Attacks/Breaches
4/23/2012
01:36 PM
Connect Directly
RSS
E-Mail
50%
50%

Why Megaupload's Kim Dotcom Might Walk Free

Racketeering warrant has yet to be served against Megaupload, meaning the charges might fail to meet New Zealand's extradition threshold.

Anonymous: 10 Facts About The Hacktivist Group
Anonymous: 10 Facts About The Hacktivist Group
(click image for larger view and for slideshow)
Will Megaupload founder Kim Dotcom, who's been arrested by New Zealand authorities on racketeering and copyright infringement charges at the request of U.S. authorities, go free?

Questions arose Friday in a U.S. district courtroom in Virginia over whether Dotcom's extradition to the United States might proceed, or the charges against him even stick. "I frankly don't know that we are ever going to have a trial in this matter," Judge Liam O'Grady said to Justice Department prosecutor Jay Prabhu at the hearing, reported The New Zealand Herald.

Prosecutors have accused seven Megaupload employees, including Dotcom, of earning $175 million in subscription and advertising revenue from their file-sharing site, thanks to a widespread campaign of copyright infringement. But while previous such cases have been civil matters, the Department of Justice in this case took the unusual route of also filing criminal racketeering charges, which in New Zealand carry a five-year maximum sentence. The move appears to have been pragmatic. "The U.S. government needs to get over the hurdle of a five-year jail sentence to meet the criteria for extradition. Copyright charges in [New Zealand] carry a maximum of four years," reported the Herald.

[ More copyright scuffling: ISPs Agree To Copyright Alerts: What It Means. ]

Judge O'Grady's comments, interestingly, came after the FBI requested that the 1,100 servers that still store Megaupload data be allowed to be deleted. The two hosting providers that own the servers had requested that they either be allowed to return the servers to duty--Megaupload has been unable to pay for their upkeep since the Department of Justice froze its assets--or sell them to one of several groups that are seeking to retain the data they store.

But the judge seized on prosecutors' disclosure that they have yet to serve Megaupload with a warrant, and said that until that happens, discussing data deletion would be premature.

Yet, the Department of Justice launched its high-profile takedown of Megaupload in early January. Why has there been a three-month delay in serving the related warrant? "My understanding as to why they haven't done that is because they can't. We don't believe Megaupload can be served in a criminal matter because it is not located within the jurisdiction of the United States," Megaupload lawyer Ira Rothken said, according to The New Zealand Herald.

Rothken surmised that FBI lawyers had determined that Megaupload, which is based in Hong Kong, couldn't legally be served with a criminal warrant--only a civil one. Prosecutor Jay Prabhu argued against that interpretation in court, saying that because Dotcom is a majority owner of the company, he could be served. If so, however, what accounts for the delay? Furthermore, unless prosecutors can get the criminal charge--with its five-year maximum sentence--to stick, then the extradition request for Dotcom and the other accused Megaupload employees would go bust.

Again, the revelation over New Zealand's extradition requirements appear to explain the Department of Justice's unusual handling of this case. Notably, in the wake of the takedown, Jeff Ifrah, an attorney who co-chairs the American Bar Association's criminal justice section and committee on white collar crime, had questioned the government's use of a racketeering charge, which is typically reserved for drug-related or gambling cases involving organized crime syndicates--meaning, the mob.

Ifrah noted that the charges against Megaupload were quite similar to those made by Viacom against Google's YouTube. "Certainly no one accused YouTube of having mob-like activities," he said of the civil suit.

In the wake of Friday's court session, meanwhile, Dotcom has lashed out at federal prosecutors for destroying his business. "The U.S. government has terminated Megaupload, Megavideo and 10 other subsidiaries, including a company called N1 Limited that was developing a clothing line," Dotcom told TorrentFreak. "They destroyed 220 jobs. Millions of legitimate Mega users have no access to their files."

When picking endpoint protection software, step one is to ask users what they think. Also in the new, all-digital Security Software: Listen Up! issue of InformationWeek: CIO Chad Fulgham gives us an exclusive look at the agency's new case management system, Sentinel; and a look at how LTE changes mobility. (Free registration required.)

