{"id":2928,"date":"2012-02-01T09:07:51","date_gmt":"2012-02-01T14:07:51","guid":{"rendered":"http:\/\/www.ict-pulse.com\/?p=2928"},"modified":"2012-12-12T06:09:36","modified_gmt":"2012-12-12T11:09:36","slug":"top-6-takeaways-from-the-megaupload-takedown","status":"publish","type":"post","link":"https:\/\/ict-pulse.com\/2012\/02\/top-6-takeaways-from-the-megaupload-takedown\/","title":{"rendered":"Top 6 takeaways from the Megaupload takedown"},"content":{"rendered":"
The takedown of popular file hosting site, Megaupload, by the US Government on charges of copyright violations, has sent shockwaves throughout the online industry.\u00a0 Here are six takeaways from that event.<\/em><\/p>\n <\/a>Two weeks ago, on 19 January, the US Department of Justice seized and shut down file hosting website, Megaupload.com, and issued arrest warrants for some of its senior executives, including co-founders Kim Dotcom (also known as Kim Schmidt) and Mathias Ortmann. The website, which is registered in Hong Kong, and at one time was estimated to have been ranked the 13th<\/sup> most visited site globally, is now being alleged to have supported (and even encouraged) a broad range of copyright infringement activities.<\/p>\n While those accused are working towards securing bail and battling extradition to the US, and Megaupload\u2019s lawyers are trying to have the site domain returned to its control, US servers for the website may start deleting the stored content as early as mid-February. It therefore means that a considerable number of the reportedly nearly 150 million registered users could irrevocably lose the data they have stored on Megaupload.<\/p>\n The fallout from Megaupload being shut down may be far from over, but here are 6 points of which we should take heed from this surprising but significant turn of events.<\/p>\n It is perhaps no coincidence that the Justice Department\u2019s action against Megaupload and its principals occurred the day after thousands of websites decided to \u201cgo dark\u201d \u2013 on 18 January \u2013 in protest of the Stop the Online Piracy Act (SOPA) and the PROTECT IP Act (PIPA). Those two bills had been tabled in the US House of Representatives and Senate, respectively, and just prior to the protest, both of them were withdrawn\u00a0and were being revisited to address some of the problematic issues identified. However, the US Government\u2019s action, mere hours after the protest, is indicative that it is prepared to pursue criminal prosecution, consistent with what was being proposed in SOPA and PIPA, rather than just allow persons alleging copyright infringements to sue the accused party:<\/p>\n Julie Samuels, an attorney for the civil liberties nonprofit Electronic Frontier Foundation, said it was unusual for the Justice Department to bring a criminal case for an alleged conspiracy over copyright violations, which are usually handled in civil court. (Source: Reuters<\/a>)<\/p><\/blockquote>\n The basis of much of the criminal charges laid against Megaupload and its principals is under the current US Copyright legislation. The charges speak to online piracy, \u201cincluding racketeering conspiracy, conspiring to commit copyright infringement, and conspiring to commit money laundering\u201d<\/em> (Source: CNET<\/a>)<\/p>\n <\/a><\/p>\n Unlike SOPA and PIPA, where the burden of proof for prosecution might be less than under US Copyright laws, the Justice Department had to gather considerable amounts of evidence in order to secure the desired indictments. \u00a0However, based on the fact that charges have been successfully laid against Megaupload, it \u00a0means that it is indeed possible to prosecute entities that are alleged to be engaging in online copyright infringement activities. Further, it might be instructive to note that following Megaupload\u2019s shutdown, sites such as Google and Internet Archive voluntarily removed their cached and mirrored version of the site \u201cto avoid legal concerns as they were technically hosting a site that has been taken down for infringement<\/em>\u201c(Source: Wordswith Meaning.org<\/a>)<\/p>\n Websites that allow their users to upload content may be feeling a bit more apprehensive following the Megaupload experience. Some online file storage properties, such as FileSonic<\/a>, have disabled their sharing functionality, which typically returned URLs that could be used to access stored content and share with others. However now, users will only be able to upload and retrieve files that they have stored personally, which would limit claims that such website are perpetuating the unauthorised spread of copyrighted material.