Feeds

TPB 4 face prosecutor's wrath

The Pirate Bay plaintiff 'stands firm' on original verdict as appeal continues

Next gen security for virtualised datacentres

The prosecutor in The Pirate Bay case stands by the original verdict meted out to the defendants last year and claimed today that the four co-founders of the BitTorrent tracker site had “engaged in contempt of court”.

TPB’s appeal trial ends late this week and ahead of that the prosecution spent much of this morning summing up the case (in Swedish) at the Svea Court of Appeal in Stockholm, Sweden.

Prosecutor Håkan Roswall said that he saw no grounds for changing the one-year prison sentence verdict that followed April 2009’s high-profile trial against Peter Sunde, Carl Lundström, Fredrik Neij and Gottfrid Svartholm Warg.

Roswall alleged that the men continued to run the TPB site, despite the defendants denying any recent connection with it.

"Three days after the police's major crackdown on The Pirate Bay, they resumed operations," he said.

The prosecutor claimed new evidence involving a separate hearing with Neij, who was not present at the start of the appeal, had strengthened the case against the TPB men.

"Lundström had a strong commitment. He participated in the planning and development of the site and acted as an adviser," Roswall added.

The Pirate Bay mouthpiece Sunde, AKA BrokeP, told us in April this year that Lundström had "wanted to invest in [TPB] but there was never a company set up, never an organisation. He never paid anything in the set up of The Pirate Bay. There was no need for him to pay."

When quizzed by The Register about how much money the men had made out of the operation, Sunde said: "I can’t prove that I don’t have a bank account somewhere with lots of money. And it’s kinda the same for Carl [Lundström], he can’t prove he’s not part of this if the media says he’s part of this. We don't have proof for something we haven’t done."

The trial continues and is expected to conclude on Friday, 15 October. ®

The essential guide to IT transformation

More from The Register

next story
Munich considers dumping Linux for ... GULP ... Windows!
Give a penguinista a hug, the Outlook's not good for open source's poster child
UK fuzz want PINCODES on ALL mobile phones
Met Police calls for mandatory passwords on all new mobes
e-Borders fiasco: Brits stung for £224m after US IT giant sues UK govt
Defeat to Raytheon branded 'catastrophic result'
EU justice chief blasts Google on 'right to be forgotten'
Don't pretend it's a freedom of speech issue – interim commish
Detroit losing MILLIONS because it buys CHEAP BATTERIES – report
Man at hardware store was right: name brands DO last longer
Snowden on NSA's MonsterMind TERROR: It may trigger cyberwar
Plus: Syria's internet going down? That was a US cock-up
UK government accused of hiding TRUTH about Universal Credit fiasco
'Reset rating keeps secrets on one-dole-to-rule-them-all plan', say MPs
Caught red-handed: UK cops, PCSOs, specials behaving badly… on social media
No Mr Fuzz, don't ask a crime victim to be your pal on Facebook
Yes, but what are your plans if a DRAGON attacks?
Local UK gov outs most ridiculous FoI requests...
This'll end well: US govt says car-to-car jibber-jabber will SAVE lives
Department of Transportation starts cogs turning for another wireless comms standard
prev story

Whitepapers

5 things you didn’t know about cloud backup
IT departments are embracing cloud backup, but there’s a lot you need to know before choosing a service provider. Learn all the critical things you need to know.
Implementing global e-invoicing with guaranteed legal certainty
Explaining the role local tax compliance plays in successful supply chain management and e-business and how leading global brands are addressing this.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Rethinking backup and recovery in the modern data center
Combining intelligence, operational analytics, and automation to enable efficient, data-driven IT organizations using the HP ABR approach.
Next gen security for virtualised datacentres
Legacy security solutions are inefficient due to the architectural differences between physical and virtual environments.