture, the ability to store massive amounts of data
and to move it rapidly from place to place are necessary for inflating a
pirate’s status within the scene. Certain channels exist for users with
particular sorts of links who are unwilling to transmit data at speeds slower
than their link will permit.8 Another important status symbol for traders is
the speed with which they can get released files. ‘Zero-day’ traders, for
example, receive new sound files on the day they are released to the
network by a pirate group, while ‘zero-hour’ traders take it one step further
and get the files within an hour. A final marker of status is affiliation with
pirate groups, which are ranked according to an internal ordering scheme,
relative to each other.
Respect is the metric of status within this social system, and an increase
in respect tends to increase the amount of power wielded in the subculture.
Some forms of cultural capital can increase a pirate’s status simply because
he possesses them, but others must be earned by hard work and apt social
maneuvering, just as in real life. Traders earn respect by having the largest
number of recently released files, and by uploading them very quickly to
the sites and people with whom they trade. They compete with one another
on sites to see who can upload the most files to a respected site, which may
earn them the coveted ‘uploader-top’ title, a distinction bestowed when
they outperform all other users during a given period of time.
The way citizens gain respect is more complex and depends upon the
services they provide to the community or group, but it is also often based
on social intangibles such as the extent of one’s social connections and
ability to handle adverse situations. Power is wielded mainly in terms of
controlling or restricting the ability of others to transmit and receive data.
Once granted admission to a channel, the pirate may be granted ‘+v’
status – which means that he or she is a member in good standing of the
channel or group – or ‘+o (operator)’ status – which means that he or she
helps to control the channel or group. On channels belonging to audio
pirate groups, +v and +o status tend to signify whether or not a user is
a member or a senior member, while on more public channels these
signs indicate status on the channel. Those with +o permissions may
excommunicate people from a channel, remove their ability to speak,
change the channel topic, make the channel invitation-only, and apply a
host of other restrictive criteria to a pirate’s account.
Access to sites also obviously involves relations of power and control.
The bargain is that, once granted access to a site, pirates will provide
quality files (in terms of release date and type) that fill the needs of the site
– the better the site, the higher the quality of the files the pirate is expected
to provide. ‘Leech’ access on excellent sites is granted only to individuals
of the highest rank or those who know the site administrator personally.
Pirate membership in diverse social networks and the capacity of high-
84 Media, Culture & Society 23(1)
speed links can exert power on the site operator, and force him or her to
provide the user with an account in order to improve his site. By way of
illustrating this phenomenon, compare the interaction we quoted earlier
when we were granted access to a fairly low-grade site (this in spite of its
operator labeling it ‘phat’), with the interaction in which we bargain for an
account on a high-end site (one with a T3 connection, 45 gigabytes of
storage and which is US headquarters for a major MP3 piracy group):
< _sub-bass > hey, mark0z told me to ask you about an account on your site.
*tek9* did he
*tek9* what are your affiliations
< _sub-bass > I run bots and do some couriering for steppaz
*tek9* my site only allows > 50k/s transfers
< _sub-bass > yeah I can do that
*tek9* hmm
*tek9* u can have a trial acct
*tek9* make uptop10 this week and u get a perm acct
*tek9* read the site rules
*tek9* l/p and ipmask?
< _sub-bass > subbass/sp4ng ipmask 24.3.78.188
< _sub-bass > thanks
*tek9* wait
*tek9* ArmoryFTP / 128.180.118.102: 187
This site operator granted us access based upon the fact that we were
recommended to him by a user the operator knew had an account on his
system, as well as the fact that we were a member in a mid-tier MP3 piracy
group called ‘steppaz’. It is quite likely that *tek9* had a private con-
versation with the user (mark0z) who recommended us, to ensure that we
were telling the truth. Even with this recommendation, the operator
required us to be one of the top ten uploaders in terms of bytes uploaded
for the next week in order to keep our account. The power dynamic
weighed heavily in his favor because *tek9* controlled the resource we
wished to access, and as such he was able to name the terms under which
we could participate on the site.
Audio piracy groups are extremely sophisticated and often very well
organized. Their purpose is to encode new music into the MP3 format and
to distribute it to their member sites for eventual dissemination into the
larger community of traders and leeches outside the group. Toward this
end, pirate groups have an explicitly stated internal social hierarchy and a
Cooper & Harrison, Audio piracy on the Internet 85
less formal external hierarchy that determines how different pirate groups
relate to one another.
The highest positions available within a pirate group are those of the
senior staff. These are the people who manage the other members of the
group, which can sometimes number up to 80 individuals in many different
parts of the world. Senior staff members are responsible for ensuring that
all other members of the group do their jobs and that unexpected
contingencies are resolved. They recruit new members to the group,
organize and run online meetings, and manage intra- and inter-group
relations. On occasion, senior staff members even receive compensation in
the form of stolen computer hardware for their efforts.
The remainder of the group is divided into task-specific roles. Couriers,
for example, are primarily recruited from the population of traders. They
are responsible for uploading to member sites and disseminating released
files to member sites and other sites they access. Site operators provide a
machine to host the pirated files, typically on a fast link with enormous
amounts of storage space. They update user accounts and also delete files
already uploaded that did not meet the site’s criteria.