<\/p>\n Moreover, digital lockers are perhaps being seen as easier targets than peer-to-peer operations, such as BitTorrent<\/a>, which run decentralised networks, although such sites might be more widely used to share copyrighted information. However, experts suggest that<\/p>\n \u2026Megaupload and its ilk may be a bigger factor in video piracy because movies take much longer to download via peer-to-peer networks\u2026 Digital lockers allow anyone to upload, store and distribute links to most forms of electronic content\u2026 (Source: Reuters<\/a>)<\/p><\/blockquote>\n As Megaupload\u2019s 150 million-plus account holders wonder whether they might have their content returned to them, it might be instructive to note that in Megaupload\u2019s Terms of Service does state that users<\/p>\n \u2026 have no proprietary interest in any of the files on Megaupload\u2019s servers\u201d and that \u201cMegaupload can terminate site operations without prior notice<\/a>. (Source: Wired<\/a>)<\/p><\/blockquote>\n In essence, having uploaded their content on the Megaupload, members lost their rights to their files, which means that strictly speaking, they might no longer be entitled to have them returned. Admittedly though, the terms of use and privacy policies of many websites make\u00a0difficult and laborious reading, but perhaps had persons been more fully aware of such provisions, other choices might have been made.<\/p>\n US webhosting providers offer prospective users a broad range of hosting options, and the more reputable brands tend to be the most reliable and cost effective. In the Caribbean, where webhosting might be limited and expensive, the preferred choice is to have websites hosted in the US and\/or hosted by US companies. However, it therefore means, as has occurred to Megaupload, the US is able to exercise jurisdiction on websites and content within its jurisdiction. More importantly, where the principals of a website are considered to have encouraged \u2013 tacitly or otherwise \u2013 the distribution of copyrighted protected material, the US government may be prepared to press criminal charges against them and to seek extradition to the US.<\/p>\n Finally, over the past several months, there has been a marked shift towards cloud computing, where increasingly data, applications and computing resources are being used over the Internet. One facility that the average user frequently utilises is a digital locker to: store files;\u00a0act as back-up storage; and facilitate file sharing. However, recognising that millions of Megaupload users lost access to their\u00a0data when the US Government seized the website, and may permanently lose it when US webhosts deleted it in a few weeks, it might be wise not to keep important information in an online storage facility only. Secondary and more tangible forms of storage, which we as users can control, such as USB and optical drives, may need to be considered.<\/p>\n Images courtesy of Null Value<\/a> and Prachatai<\/a>, flickr<\/a>.<\/em><\/p>\n ____________<\/p>\n","protected":false},"excerpt":{"rendered":" The takedown of popular file hosting site, Megaupload, by the US Government on charges of copyright violations, has sent shockwaves throughout the online industry.\u00a0 Here are six takeaways from that […]<\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_et_pb_use_builder":"","_et_pb_old_content":"","_et_gb_content_width":"","om_disable_all_campaigns":false,"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"jetpack_post_was_ever_published":false,"_jetpack_newsletter_access":"","_jetpack_dont_email_post_to_subs":false,"_jetpack_newsletter_tier_id":0,"_jetpack_memberships_contains_paywalled_content":false,"_jetpack_memberships_contains_paid_content":false,"footnotes":"","jetpack_publicize_message":"","jetpack_publicize_feature_enabled":true,"jetpack_social_post_already_shared":false,"jetpack_social_options":{"image_generator_settings":{"template":"highway","enabled":false},"version":2}},"categories":[17,27,13,11,6],"tags":[38,32,106,43,87],"class_list":["post-2928","post","type-post","status-publish","format-standard","hentry","category-caribbean","category-computing","category-content","category-ict-tech","category-internet","tag-data-protection","tag-information-society","tag-intellectual-property","tag-internet-governance","tag-legislation","et-doesnt-have-format-content","et_post_format-et-post-format-standard"],"jetpack_publicize_connections":[],"aioseo_notices":[],"jetpack_sharing_enabled":true,"jetpack_featured_media_url":"","jetpack_shortlink":"https:\/\/wp.me\/p2iE1G-Le","jetpack-related-posts":[],"_links":{"self":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/2928","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/comments?post=2928"}],"version-history":[{"count":19,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/2928\/revisions"}],"predecessor-version":[{"id":2948,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/posts\/2928\/revisions\/2948"}],"wp:attachment":[{"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/media?parent=2928"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/categories?post=2928"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/ict-pulse.com\/wp-json\/wp\/v2\/tags?post=2928"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}1.\u00a0 SOPA and PIPA are not dead <\/strong><\/h3>\n
2. Existing legislation may have far more teeth than envisaged<\/strong><\/h3>\n
3. \u00a0Digital lockers could be targeted for more piracy investigations<\/strong><\/h3>\n
4. \u00a0Remember to read the fine print<\/strong><\/h3>\n
5.\u00a0 It may be near impossible to evade the long arm of Uncle Sam<\/strong><\/h3>\n
6. Do not rely solely on online storage facilities <\/strong><\/h3>\n