Feeds

Cinema iPhone pirate escapes jail in test case appeal

'Looks bad for us, but it's not', say pirate-botherers

Reducing security risks from open source software

A Harrow man who was thrown in jail for six months for fraudulently filming Hollywood films at a Vue cinema saw his sentence successfully quashed on appeal to a 12-month community order.

Emmanuel Nimley, 22, of Lincoln Road in Harrow, North West London, had his case heard at the Criminal Court of Appeal on Wednesday (20 October).

He was given a 12-month community order and told to carry out 120 hours of unpaid work during that period, the court told The Register.

In August Nimley, who distributed his illegal wares online, pleaded guilty to 10 charges under sections six and seven of the 2006 Fraud Act, and section 107/1(e) of the 1998 Copyright Designs and Patents Act.

Last month he was handed jail time, after being caught and arrested for using his iPhone to take a blurry recording of The Bounty Hunter in March this year.

He had also previously recorded The Crazies, Alice In Wonderland and The Green Zone.

When Nimley was jailed in September, the Federation Against Copyright Theft (FACT) excitedly proclaimed that the case heralded the first such sentence of its kind in the UK.

There have been recent successful court actions against the recordings of films in Blighty cinemas, with prosecutors citing the Fraud Act. But Nimley’s sentence was seen as a big win for FACT.

So seeing that jail term removed from the Harrow pirate’s conviction has got to hurt, hasn’t it?

“This is still a successful criminal conviction for illegal recording in a cinema,” FACT’s top flack Eddy Leviten told El Reg this morning.

“It’s the first conviction of its kind and vindicates the use of the Fraud Act. Judges considered the case very carefully and they had no issue with the legal process, nor the arrest.”

Leviten, who was present in court on Wednesday, said Nimley’s successful appeal against the jail term had been won based on his age and the argument that there was no risk he would re-offend.

But he added that only the sentence and not the conviction had been lessened.

“It looks like a bad result for us, but it’s not,” said Leviten. ®

Bootnote

Hat tip goes to Adam Banks, who blogged about the case here, for bringing the appeal to our attention.

Mobile application security vulnerability report

More from The Register

next story
LibreSSL RNG bug fix: What's all the forking fuss about, ask devs
Blow to bit-spitter 'tis but a flesh wound, claim team
Microsoft: You NEED bad passwords and should re-use them a lot
Dirty QWERTY a perfect P@ssword1 for garbage websites
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
NUDE SNAPS AGENCY: NSA bods love 'showing off your saucy selfies'
Swapping other people's sexts is a fringe benefit, says Snowden
L33t haxxors compete to p0wn popular home routers
EFF-endorsed SOHOpelessly Broken challenge will air routers' dirty zero day laundry
Own a Cisco modem or wireless gateway? It might be owned by someone else, too
Remote code exec in HTTP server hands kit to bad guys
British data cops: We need greater powers and more money
You want data butt kicking, we need bigger boots - ICO
Crooks fling banking Trojan at Japanese smut site fans
Wait - they're doing online banking with an unpatched Windows PC?
prev story

Whitepapers

Top three mobile application threats
Prevent sensitive data leakage over insecure channels or stolen mobile devices.
The Essential Guide to IT Transformation
ServiceNow discusses three IT transformations that can help CIO's automate IT services to transform IT and the enterprise.
Mobile application security vulnerability report
The alarming realities regarding the sheer number of applications vulnerable to attack, and the most common and easily addressable vulnerability errors.
How modern custom applications can spur business growth
Learn how to create, deploy and manage custom applications without consuming or expanding the need for scarce, expensive IT resources.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.