Megaupload legal case

The seized domain name redirects to this joint FBI, DoJ, and NIPRCC English notice of federal crime charges

The Megaupload legal case concerns a number of related criminal indictments and enforcement actions taken against Megaupload owner Kim Dotcom in various jurisdictions. On 19 January 2012 the United States Department of Justice seized and shut down the file-hosting site Megaupload.com and commenced criminal cases against its owners and others. On 20 January Hong Kong Customs froze more than 300 million Hong Kong dollars (US$39 million) in assets belonging to the company.[1]

Arrests in New Zealand

Acting upon a US Federal prosecutor's request, the New Zealand Police arrested Dotcom and three other Megaupload executives in a leased $30 million mansion at Coatesville near Auckland on Friday, 20 January 2012 (NZDT, UTC+13).[2] This was pursuant to a request from the U.S. Federal Bureau of Investigation that the four be extradited for racketeering and money laundering.[3] The raid was timed for the birthday celebration of Dotcom.[4] Assets worth $17 million including art works and cars were seized. The four men arrested were Kim Dotcom (founder; 38 years old, from Germany), Finn Batato (Chief marketing officer (CMO); 38, from Germany), Mathias Ortmann (Chief technology officer (CTO) and co-founder; 40, from Germany) and Bram van der Kolk (29, from the Netherlands).[5][6][7][8] The number of police officers involved in this operation was about 80 according to Dotcom[9] or 20 to 30 according to the New Zealand police.[10]

On 23 January, Dotcom appeared in Auckland's North Shore District Court for a bail hearing. The crown argued against bail on the basis that he was a flight risk with a helicopter on his front lawn, while defence lawyers argued that the helicopter could not fly far enough to reach another country. They also said that Dotcom denied any criminal wrongdoing. Judge David McNaughton expressed concern at the discovery of two shotguns at Dotcom's mansion during the police raid,[11] and deferred a decision on whether to grant bail, saying that he needed more time to review the submissions.[12] The request for bail was turned down, with Judge McNaughton saying that "he was denied due to the risk [that] Mr. Dotcom would flee jurisdiction and the possibility that if he reached Germany he wouldn’t be extradited to face the charges".[13] On 3 February 2012, an appeal to the High Court of New Zealand upheld the decision to deny bail.[14]

On 22 February 2012, North Shore District Court Judge Nevin Dawson overturned the previous rulings and granted bail to Kim Dotcom,[15] saying that the risk of flight had diminished after his assets had been seized.[16]

On 5 March 2012, a formal request for the extradition to the United States of Kim Dotcom and three other senior Megaupload staff was filed in a New Zealand court.[17]

On 30 April 2012, the New Zealand High Court ruled that around $750,000 of Kim Dotcom's assets could be returned, including a Mercedes-Benz G55 AMG and Toyota Vellfire that had been seized during the raid on his home. The assets in 63 bank accounts and around thirty other vehicles remained in custody.[18] A paperwork error by the New Zealand authorities meant that Kim Dotcom's property had been seized in January 2012 without giving proper notice. The restraining order on his property was granted in April 2012. During April 2012, US district court judge Liam O'Grady stated "I frankly don't know that we are ever going to have a trial in this matter," as he found out that the company had never been formally served with criminal papers by the US.[19]

On 28 June 2012, New Zealand High Court judge Justice Helen Winkelmann ruled that the search warrants used to raid the home of Kim Dotcom were invalid, saying "The warrants did not adequately describe the offences to which they related. They were general warrants, and as such, are invalid."[20]

On 10 July 2012, a decision on whether Kim Dotcom and other Megaupload employees should be extradited to the United States was delayed until March 2013, in order to allow further time for legal arguments to be heard.[21] In December 2012, it was delayed until August 2013.[22]

In March 2013, Dotcom won a Court of Appeal ruling allowing him to sue the Government Communications Security Bureau (GCSB),[23][24] rejecting the attorney-general's appeal against a ruling in December, 2012.[25][26]

On 19 February 2014, a New Zealand appeals court overruled the 28 June 2012 decision, declaring the search warrants against Kim Dotcom to be valid. Dotcom's extradition hearing is currently set for July 2014.[27]

On 8 September 2014, the Court of Appeal ruled that the New Zealand Police is to return seized electronic devices unencrypted back to Dotcom and those involved.[28]

Basis of indictment

The first page of the indictment, listing the defendants.[29]

The indictment[29][30] alleged that Megaupload differed from other online file storage businesses.

