Quote:
Originally Posted by Rathji
Its all part of the investigation process I would assume. Its not like they storm your house and toss you in jail just because your IP was used for file sharing.
In a situation like that, it certainly is a lot more work to prove who did it. You would need to determine who logged onto that network, which wouldn't be that hard probably, because they might still be doing it.
|
Even so, how do you prove who was sitting at the keyboard? In the Thomas case in the USA, it was a bit easier to draw the conclusion that she was responsible. You had to provide an email address and what have you for Kazaa. The address provided matched her personal email address and other contact information. Plus the files were on her computer. That was enough for the jury to find against Thomas on the identity issue.
With the way most public bit torrent trackers and clients work, I don't think the recording industry has that same luxury.