Comment  | 
Print  | 
More Insights
Comments
Newest First  |  Oldest First  |  Threaded View
Reggie62
50%
50%
Reggie62,
User Rank: Apprentice
4/25/2012 | 1:34:28 AM
re: Why Megaupload's Kim Dotcom Might Walk Free
Funny isn't it?? The FBI, I'm sure would be the first to prosecute anyone for destruction of evidence in any other case.. That is perverting the course of justice, is it not??
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
4/25/2012 | 1:00:26 AM
re: Why Megaupload's Kim Dotcom Might Walk Free
Let's see if I've got the math straight here...

Organization collects $175 Million in subscription and advertising revenues.

"Ringleader" of the organization claims that the Federal Government has eliminated 220 jobs. An average of $795k+ per individual. Must be one hell of a group of clothing designers at that price. No wonder designer clothes are so expensive.

Getting back to the topic at hand - what's scary about this case is that the FBI wants to have these 1100 servers deleted, that seems to be throwing out the copyrighted material along with the legitimate users' material.

If the systems can be kept off-line without being deleted, doesn't that suffice to stop this organization? From what I know of Internet advertising, if the servers aren't running, ads can't be served, so that revenue stream is at a full stop. And with regards to Internet hosting, if you don't pay for it, it'll get taken off-line. But, the alternative would be to have the FBI comb through the contents of those servers... at which point there will definitely be some form of Invasion of Privacy outcry.

This is just one big mess... I just wonder why the Feds can't bring a higher level of charges in American courts, based on the fact that Megaupload had a number of servers based out of the United States. Considering that each download could possibly constitute a charge of piracy and or distribution of copyrighted material - which I tend to recall is illegal in the United States. With the number of possible charges that could be brought, that could certainly run into more than 5 years of possible jail time.

Andrew Hornback
InformationWeek Contributor
Bprince
50%
50%
Bprince,
User Rank: Ninja
4/24/2012 | 11:17:23 PM
re: Why Megaupload's Kim Dotcom Might Walk Free
@readers: What is your opinion of the government's case against Megaupload?
Brian Prince, InformationWeek/Dark Reading Comment Moderator
Register for Dark Reading Newsletters
White Papers
Cartoon
Current Issue
Dark Reading, September 16, 2014
Malicious software is morphing to be more targeted, stealthy, and destructive. Are you prepared to stop it?
Flash Poll
Video
Slideshows
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2012-1032
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in the Euroling SiteSeeker module 3.x before 3.4.5 for EPiServer allows remote attackers to inject arbitrary web script or HTML via unspecified vectors. NOTE: the provenance of this information is unknown; the details are obtained solely from third party inf...

CVE-2012-1417
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in Local Phone book and Blacklist form in Yealink VOIP Phones allow remote authenticated users to inject arbitrary web script or HTML via the user field to cgi-bin/ConfigManApp.com.

CVE-2012-1506
Published: 2014-09-17
SQL injection vulnerability in the updateStatus function in lib/models/benefits/Hsp.php in OrangeHRM before 2.7 allows remote authenticated users to execute arbitrary SQL commands via the hspSummaryId parameter to plugins/ajaxCalls/haltResumeHsp.php. NOTE: some of these details are obtained from th...

CVE-2012-1507
Published: 2014-09-17
Multiple cross-site scripting (XSS) vulnerabilities in OrangeHRM before 2.7 allow remote attackers to inject arbitrary web script or HTML via the (1) newHspStatus parameter to plugins/ajaxCalls/haltResumeHsp.php, (2) sortOrder1 parameter to templates/hrfunct/emppop.php, or (3) uri parameter to index...

CVE-2012-2583
Published: 2014-09-17
Cross-site scripting (XSS) vulnerability in Mini Mail Dashboard Widget plugin 1.42 for WordPress allows remote attackers to inject arbitrary web script or HTML via the body of an email.

Best of the Web
Dark Reading Radio