Botmasters create and operate programs called bots which manage IRC
channels for the group’s use. Bots enforce social status distinctions on
channels by automatically recognizing users who enter the channel and
granting them special perquisites according to their status within the group.
Bots also help to protect a channel from hostile actions taken by members
of other groups should a conflict arise (more on which later).
Rippers obtain new music and convert it to MP3 format and provide it to
packagers, who add group information and place it on a ‘drop site’ for the
couriers to disseminate. Many groups publish a weekly newsletter for their
members that lists the top couriers, sites and rippers for each week. This
medium provides a spirit of friendly competition within the group.
Pirate groups are also in competition with each other. Two main
categories of audio pirate group exist: courier groups and release groups.
Courier groups strive to move the largest possible amount of most recent
files to their member sites or to disseminate them to as many leeches as
possible. Release groups strive to be the first group to transmit a given
musical release onto the Internet after its release, preferably even before it
is released in music shops. Sophisticated search engines which index all
files released helps to determine whether a given musical title has or has
not been previously released. Duplicating a release that another group has
already released is considered extremely ‘lame’ and pushes the group’s
status downward very quickly. A weekly scene report ranks groups by the
amount of data they disseminate on popular IRC channels and to the
largest sites in the world. Membership in a top group provides members
with significantly more status than membership in a lower group.
86 Media, Culture & Society 23(1)
There are elements of the audio piracy community who seem to gain
some sort of sadomasochistic pleasure by engaging in power struggles, and
there are also freelance mercenary hackers who solve other people’s
problems in exchange for access to coveted sites. Completely destructive
attacks are, it seems, quite rare, while denial-of-service attacks (in which
an enemy’s network link is rendered unusable for a short period of time)
are more common.
Conclusion
What implications does the audio piracy subculture have for traditional
forms of music production and distribution? It seems an understatement to
say that the recording industry is scared. Audio pirates largely, and perhaps
completely, ignore copyright laws. For many pirates, the question of
copyright is simply irrelevant. Unless they are operating a site, it is
virtually impossible for an audio pirate to experience legal trouble –
prosecution is extremely uncommon, and the most severe penalty an
ordinary user can expect is deactivation of Internet access. One pirate
revealed to us that,
< dox > Copyright law doesn’t interest me. It doesn’t pertain to my existence in
any way because it never could affect me. I buy the software I use for business,
and steal the software I use for pleasure. I buy CDs that I want to listen to, but
I download mp3 files of music that I don’t think is worth buying or that I can’t
find for a reasonable price. It’s not like I can get caught, so why not?
Copyright law is thus taking a beating in this age of electronically border-
less nation-states, especially when we consider the fact that the largest
pirate audio sites are located ‘off-shore’ where the legitimacy of the
original US copyright is questionable at best. Some pirates take an active
stance against the very concept of copyright law, believing that ‘informa-
tion wants to be free’, and justify their activities by trying to make this
happen.
Audio pirates are making a revolution in the way contemporary music is
produced, accessed and distributed. How long it will take to make the
transition to a completely ‘networked’ system of musical production and
distribution is, of course, an open question. That such a day is coming,
however, seems inevitable as musical artists use MP3 to increase their
autonomy, households get even faster connections to the Internet, and
digital audio playback devices become even more widespread.
Notes
Labor for this project was divided up in the following way. Cooper wrote the
rough draft of the article for a course, Popular Culture and the Mass Media, which
88 Media, Culture & Society 23(1)
was taught by Harrison at New College in 1998. In early 1999, Harrison partially
re-wrote the article, fine-tuned the argument and incorporated more theory and
context. Both authors have continued in equal capacity to revise the manuscript
since this time.
1. Additionally, our research has unveiled an additional 19 portable players
either planned or under development, as well as 8 car stereo devices and 18 MP3
players designed to be integrated within a home stereo system.
2. Interactions online pirates refer to as ‘RL’ (real-life) or ‘IRL’ (in-real-life),
respectively.
3. IRC gained notoriety as a social facilitator during the Persian Gulf war when
thousands of people from around the world gathered to talk with people in the war
zone in real time during the fighting, the first author of this paper among them.
4. The five to one ratio is interesting in that it corroborates insights concerning
the social importance of the number five. As Harrison White (1992: 10) observes:
One thousand, and five, more or less, should be the two principal numbers for
the human species. A thousand, on the one hand, because that is where it all
begins, the size in number of individual creatures of a primitive tribe which is a
more or less isolated aggregation able to subsist and to reproduce itself. . . .
Five is the median number of comparable selves that work together effectively
enough to keep reproducing the arrangement. The size of five cuts across all
contexts and levels: nuclear family, men in a fishing party, producing firms
making up a market, and so on.
5. The reader should be aware that these models will undoubtedly change over
time. Part of what makes this culture so interesting for sociological inquiry is the
very swift mutations that it undergoes, changes which are facilitated by the fact
that there are no real physical objects to move when the infrastructure undergoes
fundamental changes in nature.
6. Internet cultures are, in general, a boon for the ADD/ADHD ridden post-
television generation and its kin, since an infinite number of stimuli are simultane-
ously and efficiently available at any moment, and the typical audio pirate
embodies the fragmented attention-span typical of serious Internet users.
7. For more on the theoretical ideas of Harrison White, see Harrison (forth-
coming).
8. At the time of writing, these included: #mp3t1, #mp3-t3 and #mp3cable.
References