US Copyright Group, Hurt Locker Producers Sue Dead Man & Others Unlikely To Have Infringed
from the collateral-damage dept
Most of US Copyright Group's lawsuits haven't been going too well -- including the decision to completely drop the case for Nu Image, the producers of The Expendables. USCG's other "high profile" case, however, involves the movie The Hurt Locker, and it continues to move forward. While judges in other cases have been rejecting these mass "fishing trip" lawsuits, knowing full well that they're being used to shake down people to "settle" despite being outside the court's jurisdiction, it appears that USCG got "lucky" with the Hurt Locker case, in that the case was handed to Beryl Howell. Howell, of course, was an RIAA lobbyist not long before becoming a judge, which certainly calls into question her impartiality in such a case -- especially when her rulings seem to contradict just about every other judge who has received one of these mass lawsuits.In this case, brought on behalf of producers Voltage Pictures, by US Copyright Group (really DC law firm Dunlap, Grubb and Weaver), 24,583 people were sued based on IP addresses. And while most courts have cut out those outside of their jurisdiction, Judge Howell seems to have no problem with USCG getting subpoenas sent all over the country. And, with so many people sued on such flimsy evidence, it's no surprise that many receiving notice from their ISPs of the subpoena are shocked and insist they have nothing to do with it.
In some cases, their claims are pretty compelling -- such as the case in which the notice was returned... because the recipient was dead.
The sampling of letters, however, certainly suggests a fair amount of collateral damage from filing lawsuits on such weak evidence. While some may insist that (1) some of these people are lying or (2) they can just prove their innocence in court, I would suggest that you're not recognizing just how traumatic it can be to get sued, especially if you're not that familiar with the law and, indeed, have no clue why you're getting sued. It's exactly this situation that USCG and Voltage Pictures were counting on with this process, so kudos to Judge Beryl Howell for making the lives of a bunch of innocent people a living hell.
Here are just a few of the letters. More can be found at the link above:
The Pinestead Reef Resort in Traverse City, Michigan:We object to the suit given the fact that we operate a Timeshare resort named Pinstead Brief Resort that is 46 units all of which have a Wi-Fi connection using our IP address. We have numerous users at various times and are unable to monitor or control what they are doing on the computer in their room... I can assure you that the movie was not downloaded from any of the 5 computers that we use in our office on a daily basis.MidAtlanticBroadband Hospitality Services of Baltimore, Maryland:MidAtlanticBroadband Hospitality Services is filing an objection to provide information as our information is irrelevant, as we are not the end-user nor do we have any information related to the actual usage of this IP address.A woman named Sarah, no address given:I am objecting to the disclosure and release of my identifying information by Charter Communications Inc. on the grounds that I’m not the owner nor have I ever owned the computer with the MAC IP address [sic] that they are claiming illegally downloaded the copyrighted work. When this download took place I was living in a college apartment with roommates and we all shared the wireless network. I had opened the account and my roommates each paid me a portion of the monthly bill since we all shared the same wireless network. When I contacted Charter Communications Inc. regarding the subpoena to inform them they had the wrong person named for the download they said it could have been anyone in the apartment complex and that I was named as a potential defendant due to my being the one that set up the account.Ann from St. Louis, Missouri:As a soon to be 70-year-old woman, I can assure the court that I have neither downloaded or distributed ANY copyrighted work as alleged in this lawsuit. Thank you for your consideration.Rick from St. Louis, Missouri:I did not download this movie. From a telephone conversation with Charter Communications’ technical customer service I learned it is possible someone outside my home may have compromised the IP address and downloaded the movie without my knowledge.
Charter further advised me to place a lock on the wireless router to help prevent people from hacking into the system and using my IP address. This has now been done.
Take pay cuts over the past years, having a disabled wife and struggling to support a family, I do not have the money to hire an attorney to protect myself especially in this case where I did nothing wrong.
Thank you for reading this Techdirt post. With so many things competing for everyone’s attention these days, we really appreciate you giving us your time. We work hard every day to put quality content out there for our community.
Techdirt is one of the few remaining truly independent media outlets. We do not have a giant corporation behind us, and we rely heavily on our community to support us, in an age when advertisers are increasingly uninterested in sponsoring small, independent sites — especially a site like ours that is unwilling to pull punches in its reporting and analysis.
While other websites have resorted to paywalls, registration requirements, and increasingly annoying/intrusive advertising, we have always kept Techdirt open and available to anyone. But in order to continue doing so, we need your support. We offer a variety of ways for our readers to support us, from direct donations to special subscriptions and cool merchandise — and every little bit helps. Thank you.
