"Megaupload employees apparently knew how the site was being used. When making payments through its “uploader rewards” program, employees sometimes looked through the material in those accounts first. "10+ Full popular DVD rips (split files), a few small porn movies, some software with keygenerators (warez)," said one of these notes. (The DMCA does not provide a "safe harbor" to sites who have actual knowledge of infringing material and do nothing about it.)
In a 2008 chat, one employee noted that "we have a funny business... modern days [sic] pirates ," to which the reply was, "we're not pirates, we're just providing shipping servies [sic] to pirates ."
Employees send each other e-mails saying things like, “can u pls get me some links to the series called ‘Seinfeld’ from MU [Megaupload]," since some employees did have access to a private internal search engine.
Employees even allegedly uploaded content themselves, such as a BBC Earth episode uploaded in 2008.
Other messages appear to indicate that employees knew how important copyrighted content was to their business. Content owners had a specific number of takedown requests they could make each day; in 2009, for instance, Time Warner was allowed to use the abuse tool to remove 2,500 links per day. When the company requested an increase, one employee suggested that "we can afford to be cooperative at current growth levels"— implying that if growth had not been so robust, takedowns should be limited. Kim Dotcom approved an increase to 5,000 takedowns a day.
Employees also had access to analytics. One report showed that a specific linking site had “produce[d] 164,214 visits to Megaupload for a download of the copyrighted CD/DVD burning software package Nero Suite 10. The software package had the suggested retail price of $99.” The government's conclusion: Megaupload knew what was happening and did little to stop it."
http://arstechnica.com/tech-policy/news/2012/01/why-the-feds-smashed-megaupload.ars