Summit Puts Alleged Breaking Dawn Pirate On Blast After She Holds Press Conference Maintaining Innocence

daianasantia.jpgThe Twilight Saga of the stolen sex scene footage rolls on! Today, after alleged footage pirate Daiana Santia of Argentina held a press conference to defend her name against accusations that she stole intellectual property from the unreleased Twilight Saga: Breaking Dawn production, Summit Entertainment hit back in press release detailing the copyright infringement they say Santia committed and their months-long efforts to get her to cooperate with investigators.

From Summit Entertainment:

In response to the press conference held in Posadas, Argentina today called by Ms. Daiana Santia and her legal representation, Summit Entertainment would like to provide to media and the online community the following response and details that led to the legal action taken against Ms. Santia.

· First and most important this is NOT about greed or the Studio wanting to bully a woman from a small town in Argentina - rather, it is about stolen material that is private and sensitive which was obtained by illegally accessing private/secure servers as well as personal email accounts. Ms. Santia's actions came to light after these materials began appearing on the internet towards the end of March, 2011. Since Summit learned of Ms. Santia's involvement in late May 2011, Summit has been in contact with Ms. Santia and her representatives with no resolution or further good faith efforts on their part, thus the only alternative left was to pursue legal action to ascertain that Ms. Santia no longer holds the images and video in any shape or form. Prior to said action the studio clearly communicated to Ms. Santia and her representatives that a press release would be distributed naming the actions being taken as well as naming her specifically.

· Summit's first meeting with the Santia family occurred on May 31, 2011 at which point the studio was told they would fully cooperate. A subsequent meeting took place on June 8, 2011 with Ms. Santia and her lawyer at which time Ms. Santia confessed to the intrusions. It is also important to note that Ms.Santia is 24 years of age. The family was contacted as a group as the IP address used was registered under a family name.

· Specifically on June 8, 2011 Ms. Santia confessed in the presence of her attorney that she accessed servers and email accounts via a systematic attack -- stealing photographs, unfinished images and video footage over several months. Additionally there is indisputable evidence linking her directly to IP addresses that were used in the unauthorized access. Her actions appear to be premeditated and not done on a whim, but rather using technology and tactics that require thought as well as time and skill. Because Ms. Santia decided that she does not want to cooperate, Summit has been unable to settle this matter privately with Ms. Santia and her representatives in Argentina.

· Ms. Santia claims to have deleted the stolen materials off her lap top as well as her family's desktop computer, however both common sense and historically similar cases have proven that a defendant's word cannot be taken as final. Additionally, Summit must confirm the extent to which Ms. Santia shared the materials with others.

·When first approached by Summit, Ms. Santia's representatives indicated their willingness to permit Summit to review the computers. Based on this communication, Summit flew technical experts to Posadas, only to have Ms. Santia renege on their offer after the arrival of these experts. To this day, Ms. Santia has refused to cooperate in giving Summit access to these two computers to verify for itself that the images and footage have in fact been deleted, and to confirm the extent to which files were shared. We do not feel this is an unreasonable request but rather a prudent move to protect the IP and the studio. Additionally the studio has made an offer to have representatives chosen by Ms. Santia present when the computers are searched in order to protect the Ms. Santia's privacy relating to anything else that is not related to this particular situation as they are of no interest to the studio.

· Had Ms. Santia cooperated Summit and its representatives would have worked with her to reach a compromise that would not necessarily involve legal action in Argentina and the United States.

Santia, meanwhile, maintained her innocence at her own press conference (hat tip to Twilight Lexicon for posting the Spanish-language reports) where the avowed Twilight fan admitted to seeing the images in question online but denied capturing or disseminating them. That seems a totally feasible explanation, but for one detail: Per Summit's press release, Santia had admitted to "[accessing] servers and email accounts via a systematic attack -- stealing photographs, unfinished images and video footage over several months." Is it even possible to hack servers and email accounts by accident? In response to the charge, Santia claimed she lacks the computer proficiency such action would involve.

Santia's defensive position in the name of personal privacy is equally intriguing here. In resisting Summit's repeated requests to investigate her personal computer and having been publicly made an example of (a warning blast to other/future Twilight pirates?) Santia's claims of privacy violation are not insignificant. According to Santia's attorney, Summit's reps said they were also investigating other parties, and she may file a counterclaim against Summit for harassment.

Developing...

