Feeds

Mom sues RIAA members for racketeering

Don't call me scarface

  • alert
  • submit to reddit

High performance access to file storage

A New Jersey mother has turned the tables on the Recording Industry Association of America by suing the major labels for racketeering.

Michele Scimeca received a notice from the RIAA in December after her child used the Kazaa networks for a school project. She has countersued labels Sony, Universal and Motown by claiming that the demands for reimbursement of $150,000 per infringement falls foul of the 1970 Organized Crime and Control Act, better known as the RICO statue after Title IX of the Act: Racketeer Influenced and Corrupt Organizations Statute.

That's certainly a description that many would argue fits the major labels like a glove. But can it stand up?

Scimeca's attorney says "They're banding together to extort money, telling people they're guilty and they will have to pay big bucks to defend their cases if they don't pony up now. It is fundamentally not fair," the New Jersey Star Ledger reports.

The FBI's definition of organized crime defines a potential defendant as "any group having some manner of a formalized structure and whose primary objective is to obtain money through illegal activities. Such groups maintain their position through the use of actual or threatened violence, corrupt public officials, graft, or extortion, and generally have a significant impact on the people in their locales, region, or the country as a whole." RICO defines it more broadly, but narrows the scope to a set of criminal activities.

So tampering with music, price fixing, posing as police officers, wasting US Navy time and frightening children are not in the list, alas. In RICO cases the threat or use of physical violence has to be explicit. Legal experts say the case has little chance of reaching a jury trial.

The RIAA filed 500 more 'John Doe' suits yesterday and is seeking to extract the names of the perps from Internet Service Providers. ®

High performance access to file storage

More from The Register

next story
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Nokia offers 'voluntary retirement' to 6,000+ Indian employees
India's 'predictability and stability' cited as mobe-maker's tax payment deadline nears
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
It may be ILLEGAL to run Heartbleed health checks – IT lawyer
Do the right thing, earn up to 10 years in clink
France bans managers from contacting workers outside business hours
«Email? Mais non ... il est plus tard que six heures du soir!»
Adrian Mole author Sue Townsend dies at 68
RIP Blighty's best-selling author of the 1980s
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Analysts: Bright future for smartphones, tablets, wearables
There's plenty of good money to be made if you stay out of the PC market
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.