Danish Supreme Court Sets High Bar For Evidence In File Sharing Cases
from the good-for-it dept
One of the complaints that many have made concerning various file sharing lawsuits is how rightsholders too often rely on highly questionable or weak evidence. Over in Denmark, where efforts against file sharing by record labels and the IFPI have been aggressive, the Supreme Court has now deemed weak evidence insufficient for such cases. The case involved a guy who was accused of sharing 13,000 tracks. The court eventually decided he should pay $1,900 -- significantly less than what the record labels requested. The main reason for the lower dollar amount was the limited quality of the evidence by the "anti-piracy" group Antipiratgruppen:APG used techniques which scraped the index of the files said to be being made available by the defendant and then linked them back to his IP address, a method which has been acceptable in the past. But while the Court accepted that some sharing had occurred due to the defendant’s confession, it wasn’t satisfied that the index was an accurate representation of the files physically present on the defendant’s computer.Nice to see some courts recognizing that just having an IP address is not enough evidence on its own.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: denmark, evidence, file sharing, supreme court
Reader Comments
Subscribe: RSS
View by: Time | Thread
What U.S. court has ever held otherwise? I think you don't understand that having an IP address allows a rights holder to file a lawsuit. Once the suit is filed, they can subpoena the identity of the subscriber of that IP address from the ISP. And then from there, they can commence further discovery against the subscriber. And, yes, they can send them a settlement agreement if they so wish. NOBODY'S SAYING THAT AN IP ADDRESS IS ENOUGH EVIDENCE ON ITS OWN. Total strawman, and if you actually believe that, it shows you have no idea what's going on. The IP address is just the starting point.
HOW ELSE is a rights holder supposed to identify those who infringe their works? What other evidence could they have to go on but the IP address? Answer me that. Tell me what better way there is.
The fact is that you hate the settlement agreements, and you'll make up anything to try and discredit the system. The system makes sense. You're not looking at that bigger picture (as you almost never do), and you're not considering how a rights holder is supposed to be able to protect their rights against those who abuse them.
More Techdirt FUD.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
http://www.youtube.com/watch?v=XXK8hZYcc0Q
THis is one of the Representatives of Congress challenging the call in open forum.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
Care to say anything of substance? Or are you going for a streak of pointless observations?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re:
You are correct that a lot of courts have held that IP addresses are not sufficient. Yet, ACTA, Hadopi, and most laws proposed by the the industry rely entirely on IP addresses and logs of IP addresses. The legal notices that universities are required to pass on to students and cutting off students from the Internet are based entirely on logs of IP addresses. IP addresses don't identify individuals, and logs are often wrong. Yet the industry wants to use them as sufficient evidence to assess very real penalties.
Yet the industry persists on wanting laws to cut off entire households and businesses based on nothing more than accusations based on IP addresses. In fact, the laws do not even require that much proof, just an accusation based on whatever basis the accuser wishes to use. At least some of the posters under the AC banner seem to think that just reading TD or posting her would be sufficient evidence of piracy; at least they have tossed around the accusation freely here.
[ link to this | view in chronology ]
Re: Re:
It'd be as if a crime occurred inside Joe's Pizza Parlor and the lead detective said, "Well, it happened in Joe's shop, so obviously we should take away Joe's business license. Yup, that'll solve everything!"
Here's the problem: I like pizza, my friend, and I don't think I should be kept from Joe's sweet garlic artistry just because some hooligan chose to rob a purse inside his parlor....
[ link to this | view in chronology ]
Totally random
"Perps pilfered a person's purse in Pete's pizza parlor. Police permitted to permanently prevent Pete from purveying pizza."
[ link to this | view in chronology ]
Re: Re: Re:
The number itself doesn't prove who did it, but it does give them a real live person to start talking too; i.e. the party who contracted for that phone connection.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
Not exactly true. We know that an IP address indentifies a single connection. There is no way for anyone to know what is on the other side of that connection until discovery is made. Also, in the case of end users on an ISP, an IP address (obtained with a username / password on login) identifies a single account holder.
Legally, it needs to be seen the same as a single phone. While you may say SODDI when you get the bill for all those 976 numbers you called for "psychic advice", it is pretty hard to get out of your responsibility for your own phone line. If you as an internet subscriber allow others to use your connection, or have devices like wireless on your connection, you should be responsible for what happens on it.
Joe's shop should probably keep logs of all the MAC addresses that use their service, or perhaps have the ISP "pass through" IP addresses rather than assigning them locally. That would change everything, wouldn't it?
[ link to this | view in chronology ]
Re: Re: Re: Re:
That is how easy I can spoof your IP.
Do you really want to equate an IP to a fixed residential phone number or car plates?
MAC addresses are crap too, since I can use a virtual router that will have its own MAC address and be viewed by other machines as real hardware.
You are not a tech guy, why are you trying to define what should or should not be when you clearly don't understand how things work?
[ link to this | view in chronology ]
Re: Re: Re: Re:
Maybe more important is why I'm wasting my time with you.
Have a nice day.
