Feeds

LimeWire induces infringement, Judge rules

Shown to profit from illegal file sharing

Internet Security Threat Report 2014

A US District Court has has ruled that the company behind the LimeWire P2P software is responsible for inducing copyright infringement, even though the software theoretically has quite legitimate, non-infringing uses. It's likely to be the end for the company, which markets the most popular file sharing client worldwide.

The judgement is substantially based on the 2005 Grokster ruling, which established a standard for secondary copyright infringement. This is where a party did not make material available, but gave others a means to do so, encouraged the activity, and profited from it. So the clinching argument - that the software was tied to an unlicensed service, unlike a 'neutral' file sharing programs (such as a generic FTP client, for example) - came as no surprise.

"Plaintiffs have presented significant evidence showing that LW purposefully marketed LimeWire to individuals who were known to use file-sharing programs to share copyrighted recordings, or who expressed an interest in doing so," ruled Judge Kimba Wood in New York. The case was filed by 13 record labels owned by two majors, Sony and Warner, in 2006.

Establishing that LimeWire profited from the infringement wasn't difficult, either. The Judge accepted a study that showed over 98 percent of material being exchanged through LimeWire was not licensed for distribution, rejecting LimeWire's claims that it was not liable.

Summing up, Wood concluded:

"[T]he following factors, taken together, establish that LW intended to encourage infringement by distributing LimeWire: (1) LW’s awareness of substantial infringement by users; (2) LW’s efforts to attract infringing users; (3) LW’s efforts to enable and assist users to commit infringement; (4) LW’s dependence on infringing use for the success of its business; and (5) LW’s failure to mitigate infringing activities."

LimeWire CEO George Searle said in a statement he looked forward to "working with the entire music industry" to create innovative new services. But it might be a bit late for that. In one of the most intriguing but poorly documented stories in the history of the copyright wars, the major labels agreed to an experiment where P2P services could be encouraged. Companies could use fingerprinting software from Shawn Fanning's next company after the original Napster, Snocap, and the experiment became known as the 'Big Switch'.

"Let's take advantage of all those people who like us [Napster] and are connected and are largely music fans - the hacker boy side, the spyware distributors hadn't come into the picture yet," Snocap's former attorney Chris Castle explained here.

But of all the P2P operators, only former Grokster boss Wayne Rosso wanted to take it seriously, says Castle. The others were terrified of the responsibility of going legit, and too unimaginative to see how a business could work.

"These P2P operators looked like little teenage boys who had suddenly realized they weren't going to drive the car this weekend", Castle now recalls.

Instead, the LimeWires put their faith in the courts finding them a loophole, a belief based on the hope that the internet would be beyond the norms of copyright.

Alas, that strategy hasn't worked out too well. Today we have legal pseudo file sharing via Spotify: the software is making copies in the background of other Spotify users' songs. But it's tantalising to imagine what we might have had now, had history played out differently. And how much wealthier artists and investors might be, too. ®

Internet Security Threat Report 2014

More from The Register

next story
You! AT&T! The only thing 'unlimited' about you is your CHEEK, growl feds
Man, we did everything but knock on their doors - carrier
The DRUGSTORES DON'T WORK, CVS makes IT WORSE ... for Apple Pay
Goog Wallet apparently also spurned in NFC lockdown
Watch out, Samsung and Apple: Xiaomi's No 3 in smartphones now
From obscurity to selling 19 million mobes a quarter
Wanna hop carriers with your iPad's Apple SIM? AVOID AT&T
Unless you want your network-swapping tech disabled for good, that is
Brazil greenlights $200m internet cable to Europe in bid to outfox NSA
Only one problem: it won't make the slightest difference. And they know it
Knocking Knox: Samsung DENIES vuln claims, says mysterious blogger is a JOKER
But YES, system does store encryption key on the device
prev story

Whitepapers

Why and how to choose the right cloud vendor
The benefits of cloud-based storage in your processes. Eliminate onsite, disk-based backup and archiving in favor of cloud-based data protection.
Getting started with customer-focused identity management
Learn why identity is a fundamental requirement to digital growth, and how without it there is no way to identify and engage customers in a meaningful way.
High Performance for All
While HPC is not new, it has traditionally been seen as a specialist area – is it now geared up to meet more mainstream requirements?
Storage capacity and performance optimization at Mizuno USA
Mizuno USA turn to Tegile storage technology to solve both their SAN and backup issues.
Internet Security Threat Report 2014
An overview and analysis of the year in global threat activity: identify, analyze, and provide commentary on emerging trends in the dynamic threat landscape.