Free Republic
Browse · Search
News/Activism
Topics · Post Article

To: Fawn; anyone

How do they catch these people? How do they scan their HD's and find out what they have on them?

I got a feeling it is only people who share who get caught. If you turn of sharing and only download, and have a good firewall, might a person be safe from outsiders looking at the contents of your HD?

If they hacked into a remote, non-internet shared hard drive, are they not liable for internet crimes? That is why I think they can only scan drives that are openly shared.

Anyone know any more about this? - PS I'm not advocating theft of intellectual property - just curious about the legality of what they are doing, just as much as the legality of taking music for free.


151 posted on 07/04/2006 3:07:02 PM PDT by monkeyshine
[ Post Reply | Private Reply | To 1 | View Replies ]


To: monkeyshine

Read this:

http://www.freerepublic.com/focus/f-news/1660171/posts?page=43#43


157 posted on 07/04/2006 3:29:15 PM PDT by HighWheeler (A true liberal today is a combination of socialist, fascist, hypocrite, and anti-American.)
[ Post Reply | Private Reply | To 151 | View Replies ]

To: monkeyshine
How do they catch these people? How do they scan their HD's and find out what they have on them?

One article I read online stated that they are going after the companies with the servers. Example, a legal battle to shut down a website that provides a torrent search and maintains torrent files. As part of the legal maneuverings, they force the company to turn over the IP addresses of anyone who visits the website and downloads a torrent. Now they can identify individuals who are downloading, and come after them. I guess that's one way they are doing it.

164 posted on 07/04/2006 4:41:44 PM PDT by JavaTheHutt ( Bush Bush Bush Bush Bush Bush Bush - DUBYA!!!!!)
[ Post Reply | Private Reply | To 151 | View Replies ]

Free Republic
Browse · Search
News/Activism
Topics · Post Article


FreeRepublic, LLC, PO BOX 9771, FRESNO, CA 93794
FreeRepublic.com is powered by software copyright 2000-2008 John Robinson