[ link to this | view in chronology ]
Re: Re: Re: Re:
Really? My public library would disagree with you on this. Free WiFi with no registration, just walk in, sit down and connect. And it's that way because the people who fund the library (us hard working taxpayers) want it that way.
[ link to this | view in chronology ]
Re:
Let me get this straight: you use your only evidence - and IP address - to try to discover the person you want to sue.
Let me be clear here: you have absolutely no more evidence, correct? Then:
"...NOBODY'S SAYING THAT AN IP ADDRESS IS ENOUGH EVIDENCE ON ITS OWN. Total strawman, and if you actually believe that, it shows you have no idea what's going on. The IP address is just the starting point."
Is a complete logic failure. Your only evidence *IS* an IP address. You just used that evidence to try to obtain a name. What are you trying to argue here again? That that discovery process is a waste of time because your evidence is so weak? If so, then we agree.
"HOW ELSE is a rights holder supposed to identify those who infringe their works? What other evidence could they have to go on but the IP address? Answer me that. Tell me what better way there is."
You tell me. It is not our job to defend the indefensible.
[ link to this | view in chronology ]
Re: Re:
It's incredibly simple. You idiots keep trying to make it difficult. It's hilarious.
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
Let's do an analogy. (I know most of you don't understand how analogies work, but I'll try it anyway.) Say that your car was used as a getaway vehicle in a bank robbery. The cameras at the bank caught the license plate number as clear as day. Are the cops going to get a warrant and show up at your house to investigate? You better believe it. Maybe the car was stolen the night before, or maybe your son's friend had a copy of the key, and he borrowed the car to commit the crime. None of that matters to the issue of whether or not the cops can get a warrant. The license plate is the starting point of the investigation.
Now, some of you are making the argument that since IP addresses don't conclusively prove who the infringer is, there should be no lawsuit. That misses the whole point. Does the fact that your car was used in a robbery necessarily mean that you are the robber? Of course not. Does that mean the cops can't get a warrant and investigate you? Of course not.
The lawsuit allows the plaintiff to attempt to figure out who the infringer is. It's really, really simple.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
"We have absolute proof your car was involved in a robbery. Unless you pay us $50,000 dollars by Friday, we will be forced to sue you and pursue criminal charges against you. As you are probably aware since you are a robber Charlie Manson is looking for a new roommate and our attorneys assure us we will be able to collect at least 4 million dollars from you and your family. We will only make this generous offer one time because we don't like to make deals with criminals but we are, after all is said and done, a kind and loving corporation so we feel compelled to at least give you this one fleeting chance to redeem your immortal soul.
p.s. failure to respond to this offer will be interpreted by the courts as admission of guilt."
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
In the real world and in the virtual world people are rightly indignated by either one.
If cameras cannot be trusted to point to a real car nobody in their right mind would approve of such a system, why do you want others to rely on flimsy evidence to start such serious things?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
An IP alone can't even prove conclusively that a computer was in the system, are there easy ways to hack a traffic camera to spoof cars and keep sending thousands of fake images with random car plates?
Would the police use such a system to start proceedings against others and not suffer a backlash for accusing a lot of innocent people?
IP poisoning is a common tactic in every P2P network out there.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
They have a licence plate number, and an electronic hash checked video log that is not only probable but also relevant in nearly all jurisdictions worldwide.
But that is not all, they also have the vehicle make, shape, colour, and other distinguishing marks of that vehicle, and hopefully an image (or shadow) of someone within that vehicle in the drivers seat.
They then match via the Registration plate on a probable database that that specific make, colour and type of vehicle actually belongs to that plate and on the basis of that obtain warrant (actually they would do a search on priors of the owner of the vehicle first too just to tick all boxes) to question and impound vehicle (if found) for forensic purposes.
Whereas with an IP address there are no probable parts to it. It is a factoid and by itself has no identifiers to any one or more individuals, there is no contextual basis and no probability of the methodology that obtained that IP in the first place alleging that something was infringed.
As in your analogy the Onus is on the LEOs to prove there is reasonable suspicion.
In the current regime with IP address's in the USA and elsewhere the full onus is on the alleged infringer to prove there is no reasonable suspicion.
There is no probability in the beginning, which is why some courts (Australia being the latest) have stated that the prima facie evidence gathered by the License Holders must be unequivocal and cogent
Which an IP address alone is not, especially when backed up by ambiguous affirmations by biased parties.
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
Are we going to start suing everyone with inconclusive evidence?
That somehow doesn't seem to be right or appropriate due to the ever present threat of abuse of such a system.
[ link to this | view in chronology ]
Re:
I agree that they have a right to protect their works, and I for one support that right 100%. If they wish to accuse someone of infringment they should simply take it to court. Sending a threatening letter to someone is far from the appropriate way of doing things. Especially when it says pay up or we will do substantial financial harm to you. Nothing more, nothing less.
I use p2p for moving files around on my servers in an efficient manner. Those files are all legitimately mine, and my p2p hosts are private to me. Having them scan my IP Addresses, determine I have P2P running and then sending me the bullshit letters IS extortion.
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
Thats not extortion? they are banking on you settling, they don't care whether you are guilty ot not, whether the evidence would stand up in court they just hope that the thought of going to trial and spending all the money/time is too much and you'd rather just cough up a smaller amount.