Media reports covering the case highlighted a number of points from the indictment used to support claims of illegal activity. The indictment provided a number of instances alleged to show criminal behaviour, as well as indicating design points of Megaupload's operating model as being evidence of criminal intent:[29]

  1. In practice, the "vast majority" of users do not have any significant long term private storage capability. Continued storage is dependent upon regular downloads of the file occurring. Files not downloaded are rapidly removed in most cases, whereas popular downloaded files are retained. (items 7 – 8)
  2. Because only a small portion of users pay for storage, the business is dependent upon advertising. Adverts are primarily viewed when files are downloaded and the business model is therefore not based upon storage but upon maximising downloads. (items 7 – 8)
  3. Persons indicted have "instructed individual users how to locate links to infringing content on the Mega Sites ... [and] ... have also shared with each other comments from Mega Site users demonstrating that they have used or are attempting to use the Mega Sites to get infringing copies of copyrighted content." (item 13)
  4. Persons indicted, unlike the public, are not reliant upon links to stored files, but can search the internal database directly. It is claimed they have "searched the internal database for their associates and themselves so that they may directly access copyright-infringing content". (item 14)
  5. A comprehensive takedown method is in use to identify child pornography, but not deployed to remove infringing content. (item 24)
  6. Infringing users did not have their accounts terminated, and the defendants "made no significant effort to identify users who were using the Mega Sites or services to infringe copyrights, to prevent the uploading of infringing copies of copyrighted materials, or to identify infringing copies of copyrighted works" (item 55–56)
  7. An incentivising program was adopted encouraging the upload of "popular" files in return for payments to successful uploaders. (item 69e et al.)
  8. Defendants explicitly discussed evasion and infringement issues, including an attempt to copy and upload the entire content of YouTube. (items 69i-l. YouTube: items 69 i,j,l,s)

Counter arguments advanced

Schmitz hired the services of Ira Rothken, an attorney who defended several copyright infringement cases. Rothken claims that the raid was unjustly swift and did not give his client the opportunity to defend himself, quoting a similar case involving YouTube as an example of a completely different turnout.[31][32]

Legal commentators point out that while the indictment may be correct and Megaupload might have acted as a criminal conspiracy as claimed, a number of points in the indictment are based upon selective interpretations and legal concepts (described in one article as "novel theories" of the law[33]) and could be challenged in court. An L.A. Times analysis stated that the author was "struck by how far the indictment goes to find something nefarious";[33] likewise a TechDirt analysis concluded that while the founder of Megaupload had a significant history of "flaunting the law", evidence has potentially been taken out of context or misrepresented and could "come back to haunt other online services who are providing perfectly legitimate services".[34] Both analyses concur that other evidence could show criminality; the concerns were not irrefutable. The legal concerns included:

