RIAA Dirty Tricks: Gathering Private Info On Kids Of Accused File Sharer

Outsmart Malicious Hackers


The RIAA’s latest tactic, is to reveal to Santangelo and her new lawyer that they’ve been investigating her children, and have been able to collect a lot of non-public information. The RIAA will probably claim that the info is related to the case, but it certainly borders on using scare tactics, and trying to intimidate Santangelo into backing down.

The Big Four record labels are escalating their attack on Patti Santangelo, the New York mother who’s so far the only person to stand up to them.

And they’ll be using her children as weapons against her.

On Tuesday judge Mark D. Fox presided over a discovery hearing in Elektra v Santangelo and, “Elektra’s attorneys have answered Patti’s objections to their discovery questions,” her lawyer, Jordan Glass, told p2pnet.

“They’ve started to push back aggressively. They’re going after her children – and this time not directly so they can get around certain protections the children have. They had information about the children that wasn’t public, or wasn’t supposed to be public, and it’s of great concern not only that that they were able to obtain it, but also that they wanted it.

“They’re not treating this as a single case or as seeking a verdict for $3,500.00. They’re treating this as a symbol for how the other cases will go and I hope everyone who reads this will recognize the serious impact this case could have on their children.”

The RIAA has spent enough to feed a small country on trying to make the world believe it’s owners, the multi-billion-dollar Big Four labels, are being “devastated” (their word) by people who share music online, that contracted artists are suffering and that support workers are being driven into extreme financial hardship.

They make the completely unsupportable assertion that people using the p2p networks to share files would otherwise have paid $1 or more to buy the song from an online corporate music site or an offline music store.

Source: p2pnet

Posted in: Privacy

, , ,


Latest Posts:


OWASP ZSC - Obfuscated Code Generator Tool OWASP ZSC – Obfuscated Code Generator Tool
OWASP ZSC is an open source obfuscated code generator tool in Python which lets you generate customized shellcodes and convert scripts to an obfuscated script.
A Look Back At 2017 – Tools & News Highlights A Look Back At 2017 – Tools & News Highlights
So here we are in 2018, taking a look back at 2017, quite a year it was. Here is a quick rundown of some of the best hacking/security tools released in 2017, the biggest news stories and the 10 most viewed posts on Darknet as a bonus.
Spectre & Meltdown Checker - Vulnerability Mitigation Tool For Linux Spectre & Meltdown Checker – Vulnerability Mitigation Tool For Linux
Spectre & Meltdown Checker is a simple shell script to tell if your Linux installation is vulnerable against the 3 "speculative execution" CVEs that were made public early 2018.
Hijacker - Reaver For Android Wifi Hacker App Hijacker – Reaver For Android Wifi Hacker App
Hijacker is a native GUI which provides Reaver for Android along with Aircrack-ng, Airodump-ng and MDK3 making it a powerful Wifi hacker app.
Sublist3r - Fast Python Subdomain Enumeration Tool Sublist3r – Fast Python Subdomain Enumeration Tool
Sublist3r is a Python-based tool designed to enumerate subdomains of websites using OSINT. It helps penetration testers and bug hunters collect and gather subdomains for the domain they are targeting.
coWPAtty Download - Audit Pre-shared WPA Keys coWPAtty Download – Audit Pre-shared WPA Keys
coWPAtty is a C-based tool for running a brute-force dictionary attack against WPA-PSK and audit pre-shared WPA keys.


Comments are closed.