Quote:
Originally Posted by TheDA
That other guy (Jimmy Stephans?) was getting some nice settlements or whatever from doing something similar.
Not sure if it was IP addresses he was going after. He was tracking down individuals.
|
From my understanding he used DMCA 512(h) subpoenas

Also didn't hurt that he hired PI's and lawyers too. Then again, he served the processor who essentially handed over the entire server log files.