Feeds

Pirate Bay prosecutors get jiggy with charge sheet - again

IFPI boss 'vague' on BitTorrent tech

Internet Security Threat Report 2014

Prosecutors in the entertainment industry versus The Pirate Bay trial have made further amendments to the charge sheet in the hope of nailing a conviction against the defendants.

According to Swedish online news service The Local, prosecutors have once again adjusted the language in the indictment.

It requested that the following sentence describing the alleged crimes committed by The Pirate Bay be erased from the charge sheet in the district court in Stockholm: “All components are necessary for users of the service are able to share files with one another.”

Additionally, prosecutors representing the likes of MGM, Sony and other big players in the entertainment biz world had the phrase “provide the ability to others to upload torrent files to the service” changed to “provide the ability to others to upload and store torrent files to the service”.

It’s understood that the move was made to help prosecutors secure a conviction against Peter Sunde, Carl Lundström, Frederik Neij and Gottfrid Svartholm Warg, four of the key men behind the infamous torrent tracker site. If found guilty of the charges, the co-founders face up to two years in prison and fines of up to $180,000.

This is the latest adjustment. Just last week Håkan Roswall, who is chief prosecutor in the trial, dramatically dropped all charges of copyright infringement against The Pirate Bay.

Meanwhile, the International Federation of the Phonographic Industry's CEO John Kennedy took to the stand today to dispute claims that Google offered easily obtainable showbiz goodies in the same way as The Pirate Bay tracker did.

“We talk to Google all the time about preventing piracy. If you go to Google and type in Coldplay you get 40 million results - press stories, legal Coldplay music, review, appraisals of concerts/records," said Kennedy, according to TorrentFreak.

"If you go to Pirate Bay you will get less than 1000 results, all of which give you access to illegal music or videos. Unfortunately The Pirate Bay does what it says in its description and its main aim is to make available unauthorised material. It filters fake material, it authorises, it induces.”

He said the IFPI had spent around £75m on its global fight against piracy. Kennedy, who has headed at IPFI since 1996, also admitted that he only understood BitTorrent technology in "very vague terms."

The case continues and is expected to conclude next Monday, 2 March. ®

Providing a secure and efficient Helpdesk

More from The Register

next story
WHY did Sunday Mirror stoop to slurping selfies for smut sting?
Tabloid splashes, MP resigns - but there's a BIG copyright issue here
Spies, avert eyes! Tim Berners-Lee demands a UK digital bill of rights
Lobbies tetchy MPs 'to end indiscriminate online surveillance'
How the FLAC do I tell MP3s from lossless audio?
Can you hear the difference? Can anyone?
Google hits back at 'Dear Rupert' over search dominance claims
Choc Factory sniffs: 'We're not pirate-lovers - also, you publish The Sun'
Inequality increasing? BOLLOCKS! You heard me: 'Screw the 1%'
There's morality and then there's economics ...
While you queued for an iPhone 6, Apple's Cook sold shares worth $35m
Right before the stock took a 3.8% dive amid bent and broken mobe drama
prev story

Whitepapers

Providing a secure and efficient Helpdesk
A single remote control platform for user support is be key to providing an efficient helpdesk. Retain full control over the way in which screen and keystroke data is transmitted.
Intelligent flash storage arrays
Tegile Intelligent Storage Arrays with IntelliFlash helps IT boost storage utilization and effciency while delivering unmatched storage savings and performance.
Beginner's guide to SSL certificates
De-mystify the technology involved and give you the information you need to make the best decision when considering your online security options.
Security for virtualized datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.
Secure remote control for conventional and virtual desktops
Balancing user privacy and privileged access, in accordance with compliance frameworks and legislation. Evaluating any potential remote control choice.