Scum, the lot of 'em.
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Excuse me?!
WTF!!! The court system is/was NEVER intended for someone to PROVE their innocence! You ARE INNOCENT, UNTIL PROVEN GUILTY. Quit using the court system as your business method you intrepid little f*ck!!!
And you wonder why we have so little respect for those on the other side of this debate?
[ link to this | view in chronology ]
Re: Excuse me?!
And you wonder why we have so little respect for those on the other side of this debate?
Hey dipshit. Once the plaintiff proves their case sufficiently, the burden shifts to the defendant to prove their innocence.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
Can people use the system for free to defend themselves?
The other side have no rights, they have no evidence.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
I'm curious here. Would you support a change in the legal system where the litigators are capped on what they can charge for legal representation?
Some sort of flat fee for legal fees that would equal the playing field between large corporations with endless money and the average person scraping by paycheck to paycheck?
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
And this is why you should never talk to cops. :)
[ link to this | view in chronology ]
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re:
Suppose I take a copyrighted painting and chop it into a million pieces.
If I pick up 900K pieces and glue them together in a random order, and them try to sell them or give them away, am I committing copyright infringement?
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
Please try and not get the two things "Stealing" and "Infringement" mixed up, it does nothing for your arguement.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
So lets say we have a 700MB movie made up of 1024 bits, a client will try and download those bits from seeds/peers in the swarm, it won't start at bit 1 then 2, 3, 4 and so on it will download bits at random from whoever it gets connected to based upon what you need to complete the file and what they are offering. You could be at 99.9% with only 1 bit remaining and until that bit falls into place you have a pile of garbage taking up space on your hard drive.
If I never get that last bit but continue to sshare the other 1023 bits am I infringing? I cannot give anyone the whole file.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
must insist on calling all you can infringement.
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in chronology ]
Re: Re: Re:
It also seems it's incredibly irritating to you, which is also incredibly funny to watch. lol
[ link to this | view in chronology ]
I think the court here got this very wrong. If the IP address and the index of files is more than enough to allow the file sharing to happen, it should also be enough to work from legally. Otherwise, they have once again created an unbalanced situation that would have to be addressed by the lawmakers in that country.
Any legal judgement without balance is a poor judgement, no matter which way it falls.
[ link to this | view in chronology ]
Re:
[ link to this | view in chronology ]
Re: Re:
Your answer is a pat answer that does nothing.
[ link to this | view in chronology ]
Re: Re: Re:
You are ignoring so much evidence as to make yourself irrelevant in the argument. There continue to be secondary markets that can be exploited along with avenues to tap for growth. Ex1 - compete with netflix. Ex2- MAKE PEOPLE PAY FOR ACCESS! Ex3- And this is a big one... Stop suing people for dubious claims of infringement!
If you want to remain ignorant of all the information that says these lawsuits are frivolous, I can't stop you. You just have my pity.
[ link to this | view in chronology ]
Re: Re: Re:
Go and please study up.
Of special note is the FACT that people should recognize the lower price points that people have to entertainment in certain fields. You can't talk for millions of people. Talk for yourself.
The market changes and those that want money from it, have to adapt to it.
[ link to this | view in chronology ]
Some perspective
In Denmark a "pirate group" surfaced to oppose the antipirates. And they started informing people that they should just ignore such "extortion" letters, as nothing would happen if the letters were ignored. Soon everybody knew.
This forced the anti-pirates to start a few court cases. Of course they started with cases where the accused had replied and admitted to using a p2p-program. The case mentioned here is one of these cases.
This caused our local pirate group to explicitly warn people not to admit anything, as only people who had admitted to file sharing would be sent to court.
We think that this again made the number of settlements (a number kept secret by the anti-pirates) to fall, as they took a few cases to court where there was no admission of file sharing. The anti-pirates lost these cases in our High Court in 2008, with judgments saying that copyright infringement by the internet subscriber could not be proven if the subscriber had an open wireless network or if more than one person had access to the internet connection. This made the anti-pirates stop their "extortion" campaign.
The recent judgment by our Supreme Court is interesting for several reasons:
1) The decision says that a screen dump taken by the anti-pirates is not sufficient evidence that the works listed in the screen dump were actually shared. No prior court case in Denmark explicitly said if this could be used as evidence, and the screen dumps - which can trivially easily be falsified - were the basis for the "extortion" campaign.
2) Previous judgments from our High Court had established a "double damages" principle. This meant that if the court thought you had shared ten CDs each costing US$15 in retail, you had to pay US$300 in damages. In this decision, our Supreme Court clearly said that this principle does not apply in cases of non-commercial file sharing.
3) The only reason the defendant had to pay any damages was because he at an early stage (after receiving his "extortion" letter, but before any court proceedings started) had admitted to the anti-pirates that he digitized around 500 vinyl records he owned (legal here), and shared them with a file sharing program for a few days (illegal for copyrighted works without permission). All other "evidence" was tossed out by our Supreme Court.
[ link to this | view in chronology ]
Incomplete files
[ link to this | view in chronology ]