Feeds

LimeWire induces infringement, Judge rules

Shown to profit from illegal file sharing

Eight steps to building an HP BladeSystem

A US District Court has has ruled that the company behind the LimeWire P2P software is responsible for inducing copyright infringement, even though the software theoretically has quite legitimate, non-infringing uses. It's likely to be the end for the company, which markets the most popular file sharing client worldwide.

The judgement is substantially based on the 2005 Grokster ruling, which established a standard for secondary copyright infringement. This is where a party did not make material available, but gave others a means to do so, encouraged the activity, and profited from it. So the clinching argument - that the software was tied to an unlicensed service, unlike a 'neutral' file sharing programs (such as a generic FTP client, for example) - came as no surprise.

"Plaintiffs have presented significant evidence showing that LW purposefully marketed LimeWire to individuals who were known to use file-sharing programs to share copyrighted recordings, or who expressed an interest in doing so," ruled Judge Kimba Wood in New York. The case was filed by 13 record labels owned by two majors, Sony and Warner, in 2006.

Establishing that LimeWire profited from the infringement wasn't difficult, either. The Judge accepted a study that showed over 98 percent of material being exchanged through LimeWire was not licensed for distribution, rejecting LimeWire's claims that it was not liable.

Summing up, Wood concluded:

"[T]he following factors, taken together, establish that LW intended to encourage infringement by distributing LimeWire: (1) LW’s awareness of substantial infringement by users; (2) LW’s efforts to attract infringing users; (3) LW’s efforts to enable and assist users to commit infringement; (4) LW’s dependence on infringing use for the success of its business; and (5) LW’s failure to mitigate infringing activities."

LimeWire CEO George Searle said in a statement he looked forward to "working with the entire music industry" to create innovative new services. But it might be a bit late for that. In one of the most intriguing but poorly documented stories in the history of the copyright wars, the major labels agreed to an experiment where P2P services could be encouraged. Companies could use fingerprinting software from Shawn Fanning's next company after the original Napster, Snocap, and the experiment became known as the 'Big Switch'.

"Let's take advantage of all those people who like us [Napster] and are connected and are largely music fans - the hacker boy side, the spyware distributors hadn't come into the picture yet," Snocap's former attorney Chris Castle explained here.

But of all the P2P operators, only former Grokster boss Wayne Rosso wanted to take it seriously, says Castle. The others were terrified of the responsibility of going legit, and too unimaginative to see how a business could work.

"These P2P operators looked like little teenage boys who had suddenly realized they weren't going to drive the car this weekend", Castle now recalls.

Instead, the LimeWires put their faith in the courts finding them a loophole, a belief based on the hope that the internet would be beyond the norms of copyright.

Alas, that strategy hasn't worked out too well. Today we have legal pseudo file sharing via Spotify: the software is making copies in the background of other Spotify users' songs. But it's tantalising to imagine what we might have had now, had history played out differently. And how much wealthier artists and investors might be, too. ®

Bridging the IT gap between rising business demands and ageing tools

More from The Register

next story
Auntie remains MYSTIFIED by that weekend BBC iPlayer and website outage
Still doing 'forensics' on the caching layer – Beeb digi wonk
Apple orders huge MOUNTAIN of 80 MILLION 'Air' iPhone 6s
Bigger, harder trouser bulges foretold for fanbois
GoTenna: How does this 'magic' work?
An ideal product if you believe the Earth is flat
Telstra to KILL 2G network by end of 2016
GSM now stands for Grave-Seeking-Mobile network
Seeking LTE expert to insert small cells into BT customers' places
Is this the first step to a FON-a-like 4G network?
Yorkshire cops fail to grasp principle behind BT Fon Wi-Fi network
'Prevent people that are passing by to hook up to your network', pleads plod
BlackBerry: Toss the server, mate... BES is in the CLOUD now
BlackBerry Enterprise Services takes aim at SMEs - but there's a catch
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Boost IT visibility and business value
How building a great service catalog relieves pressure points and demonstrates the value of IT service management.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.