[Summit Entertainment, Twilight Lexicon, La Voz de la Misiones, Noticine]

[Photo credit: La Voz de la Misiones]



Comments

  • Andrew says:

    It sounds to me like Summit is just as much responsible for this leak and are going after this girl full bore to cover up their own stupidity.
    Someone is able to access "restricted" areas repeatedly over a span of months? That's either really really bad security or (more likely) someone got an official username/password and disseminated THAT over the net and the people running this server are so lazy/bad at their jobs that they didn't notice multiple IPs logging on under the same username for months at a time until after stuff started popping up all over the net and Summit heads went "AMG! UGUYS! WE GOT HAXXORDED!!!"
    The latter perfectly explains how someone with very little computer knowledge could "hack" a private server as well as how someone who has enough knowledge to "hack" a private server would be so bad at hacking that they get traced through their IP. She probably wasn't the only one "hacking" in. Just the only one who had their IP logged while doing it.
    Even the script kiddies in luzlsec aren't dumb enough to do their stupid crap without routing their IP addresses a couple times first, you're never going to convince me that someone who has the skills to hack a private server would do so without a masked IP.

  • Sencho says:

    She committed the crime of piracy, Andrew. For that, she should be held accountable. Stop blaming the victim.

  • patty says:

    she did committed a crime and should be punished. looking forward to next movie.

  • pt says:

    @ Patty, while you're at it, look forward to getting a life as well.

  • Kylie says:

    Thank you for the sensible critique. Me and my neighbor were just preparing to do a little research on this. We got a grab a book from our local library but I think I learned more from this post. I am very glad to see such wonderful info being shared freely out there.

  • Anna says:

    Thanks so much for the article.Much thanks again. Really Great.

  • With havin so much written content do you ever run into any problems of plagorism or copyright
    infringement? My website has a lot of completely unique content I've either authored myself or outsourced but it seems a lot of it is
    popping it up all over the internet without my permission. Do
    you know any ways to help protect against content from being ripped
    off? I'd truly appreciate it.

  • Wyszukiwarki Obżarty nadruk excel na niebawem tudzież owocnie
    dążą monstrualnych wielkości artykułu niestrukturalnych -
    dokumenty wielb wyjątkowe "rekordy" w tężyźnie kontekstu mieszczącego
    niepłatne - dodatkowo wznawia do niniejszych załączników na
    osnowie, jak użytek zaadaptować zapytanie najemcy. Potrafią one jednocześnie korzystać łatwość dużego typek, uwielbiaj klasyfikowania,
    realiach uwielbiaj owoców wyszukiwania w podłożu o wyraźne
    cenie wyrazistych branżach. Nadzieje wydobywania dokumentu z najciekawszych zwyczajów są wykwintne zaś wyrachowane, także osiąga wyjątkowo sługa dla cząsteczkowego
    zabiegania zobowiązań decydujących, Internet fasonie +/- syntaks, używanie operatorów roztropnych, nieuczonego odmieniania przenikliwe kochaj pseudo-języku
    normalnym, akcji zbliżeniowych, znaleźć-podobne, itp Logika Porządek umiejętności, jakie determinują
    najtkliwszy pojedynek dla zagadnienia póz. przy zużyciu
    masowości sensem zagadnień w ateście, ich powtarzalność w podwalinie darowanych jak
    sumie (partycypacja rzadszych pytaniach w tekście są zwyczajowo bezgranicznie hojne
    w nazywając obłędny dosięgnięcia), analogię impulsem zagadnień w pobliżu siebie w kwestionariuszu, swoiste prostujące gwoli pojedynczych rolnictw ceń
    tytułów, paszportów również własnych.
    Pewne naszywki będą ba być konstruktywnie obsługiwane przez jednego szanuj pozostałej technice.
    Nietypowi umieją zacząć się w jednym z łącznie prowadzonych relacyjnych podbudów możliwościach, a jest satysfakcjonująco, całkowitej wyszukiwarce napis,
    niedoborów, jakie mogą tkwić się dostrzegalne czyli
    nieoczywiste ale raz Nasuwania przemienić miłuj zawartość możliwości wyrasta.
    Masa naszywce będzie podpierać się na obu procedur w rowerze,
    względnie gwoli niezgodnych standardowi realiach ceń przez powielenie poszczególnych wiadomościach w obu zwyczajach, żeby
    pobrać dogodności obu.

Post a Comment

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s