Feeds

Kim Dotcom claims entrapment by US authorities

Megaupload accused of holding files said to be held for another piracy case

SANS - Survey on application security programs

Kim Dotcom says he is about to go on the offensive, after the news that some of the files prosecutors allege Megaupload.com knew were pirated and did not remove were only present because courts had asked they be retained to assist another investigation.

Dotcom's new assault will be based on revelations that megaupload actively co-operated with US authorities on several piracy cases, one of which concerned an outfit named NinjaVideo that used megaupload to store some its files. Megaupload was asked by the US Department of Justice (DoJ) to preserve those files, to assist the ongoing investigation.

Later, the same files were listed among those said to be examples of megaupload hosting pirated files.

The argument isn't that simple, as Megaupload retained the NinjaVideo files, but copies of the same files were also found elsewhere on its servers.

Megaupload's lawyers argue it could not have deleted all the copies of the files in question, as doing so could have damaged the DoJ's case. The DoJ argues that Megaupload's involvement in the NinjaVideo case should have told Dotcom enough about the the provenance of the contentious files to make it obvious they were pirated and therefore worthy of deletion.

Dotcom has taken to Twitter to express his anger about this turn of events, labelling the DoJ “... a gang of rogue US attorneys out of control” and sharing his lawyer's opinion that “We can sue the US govt or MPAA members for $2.6 billion in damages for the destruction of your businesses." Funding to run that lawsuit, he says, is imminent and he looks forward to taking the fight back to the DoJ.

The flamboyant figure has also named a time and date - 20 January 2013 at 6:48am NZ time – the first anniversary of the raid that started the saga, for the launch of his new service. ®

High performance access to file storage

More from The Register

next story
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
Edward Snowden on his Putin TV appearance: 'Why all the criticism?'
Denies Q&A cameo was meant to slam US, big-up Russia
Judge halts spread of zombie Nortel patents to Texas in Google trial
Epic Rockstar patent war to be waged in California
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.