  • Indictment cites lack of a site search as evidence supporting criminality, but in other copyright cases having a site search has been described as evidence in support of criminality and in Atari v. RapidShare not having a site search was agreed by the court as evidence of responsible activity given that some infringing content might exist and be searched for if one existed.[33] In the case of Isohunt, the presence of a search feature was interpreted as evidence of inducement.[34] TechDirt commented that "To use the lack of a feature, that previously was shown to be a problem, as evidence of a conspiracy is crazy. Damned if you do, damned if you don't."[34]
  • The "top 100" list excluded copyrighted titles, but the indictment claims this was evidence of concealing, rather than avoiding downloads of, infringing materials.[33][34]
  • The indictment asserts as evidence that no effort was made to identify infringing files or users, in other words by acts of omission. But federal court rulings repeatedly agree that no duty exists to search these out.[33] In particular, in MGM Studios, Inc. v. Grokster, Ltd. the Supreme Court looked at "substantial noninfringing uses"; mere lack of monitoring was not by itself sufficient to show wrongdoing or inducement.[33] It may not be possible (or reasonable to require) the host to know and identify what activity is legitimate or not, as file sharing may be used by many content creators.[34]
  • Deletion after a limited period of non-download is suggested as evidence of a motive. But many legitimate sites such as Imgur remove unused content after a while to free up server space. If files were routinely deleted after a short period it could equally suggest legitimate use - because it serves users who share legitimately for a short while, and enforces removal afterwards.[34]
  • Much of the indictment, in the words of one analysis, "seems to be based on the simple assumption that encouraging more usage means they must be encouraging infringement", in other words there should be evidence of actual wrongdoing, not merely evidence of popular use. Many legitimate files are popular and popularly shared, and an assumption that paid use largely equates to infringing use would need evidence.[34]
  • Failure to remove all links following a takedown request is often legitimate. For example the same content may be uploaded by legitimate and illegitimate users. Removing the infringing link does not affect legitimate uploaders. Removing the infringing file would wrongfully cause it to be deleted for legitimate users too.[34] Similarly, once child pornography is identified, it is always illegal for all users. But other material may be legal for some users and not for others. So the fact one case requires file removal and the other only requires link removal may well be correct conduct.[34]
  • The indictment includes money laundering charges. But these include "basic payments" for web hosting, suggesting "lumping in" — adding matters that are in no way illegal to make a case look bad.[34]
  • Megaupload had indicated willingness to attend court in the U.S. already, and answer civil cases.[34]

Safe harbor provisions

The US Digital Millennium Copyright Act provides safe harbor for sites that promptly take down infringing content. Safe harbor does not exist if the site has actual knowledge and does nothing about it.[35]

In Megaupload's case, the indictment alleges DMCA provisions were used for the appearance of legitimacy – the actual material was not removed, only some links to it were, takedowns agreement was approved based on business growth rather than infringement, and the parties themselves openly discussed their infringing activities. The indictment claims that Megaupload executives:

"... are willfully infringing copyrights themselves on these systems; have actual knowledge that the materials on their systems are infringing (or alternatively know facts or circumstances that would make infringing material apparent); receive a financial benefit directly attributable to copyright-infringing activity where the provider can control that activity; and have not removed, or disabled access to, known copyright infringing material from servers they control."[36]

Prosecutors claimed in the indictment that Megaupload was not DMCA compliant, and cited the example of an alleged infringer on the site known as "VV." Over six years, VV had allegedly uploaded nearly 17,000 files to Megavideo.com, resulting in more than 334 million views. According to prosecutors, although numerous takedown e-mails had been sent, none of the files had been deleted.[37]

In a television interview with 3 News, Kim Dotcom denied being a "piracy king", and claimed that Megaupload had applied the provisions of the DMCA and went beyond it, by giving copyright holders direct rights to delete links. He also claimed that the indictment relied on a malicious interpretation of technical issues to construe its claim of criminal intent, and that there was significant legal use of Megaupload.[38]

Criminal defense action

Kim Dotcom denied the charges filed against him, and retained the services of Ira P. Rothken, an attorney who has defended several copyright infringement cases. Ira Rothken stated that there is no criminal liability for secondary copyright infringement under US law, quoting a similar case involving YouTube as an example of similar accusations which were dealt with as a civil case.[31][32]

