Even een willekeurig citaat uit de
indictment, uitgelicht puur omdat ik daar toevallig ben met lezen:
quote:
On or about October 25, 2008, VAN DER KOLK uploaded an infringing
copy of a copyrighted motion picture entitled “Taken 2008 DVDRip Repack [A Release Lounge
H264 By Micky22].mp4” to Megaupload.com and e-mailed the URL link for the file to another
individual. An infringing copy of this copyrighted work was still present as of October 27,
2011,on a server in the Eastern District of Virginia controlled by the Mega Conspiracy.
Wat een idioot.

Hoeveel moeite was het geweest dat even in een truecrypt container te steken als je dan al zonodig de servers waarvan je afhankelijk bent voor je broodwinning voor zoiets moet gebruiken.

Ik mag toch aannemen dat wanneer je, je willens en wetens op juridisch dermate grijs gebied begeeft, je koste wat kost ook maar de schijn van bewuste illigaliteit/copyrightschending wilt vermijden. Temeer als dit je slechts enkele minuten extra zou kosten.
Anderzijds zou een dergelijke persoonlijke benadering door een bedrijfsethiek als blijkend uit onderstaand citaat waarschijnlijk volkomen teniet worden gedaan: (Zou je hiervan althans op de hoogte zijn, wat van der Kolk als 'technische man' zeer waarschijnlijk ook wel geweest is.)
quote:
21. Members of the Mega Conspiracy negotiated the use of an “Abuse Tool” with
some major U.S. copyright holders to purportedly remove copyright-infringing material from
Mega Conspiracy-controlled servers. The Abuse Tool allowed copyright holders to enter
specific URL links to copyright infringing content of which they were aware, and they were
told by the Conspiracy that the Mega Conspiracy’s systems would then remove, or disable
access to, the material from computer servers the Conspiracy controls. The Mega Conspiracy’s
Abuse Tool did not actually function as a DMCA compliance tool as the copyright owners were
led to believe.
22. When a file is being uploaded to Megaupload.com, the Conspiracy’s automated
system calculates a unique identifier for the file (called a “MD5 hash”) that is generated using a
mathematical algorithm. If, after the MD5 hash calculation, the system determines that the
uploading file already exists on a server controlled by the Mega Conspiracy, Megaupload.com
does not reproduce a second copy of the file on that server. Instead, the system provides a new
and unique URL link to the new user that is pointed to the original file already present on the
server. If there is more than one URL link to a file, then any attempt by the copyright holder to
terminate access to the file using the Abuse Tool or other DMCA takedown request will fail
because the additional access links will continue to be available.
23. The infringing copy of the copyrighted work, therefore, remains on the
Conspiracy’s systems (and accessible to at least one member of the public) as long as a single
link remains unknown to the copyright holder. The Conspiracy’s internal reference database
tracks the links that have been generated by the system, but duplicative links to infringing
materials are neither disclosed to copyright holders, nor are they automatically deleted when a
copyright holder either uses the Abuse Tool or makes a standard DMCA copyright infringement
takedown request. During the course of the Conspiracy, the Mega Conspiracy has received
many millions of requests (through the Abuse Tool and otherwise) to remove infringing copies
of copyrighted works and yet the Conspiracy has, at best, only deleted the particular URL of
which the copyright holder complained, and purposefully left the actual infringing copy of the
copyrighted work on the Mega Conspiracy-controlled server and any other access links
completely intact.
24. In addition to copyrighted files, other types of illicit content have been uploaded
onto the Megaupload.com servers, including child pornography and terrorism propaganda
videos. Members of the Conspiracy have indicated to each other that they can automatically
identify and delete such materials on all of their servers by calculating MD5 hash values of
known child pornography or other illicit content, searching the system for these values, and
eliminating them; in fact, such files with matching hash values have been deleted from the Mega
Conspiracy’s servers. Members of the Mega Conspiracy have failed to implement a similar
program to actually delete or terminate access to copyright infringing content.
Laat vooral niet aan je voorbij gaan dat de aanklager hier, het feit dat Megaupload/Megavideo kinderporno en video's die terrorisme propageerden wél grondig verwijderden, tegen hen gebruikt.