Feeds

Pirate Bay slapped with copyright charges

Claims business as usual

High performance access to file storage

The Pirate Bay said it will live on no matter what the outcome of a case brought by a Swedish prosecutor who charged four men involved with the running of the torrent tracker site today.

A blog post on the outfit's website declares: "In case we lose the pending trial (yeah right) there will still not be any changes to the site. The Pirate Bay will keep operating just as always. We've been here for years and we will be here many more."

Copyright infringement charges were filed by public prosecutor Hakan Roswall in Sweden against four men (Carl Lundstrom, Peter Sunde, Frederik Neij and Gottfrid Svartholm Warg) behind the operations of the infamous website, who are accused of being accessories to breaking copyright law.

He listed a number of examples of music and films that he claimed had been illegally shared via The Pirate Bay website, including the likes of Robbie Williams, The Beatles and Harry Potter and the Goblet of Fire.

Just last weekend, The Pirate Bay gave two fingers to the film and music industry with its claim to have hit ten million peers and one million torrents on its site.

The International Federation of the Phonographic Industries (IFPI) has slammed The Pirate Bay, saying that it was not motivated by "idealism" and a love of music but was only interested in making bundles of cash.

IFPI CEO John Kennedy said: "The Pirate Bay has managed to make Sweden, normally the most law-abiding of EU countries, look like a piracy haven with intellectual property laws on a par with Russia."

El Reg asked the IFPI, which represents the interests of music multinationals, if it thought The Pirate Bay was being a bit cocky about its claims that it will live on even if it loses the case in Sweden.

Jo Oliver, head of litigation at IFPI, said: "Illegal services like The Pirate Bay often distribute their operation to avoid detection and legal sanctions. This was the case with Kazaa and many other services that made money from exploiting other people's work.

"We would continue to use every avenue to seek the closure of this damaging service wherever it is located." ®

Combat fraud and increase customer satisfaction

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Reprieve for Weev: Court disowns AT&T hacker's conviction
Appeals court strikes down landmark sentence
prev story

Whitepapers

SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.