Dotcom initially hired Washington, D.C. attorney Robert Bennett, who had confirmed that he was going to represent Megaupload in the piracy case.[39][40] On 22 January 2012, Bennett withdrew from the case due to a conflict of interest with another client.[41][42] As of 23 January, barrister Paul Davison QC was quoted as representing Megaupload's founder, Kim Dotcom, in New Zealand.[43][44] At the end of April 2012, a controversy emerged over legal representation. The law firm Quinn Emanuel, retained by Megaupload to argue for the retention of Megaupload's data, claimed in a motion filed to the court that there was a concerted effort by the United States Department of Justice to deny Megaupload fair legal representation. In the brief, Quinn Emanuel alleged that several law firms had dropped out of the case after the DoJ wrote to them over potential conflicts of interest, arguing that they wanted to call clients of the firms as witnesses. Given the size of the Megaupload, Quinn Emanuel claimed that this "conflict of interest" argument could be applied to any law firm with experience in intellectual property rights, denying Megaupload experienced representation in a case where both law and technical issues are involved. Quinn Emanuel received such a letter but rejected the DoJ's arguments.[45]

Techdirt argued that while the founder of Megaupload had a significant history of "flouting the law", evidence had potentially been taken out of context or misrepresented and could "come back to haunt other online services who are providing perfectly legitimate services".[34] Eric Goldman, a professor of law at Santa Clara University, described the Megaupload case as "a depressing display of abuse of government authority". He pointed out that criminal copyright infringement requires that willful infringement has taken place, and that taking Megaupload offline had produced the "deeply unconstitutional effect" of denying legitimate users of the site access to their data.[46] Other legal commentators have disagreed with Goldman's assessment of the copyright charges, concluding that the allegations in the indictment, if proven, would support a guilty finding on charges of aiding and abetting copyright infringement.[47] Professor James Grimmelmann, for example, commented, "If proven at trial, there's easily enough in the indictment to prove criminal copyright infringement many times over."[48]

The defense has drawn on procedural errors by the prosecution to challenge the case. In a judgement in the end of May, NZ Judge David Harvey granted the defendants the right to the disclosure of evidence against them held by the FBI in preparation for the extradition trial.[49] In his 81-page decision, he came to the assessment that the DoJ is attempting to use concepts of civil law, in particular secondary copyright infringement, in a criminal case, which creates legal issues. He also confirmed that the charges in the indictment relating to money laundering, racketeering and wire fraud are not separate criminal acts but dependent on the claim of criminal secondary copyright infringement.[50] In a separate development in the United States, the defense has challenged the case against Megaupload as a whole, claiming that the US has no jurisdiction over a foreign company and that the seizure of Megaupload's assets was unlawful.[51] A second brief points out numerous legal errors in the indictment, declaring it "an experiment in stretching U.S. criminal law well past the breaking point." [52]

Data retention

Following the seizure of Megaupload, concerns were raised as to what would happen to the files that had been uploaded by its users.[53] On 20 January 2012, the Justice Department stated that "It is important to note that Mega clearly warned users to keep copies of any files they uploaded" adding that "Megaupload.com expressly informed users through its Frequently Asked Questions ('FAQs') and its Terms of Service that users have no proprietary interest in any of the files on Megaupload's servers, they assume the full risk of complete loss or unavailability of their data, and that Megaupload can terminate site operations without prior notice."[54] On 27 January 2012, U.S. Attorney Neil H. MacBride wrote:

The Mega Servers are not in the actual or constructive custody or control of the United States, but remain at the premises controlled by, and currently under the control of, Carpathia and Cogent. Should the defendants wish to obtain independent access to the Mega Servers, or coordinate third-party access to data housed on Mega Servers, the issue must be resolved directly with Cogent or Carpathia.[55][56]

In response, on 30 January 2012, Carpathia Hosting denied having access to MegaUpload files and issued a press release stating

Carpathia Hosting does not have, and has never had, access to the content on MegaUpload servers and has no mechanism for returning any content residing on such servers to MegaUpload’s customers. The reference to the 2 February 2012 date in the Department of Justice letter for the deletion of content is not based on any information provided by Carpathia to the U.S. Government. We would recommend that anyone who believes that they have content on MegaUpload servers contact MegaUpload. Please do not contact Carpathia Hosting.[57][58]

The Electronic Frontier Foundation has started a campaign to allow legitimate users of Megaupload in the US access to their data and wants the data preserved for that reason. It has chosen to represent one such legitimate user in court and thus has sided with Megaupload and Carpathia in asking the court to retain the data.[59]

