Feeds

Pirate Bay slapped with copyright charges

Claims business as usual

High performance access to file storage

The Pirate Bay said it will live on no matter what the outcome of a case brought by a Swedish prosecutor who charged four men involved with the running of the torrent tracker site today.

A blog post on the outfit's website declares: "In case we lose the pending trial (yeah right) there will still not be any changes to the site. The Pirate Bay will keep operating just as always. We've been here for years and we will be here many more."

Copyright infringement charges were filed by public prosecutor Hakan Roswall in Sweden against four men (Carl Lundstrom, Peter Sunde, Frederik Neij and Gottfrid Svartholm Warg) behind the operations of the infamous website, who are accused of being accessories to breaking copyright law.

He listed a number of examples of music and films that he claimed had been illegally shared via The Pirate Bay website, including the likes of Robbie Williams, The Beatles and Harry Potter and the Goblet of Fire.

Just last weekend, The Pirate Bay gave two fingers to the film and music industry with its claim to have hit ten million peers and one million torrents on its site.

The International Federation of the Phonographic Industries (IFPI) has slammed The Pirate Bay, saying that it was not motivated by "idealism" and a love of music but was only interested in making bundles of cash.

IFPI CEO John Kennedy said: "The Pirate Bay has managed to make Sweden, normally the most law-abiding of EU countries, look like a piracy haven with intellectual property laws on a par with Russia."

El Reg asked the IFPI, which represents the interests of music multinationals, if it thought The Pirate Bay was being a bit cocky about its claims that it will live on even if it loses the case in Sweden.

Jo Oliver, head of litigation at IFPI, said: "Illegal services like The Pirate Bay often distribute their operation to avoid detection and legal sanctions. This was the case with Kazaa and many other services that made money from exploiting other people's work.

"We would continue to use every avenue to seek the closure of this damaging service wherever it is located." ®

High performance access to file storage

More from The Register

next story
Android engineer: We DIDN'T copy Apple OR follow Samsung's orders
Veep testifies for Samsung during Apple patent trial
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
German space centre endures cyber attack
Chinese code retrieved but NSA hack not ruled out
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Big Content goes after Kim Dotcom
Six studios sling sueballs at dead download destination
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
Jack the RIPA: Blighty cops ignore law, retain innocents' comms data
Prime minister: Nothing to see here, go about your business
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
HP ArcSight ESM solution helps Finansbank
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.