Feeds

Pirate Bay slapped with copyright charges

Claims business as usual

Reducing the cost and complexity of web vulnerability management

The Pirate Bay said it will live on no matter what the outcome of a case brought by a Swedish prosecutor who charged four men involved with the running of the torrent tracker site today.

A blog post on the outfit's website declares: "In case we lose the pending trial (yeah right) there will still not be any changes to the site. The Pirate Bay will keep operating just as always. We've been here for years and we will be here many more."

Copyright infringement charges were filed by public prosecutor Hakan Roswall in Sweden against four men (Carl Lundstrom, Peter Sunde, Frederik Neij and Gottfrid Svartholm Warg) behind the operations of the infamous website, who are accused of being accessories to breaking copyright law.

He listed a number of examples of music and films that he claimed had been illegally shared via The Pirate Bay website, including the likes of Robbie Williams, The Beatles and Harry Potter and the Goblet of Fire.

Just last weekend, The Pirate Bay gave two fingers to the film and music industry with its claim to have hit ten million peers and one million torrents on its site.

The International Federation of the Phonographic Industries (IFPI) has slammed The Pirate Bay, saying that it was not motivated by "idealism" and a love of music but was only interested in making bundles of cash.

IFPI CEO John Kennedy said: "The Pirate Bay has managed to make Sweden, normally the most law-abiding of EU countries, look like a piracy haven with intellectual property laws on a par with Russia."

El Reg asked the IFPI, which represents the interests of music multinationals, if it thought The Pirate Bay was being a bit cocky about its claims that it will live on even if it loses the case in Sweden.

Jo Oliver, head of litigation at IFPI, said: "Illegal services like The Pirate Bay often distribute their operation to avoid detection and legal sanctions. This was the case with Kazaa and many other services that made money from exploiting other people's work.

"We would continue to use every avenue to seek the closure of this damaging service wherever it is located." ®

Security and trust: The backbone of doing business over the internet

More from The Register

next story
Phones 4u slips into administration after EE cuts ties with Brit mobe retailer
More than 5,500 jobs could be axed if rescue mission fails
JINGS! Microsoft Bing called Scots indyref RIGHT!
Redmond sporran metrics get one in the ten ring
Driving with an Apple Watch could land you with a £100 FINE
Bad news for tech-addicted fanbois behind the wheel
Murdoch to Europe: Inflict MORE PAIN on Google, please
'Platform for piracy' must be punished, or it'll kill us in FIVE YEARS
Phones 4u website DIES as wounded mobe retailer struggles to stay above water
Founder blames 'ruthless network partners' for implosion
Found inside ISIS terror chap's laptop: CELINE DION tunes
REPORT: Stash of terrorist material found in Syria Dell box
Sony says year's losses will be FOUR TIMES DEEPER than thought
Losses of more than $2 BILLION loom over troubled Japanese corp
Show us your Five-Eyes SECRETS says Privacy International
Refusal to disclose GCHQ canteen menus and prices triggers Euro Human Rights Court action
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
WIN a very cool portable ZX Spectrum
Win a one-off portable Spectrum built by legendary hardware hacker Ben Heck
Saudi Petroleum chooses Tegile storage solution
A storage solution that addresses company growth and performance for business-critical applications of caseware archive and search along with other key operational systems.
Protecting users from Firesheep and other Sidejacking attacks with SSL
Discussing the vulnerabilities inherent in Wi-Fi networks, and how using TLS/SSL for your entire site will assure security.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.