On 26 April 2012, Megaupload data negotiations began. Carpathia reported that maintaining the data costs over 9,000 USD a day, and wanted to seek a formal resolution on whether to delete the data or release it to interested parties. United States district court Judge Liam O'Grady ordered all parties to return to the negotiating table. The U.S. Department of Justice noted that 35 million USD had been paid by Megaupload to Carpathia, and alleged that Carpathia had knowingly profited from copyright infringement.[60]

Retaliatory attacks by Anonymous

Following the shutdown of the Megaupload website, the website of the United States Department of Justice and a number of other websites were taken offline following concerted denial of service attacks attributed to Anonymous.[61][62][63]

Gizmodo concurred that it was "almost certainly the result of a quickly assembled DDoS [Distributed Denial of Service] attack—and easily the widest in scope and ferocity we've seen in some time", commenting that "if you had any doubts Anonymous is still a hacker wrecking ball, doubt no more".[64] Links posted in chatrooms and on Twitter, when clicked on by unsuspecting Internet users, ran a web version of the application known as the Low Orbit Ion Cannon. On 19 January 2012, Anonymous released a statement on Pastebin.com accepting responsibility of the mass attacks on websites including those of RIAA, MPAA, BMI, FBI, and others.[65] According to the Russian state-run[66][67] RT network, Anonymous described the attacks as "the single largest Internet attack in its history".[64][68]

Other reactions

Former French president Nicolas Sarkozy said he was satisfied with the shutdown of the website. He found the site's operators were reaping "criminal profits from the illegal distribution of copyrighted works". "The time has come for increased judicial and police co-operation between states" in the fight against online piracy, he said in a statement.[69]

Web organisations have raised concerns about possible effects of the Megaupload case on the future of file sharing, cloud storage, and Internet commerce.[70][71][72] Various commentators including John C. Dvorak, Glenn Greenwald, and Julian Sanchez have written on the topic as well, particularly as it relates US government powers to take down a web site without a trial, even without new laws like SOPA.[73][74][75][76] In fact, the U.S. Dept of Justice was able to rely on PRO-IP, a law passed back in 2008, in order to shut down Megaupload.[77]

People who used Megaupload for personal and business storage, such as large audio and video files for family and work, have also voiced their complaints about the fact that they no longer had access to their files on the service.[78][79] Examples cited in the media included staff at public interest group Public Knowledge who used it for large files, and Android cellphone software writers who described it as "one of the best ways to distribute [software] ... There are a number of similar sites for this use, but Megaupload was always the fastest".[78]

In response to the shutdown, a number of other file hosting websites changed the functionality of their services. FileSonic.com, one of the top ten file hosting services, withdrew the ability to share links to files. The site's main page added a banner stating "All sharing functionality on FileSonic is now disabled. Our service can only be used to upload and retrieve files that you have uploaded personally."[80] Other file hosting websites followed suit, including FileServe.com, FileJungle.com, Uploadstation.com, x7.to and 4shared.com, by shutting down, cancelling affiliate programs or allowing users to only download what they themselves uploaded.[81] Another large file-sharing website, Uploaded.to, ceased services for users accessing from United States-based IP addresses.[82] BTJunkie, a website indexing torrent files, shut down voluntarily on 6 February 2012.[83] The file hosting site Turbobit.net blocked access to U.S. visitors,[84] and QuickSilverScreen, a site offering streaming video links, closed on 7 February 2012.[85]

However, other file hosting companies felt no need to change, with MediaFire's CEO Derek Labian saying that he and his file hosting company are not concerned by the Megaupload incident because "Megaupload was making a ridiculous amount of money with a ridiculously bad service... We don’t have a business built on copyright infringement."[86] A spokesperson for RapidShare similarly expressed a lack of concern, saying that "file hosting itself is a legitimate business", pointing out that Microsoft's OneDrive operates on a similar basis.[87]

