View Single Post
Old 03-12-2010, 12:06 PM   #25
fredr123
Franchise Player
 
fredr123's Avatar
 
Join Date: Apr 2004
Exp:
Default

Quote:
Originally Posted by Rathji View Post
Its all part of the investigation process I would assume. Its not like they storm your house and toss you in jail just because your IP was used for file sharing.

In a situation like that, it certainly is a lot more work to prove who did it. You would need to determine who logged onto that network, which wouldn't be that hard probably, because they might still be doing it.
Even so, how do you prove who was sitting at the keyboard? In the Thomas case in the USA, it was a bit easier to draw the conclusion that she was responsible. You had to provide an email address and what have you for Kazaa. The address provided matched her personal email address and other contact information. Plus the files were on her computer. That was enough for the jury to find against Thomas on the identity issue.

With the way most public bit torrent trackers and clients work, I don't think the recording industry has that same luxury.
fredr123 is offline   Reply With Quote