Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

Comments
Why Megaupload's Kim Dotcom Might Walk Free
Newest First  |  Oldest First  |  Threaded View
Reggie62
50%
50%
Reggie62,
User Rank: Apprentice
4/25/2012 | 1:34:28 AM
re: Why Megaupload's Kim Dotcom Might Walk Free
Funny isn't it?? The FBI, I'm sure would be the first to prosecute anyone for destruction of evidence in any other case.. That is perverting the course of justice, is it not??
Andrew Hornback
50%
50%
Andrew Hornback,
User Rank: Apprentice
4/25/2012 | 1:00:26 AM
re: Why Megaupload's Kim Dotcom Might Walk Free
Let's see if I've got the math straight here...

Organization collects $175 Million in subscription and advertising revenues.

"Ringleader" of the organization claims that the Federal Government has eliminated 220 jobs. An average of $795k+ per individual. Must be one hell of a group of clothing designers at that price. No wonder designer clothes are so expensive.

Getting back to the topic at hand - what's scary about this case is that the FBI wants to have these 1100 servers deleted, that seems to be throwing out the copyrighted material along with the legitimate users' material.

If the systems can be kept off-line without being deleted, doesn't that suffice to stop this organization? From what I know of Internet advertising, if the servers aren't running, ads can't be served, so that revenue stream is at a full stop. And with regards to Internet hosting, if you don't pay for it, it'll get taken off-line. But, the alternative would be to have the FBI comb through the contents of those servers... at which point there will definitely be some form of Invasion of Privacy outcry.

This is just one big mess... I just wonder why the Feds can't bring a higher level of charges in American courts, based on the fact that Megaupload had a number of servers based out of the United States. Considering that each download could possibly constitute a charge of piracy and or distribution of copyrighted material - which I tend to recall is illegal in the United States. With the number of possible charges that could be brought, that could certainly run into more than 5 years of possible jail time.

Andrew Hornback
InformationWeek Contributor
Bprince
50%
50%
Bprince,
User Rank: Ninja
4/24/2012 | 11:17:23 PM
re: Why Megaupload's Kim Dotcom Might Walk Free
@readers: What is your opinion of the government's case against Megaupload?
Brian Prince, InformationWeek/Dark Reading Comment Moderator


Edge-DRsplash-10-edge-articles
7 Old IT Things Every New InfoSec Pro Should Know
Joan Goodchild, Staff Editor,  4/20/2021
News
Cloud-Native Businesses Struggle With Security
Robert Lemos, Contributing Writer,  5/6/2021
Commentary
Defending Against Web Scraping Attacks
Rob Simon, Principal Security Consultant at TrustedSec,  5/7/2021
Register for Dark Reading Newsletters
White Papers
Video
Cartoon Contest
Write a Caption, Win an Amazon Gift Card! Click Here
Latest Comment: Take me to your BISO 
Current Issue
2021 Top Enterprise IT Trends
We've identified the key trends that are poised to impact the IT landscape in 2021. Find out why they're important and how they will affect you today!
Flash Poll
Twitter Feed
Dark Reading - Bug Report
Bug Report
Enterprise Vulnerabilities
From DHS/US-CERT's National Vulnerability Database
CVE-2021-30174
PUBLISHED: 2021-05-11
RiyaLab CloudISO event item is added, special characters in specific field of time management page are not properly filtered, which allow remote authenticated attackers can inject malicious JavaScript and carry out stored XSS (Stored Cross-site scripting) attacks.
CVE-2021-32544
PUBLISHED: 2021-05-11
Special characters of IGT search function in igt+ are not filtered in specific fields, which allow remote authenticated attackers can inject malicious JavaScript and carry out DOM-based XSS (Cross-site scripting) attacks.
CVE-2021-32563
PUBLISHED: 2021-05-11
An issue was discovered in Thunar before 4.16.7 and 4.17.x before 4.17.2. When called with a regular file as a command-line argument, it delegates to a different program (based on the file type) without user confirmation. This could be used to achieve code execution.
CVE-2020-23369
PUBLISHED: 2021-05-10
In YzmCMS 5.6, XSS was discovered in member/member_content/init.html via the SRC attribute of an IFRAME element because of using UEditor 1.4.3.3.
CVE-2020-23370
PUBLISHED: 2021-05-10
In YzmCMS 5.6, stored XSS exists via the common/static/plugin/ueditor/1.4.3.3/php/controller.php action parameter, which allows remote attackers to upload a swf file. The swf file can be injected with arbitrary web script or HTML.