References

  1. Yung, Chester (21 January 2012). "Hong Kong Freezes Megaupload Assets". The Wall Street Journal. Retrieved 21 January 2012.
  2. "Megaupload founder arrested in NZ, site shut down". 20 January 2012. Retrieved 20 January 2012.
  3. Johnston, Kirsty (21 January 2012). "FBI seeks extradition of internet 'pirate'". Sydney Morning Herald. Retrieved 21 January 2012.
  4. Fisher, David (22 January 2012). "Dotcom birthday party targeted". The New Zealand Herald. Retrieved 22 January 2012.
  5. "Dotcom in New Zealand". 22 January 2012. Retrieved 22 January 2012.
  6. "Website fights back". 22 January 2012. Retrieved 22 January 2012.
  7. Leask, Anna (22 January 2012). "New Zealand police complete Dotcom search". The New Zealand Herald. Retrieved 22 January 2012.
  8. "Megaupload founder arrested in Auckland, site shut down". 3news.co.nz. 19 January 2012. Retrieved 19 January 2012.
  9. Fisher, David (5 February 2012). "Details of 'surprise assault' on Dotcom mansion". The New Zealand Herald.
  10. Hutchison, Jonathan (3 July 2012). "Megaupload Founder Goes From Arrest to Cult Hero". The New York Times.
  11. "Megaupload accused Kim Schmitz in court, helicopter part of bail debate". 3news.co.nz. 23 January 2012. Retrieved 23 January 2012.
  12. Craymer, Lucy (24 January 2012). "Judge Delays Kim Dotcom Bail Decision". Wall Street Journal. Retrieved 24 January 2012.
  13. "Megaupload Founder has been DENIED Bail". Wordswithmeaning.org. Retrieved 31 January 2012.
  14. "Megaupload co-founder's bail appeal rejected by court". BBC News. 3 February 2012. Retrieved 3 February 2012.
  15. "WordswithMeaning! - Kim Dotcom Released From Prison". WordswithMeaning!. Retrieved 11 May 2015.
  16. "Megaupload founder Kim Dotcom granted bail". BBC News. 22 February 2012. Retrieved 22 February 2012.
  17. "Megaupload founder extradition papers filed by US". BBC News. 5 March 2012. Retrieved 5 March 2012.
  18. "Megaupload Founder Kim Schmitz: Assets Worth $750,000 Returned". autoevolution.com. 30 April 2012. Retrieved 4 May 2012.
  19. Fisher, David (21 April 2012). "Dotcom trial may not occur - Judge". The New Zealand Herald. Retrieved 20 August 2012.
  20. "Megaupload raid warrant 'invalid', New Zealand judge says". BBC News. 28 June 2012. Retrieved 30 June 2012.
  21. "Megaupload extradition case delayed until March 2013". BBC News. 10 July 2012. Retrieved 10 July 2012.
  22. "Dotcom extradition case delayed until August". New Zealand Herald. 19 December 2012.
  23. "Dotcom wins right to sue Govt spies". 3 News NZ. 7 March 2013.
  24. "Dotcom wins right to sue". NZ Herald. 7 March 2013.
  25. "Crown wants GCSB exluded from Dotcom case". 3 News NZ. 7 March 2013.
  26. "Judge describes Dotcom case as a procedural mess". Radio NZ. 14 February 2013.
  27. Tajitsu, Naomi (18 January 2014). "NZ court rules Megaupload warrant legal, dealing blow to Dotcom". Reuters. Thompson Reuters. Retrieved 13 March 2014.
  28. Bayer, Kurt (8 September 2014). "A win for Dotcom over seized property". The New Zealand Herald. p. 1. Retrieved 9 September 2014.
  29. 1 2 3 "Megaupload Indictment". Retrieved 20 August 2012.
  30. "U.S. Shuts Offshore File-Share 'Locker'". The Wall Street Journal. 20 January 2012. Retrieved 20 August 2012.
  31. 1 2 Sandoval, Greg (20 January 2012). "Megaupload assembles worldwide criminal defense". CNET. Retrieved 20 January 2012.
  32. 1 2 Kang, Cecilia (20 January 2012). "Megaupload lawyer Q&A on DOJ criminal case". Washington Post.
  33. 1 2 3 4 5 6 "Opinion L.A.". Retrieved 11 May 2015.
  34. 1 2 3 4 5 6 7 8 9 10 11 12 Masnick, Mike (20 January 2012). "Megaupload Details Raise Significant Concerns About What DOJ Considers Evidence Of Criminal Behavior". techdirt.
  35. Anderson, Nate (10 November 2011). "Why the feds smashed Megaupload". Arstechnica.com. Retrieved 22 January 2012.
  36. Paragraph 20, page 9 of the indictment
  37. "Feds broaden piracy case against Megaupload.com". CNN. 18 February 2012. Retrieved 22 February 2012.
  38. "Kim Dotcom's first TV interview: 'I'm no piracy king'". 3 News. 1 March 2012. Retrieved 28 April 2012.
  39. "DC attorney Robert Bennett to represent Megaupload in piracy case, promises vigorous defense". Washington Post. 20 January 2012.
  40. "Renowned attorney Bennett to represent Megaupload". Associated Press. 20 January 2012.
  41. "megauploads high-profile defense lawyer robert bennett withdraws from piracy case". National Post. Canada. Retrieved 31 January 2012.
  42. Ingram, David (22 January 2012). "Reuters.com". Reuters. Retrieved 31 January 2012.
  43. "Megaupload boss says innocent, rival stops file-sharing". Reuters. 23 January 2012.
  44. "Paul Davison QC". NZ Barr Association. Retrieved 14 September 2014.
  45. "Government trying to deny Megaupload fair legal representation". Ars Technica. 16 April 2012. Retrieved 28 April 2012.
  46. Goldman, Eric. "Comments on the Megaupload Prosecution (a Long-Delayed Linkwrap)". Technology & Marketing Blog. Retrieved 20 August 2012.
  47. Benton Martin, Jeremiah Newhall (6 March 2013). "Criminal Copyright Enforcement against Filesharing Services". Archived from the original on 2013-04-11. Retrieved 10 March 2013.
  48. Anderson, Nate (10 November 2011). "Why the feds smashed Megaupload". Arstechnica.com. Archived from the original on 2012-07-13. Retrieved 22 January 2012.
  49. Sisario, Ben (30 May 2012). "Digital Notes: Judge Presses U.S. in Megaupload Case". The New York Times.
  50. "Torrent Freak Mega Extra". Retrieved 11 May 2015.
  51. http://ia700807.us.archive.org/2/items/gov.uscourts.vaed.275313/gov.uscourts.vaed.275313.96.1.pdf[]
  52. http://ia700807.us.archive.org/2/items/gov.uscourts.vaed.275313/gov.uscourts.vaed.275313.96.2.pdf[]
  53. Albanesius, Chloe (20 January 2012). "Megaupload Shutdown Targets Pirates ... And Legitimate Files". PC Magazine. Retrieved 31 January 2012.
  54. Albanesius, Chloe (20 January 2012). "Recovering Legitimate Megaupload Files? Good Luck With That". PC Magazine. Retrieved 31 January 2012.
  55. Gallagher, Sean (30 January 2012). "Feds: Megaupload user files may be deleted starting Thursday". Arstechnica. Retrieved 31 January 2012.
  56. Albanesius, Chloe (30 January 2012). "Megaupload Files: Deleted By Thursday?". PC Magazine. Retrieved 31 January 2012.
  57. "Carpathia Hosting's Statement on Recent News Reports". Carpathia Hosting. 30 January 2012. Archived from the original on 30 January 2012. Retrieved 31 January 2012.
  58. Tsukayama, Hayley (30 January 2012). "Carpathia: Don't call us for Megaupload data". Washington Post. Retrieved 31 January 2012.
  59. "Megaupload User Asks Court to Return His Video Files". EFF. 30 March 2012.
  60. "US: Megaupload's Hosting Company Might be Sued Next - TorrentFreak". TorrentFreak. Retrieved 11 May 2015.
  61. "Anonymous in revenge attack for MegaUpload shutdown". Financial Times.
  62. "Activists target recording industry websites". BBC News. 20 September 2012. Retrieved 31 January 2012.
  63. Beaumont, Claudine (20 September 2012). "Music and film industry websites targeted in cyber attacks". The Daily Telegraph. Retrieved September 30, 2012.
  64. 1 2 Biddle, Sam (19 January 2012). "Anonymous Goes on Megaupload Revenge Spree: DoJ, RIAA, MPAA, and Universal Music All Offline". Gizmodo. Retrieved 31 January 2012.
  65. "Anonymous post on Pastebin".
  66. Burton, C., Drake, A. Hitting the Headlines In Europe, A Country-By-Country Guide to Effective Media Relations. Kogan Page Ltd. 2004. p. 163.
  67. Stanford Journal of International Law, Volume 38, 2002. p. 26.
  68. Smith, Gerry (19 January 2012). "Anonymous Responds To Megaupload Takedown; Claims Credit For DOJ, RIAA, MPAA, Universal Music Outages (UPDATE)". The Huffington Post. Retrieved 31 January 2012.
  69. "FBI unplugs top piracy site". The Australian. 20 January 2012. Retrieved 20 January 2012.
  70. Antipiracy Case Sends Shivers Through Some Legitimate Storage Sites (New York Times, 20 January 2012)
  71. "Megaupload shutdown raises new Internet-sharing fears". Washington Post. Retrieved 11 May 2015.
  72. "Takedown of Megaupload leads to fears Internet commerce will suffer – USATODAY.com". USATODAY.COM. Retrieved 11 May 2015.
  73. Dvorak, John C. (20 January 2012). "U.S. Government Kills Megaupload". PCMag.com. Retrieved 22 January 2012.
  74. Greenwald, Glenn. "Two lessons from the Megaupload seizure". Salon.com. Retrieved 22 January 2012.
  75. "FBI Reminds Us Government Already Has MegaPower to Take Down Websites". Cato-at-liberty.org. Retrieved 22 January 2012.
  76. "5 Questions, Answers About The Megaupload Case". Npr.org. Retrieved 22 January 2012.
  77. The Christian Science Monitor. "If feds can bust Megaupload, why bother with anti-piracy bills?". The Christian Science Monitor. Retrieved 11 May 2015.
  78. 1 2 Brodkin, Jon. "Megaupload wasn't just for pirates: angry users out of luck for now". Arstechnica.com. Retrieved 22 January 2012.
  79. Albanesius, Chloe (1 January 1970). "Recovering Legitimate Megaupload Files? Good Luck With That (PC Magazine)". Pcmag.com. Retrieved 22 January 2012.
  80. "FileSonic disables file sharing in wake of MegaUpload arrests". CNET. 22 January 2012. Retrieved 23 January 2012.
  81. "Cyberlocker Ecosystem Shocked As Big Players Take Drastic Action". torrentfreak.com. 23 January 2012. Retrieved 23 January 2012.
  82. "FileSonic and Uploaded.to bow out in light of recent events". Technologymob.com. 23 January 2012. Retrieved 31 January 2012.
  83. "BitTorrent Index BTjunkie Bites the Dust". Time. 6 February 2012. Retrieved 8 February 2012.
  84. "Turbobit.net Blocks US Visitors After MegaUpload Shutdown". TorrentFreak.net. 7 February 2012. Retrieved 8 February 2012.
  85. "QuickSilverScreen Streaming Links Site Calls It Quits". TorrentFreak.net. 7 February 2012. Retrieved 8 February 2012.
  86. 22 January 2012, MediaFire CEO: Unlike Megaupload, our business model isn’t built on piracy, CloudBeat
  87. 20 January 2012, RapidShare "not concerned" about Megaupload takedown, Ars Technica
This article is issued from Wikipedia - version of the 9/14/2016. The text is available under the Creative Commons Attribution/Share Alike but additional terms may apply for the media files.