–The Techdirt Team
Filed Under: collateral damage, copyright, hurt locker, ip addresses
Companies: dunlap grubb & weaver, us copyright group, voltage pictures
Reader Comments
Subscribe: RSS
View by: Time | Thread
Can you explain which of her rulings you're looking at, and which other judges' rulings you're looking at that she has contradicted? I doubt it.
In some cases, their claims are pretty compelling -- such as the case in which the notice was returned... because the recipient was dead.
That doesn't mean that person didn't infringe before he died. I know how desperate you are to say anything at all bad about copyright plaintiffs (while you celebrate and defend pirates everywhere), but the fact that somebody died is meaningless without more information. You of course know this, but you're too busy spreading FUD to care.
[ link to this | view in thread ]
Pretending to be deceased?
Might be interesting next time a mass mailer is sent out from a law firm if thousands of defendants claimed after-life status. Would the law firm be obligated to check into every single one, and what kind of drain would that have on their resources?
[ link to this | view in thread ]
I agree with comment 1, it's mostly FUD. The customer with the Wi-FI left it open, and just like long distance charges on their phone line, they should be liable. They are not "service providers", they are end customers.
As for the dead guy, have you considered that he infringed before he was dead?
[ link to this | view in thread ]
Justice?
[ link to this | view in thread ]
Re:
God you're awesome....
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Pretending to be deceased?
If you typed "Beryl Howell" into that box and click on the search button (with your mouse) you'll find exactly the answers to your questions:
http://www.techdirt.com/search.php?cx=partner-pub-4050006937094082%3Acx0qff-dnm1&c of=FORID%3A9&ie=ISO-8859-1&q=Beryl+Howell
Here's a pro tip: Next time, be informed before you start accusing people of spreading 'FUD', or people will start to call you out for spreading your own 'FUD'.
[ link to this | view in thread ]
Re: Re: Pretending to be deceased?
I am also clearly new to the "Internet"
[ link to this | view in thread ]
Re:
If you typed "Beryl Howell" into that box and click on the search button (with your mouse) you'll find exactly the answers to your questions:
http://www.techdirt.com/search.php?cx=partner-pub-4050006937094082%3Acx0qff-dnm1&c of=FORID%3A9&ie=ISO-8859-1&q=Beryl+Howell
Here's a pro tip: Next time, be informed before you start accusing people of spreading 'FUD', or people will start to call you out for spreading your own 'FUD'.
[ link to this | view in thread ]
Re:
Link
First paragraph:
Last week, Washington, DC federal judge Beryl Howell ruled on three mass file-sharing lawsuits. Judges in Texas, West Virginia, and Illinois had all ruled recently that such lawsuits were defective in various ways, but Howell gave her cases the green light; attorneys could use the federal courts to sue thousands of people at once and then issue mass subpoenas to Internet providers. Yes, issues of "joinder" and "jurisdiction" would no doubt arise later, but the initial mass unmasking of alleged file-swappers was legitimate.
Tsk, tsk, tsk. Troll better next time.
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re: Pretending to be deceased?
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re:
An F for the trolling.
[ link to this | view in thread ]
Re:
I'm sure he might have a wedding ring and some gold fillings you can pull from his interred corpse to pay for that infringement. But for you guys I would think that the only good pirate is a dead pirate and leave it at that.
[ link to this | view in thread ]
Re:
I disagree with this analogy. It's not a fee assessment, but a criminal liability. It would be like a person being liable because a harassing phone call was made from a phone number registered in their name.
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re:
Go to that website using Netscape 3.0 or 4.0b1 and he will show you how people can send an email from your computer without your consent.
Today is even easier to do that kind of stuff since people keep adding extensions and apps to their phones and web-browsers.
Are you one of those that enable scripts everywhere you go on the internet?
[ link to this | view in thread ]
Re: Re:
You simply haven't shown me that there was a contradiction. Nor have you shown that what she ruled was improper or reversible on appeal. It's FUD.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re: Re:
I can only help you so much. If you can't see that her ruling of mass IPs goes against tradition set as far back as the RIAA's sue em all strategy, I can't help you.
[ link to this | view in thread ]
Lets suppose someone claims that I illegally downloaded something and presents my IP address as proof.
In case I am innocent, how do I prove that I am indeed innocent? How do I prove that that IP address did not do the things they say that it did?
Also, how do they prove that they legitimately acquired that IP address, and that it did, in fact, do the illegal downloading? How do we guarantee that they didn't just pull IP addresses out of their ass?
[ link to this | view in thread ]
Re: Re: Re:
If Mike is wrong, why don't you show us evidence then?
[ link to this | view in thread ]
Re: Re: Re:
The fact that you've already made up your mind it's 'FUD' yet refuse to bother looking up the facts yourself is pretty telling... I suspect you don't even want to know the truth - can't take the risk it might lead you to form a reasoned opinion.
Who's the one spreading the 'FUD' here exactly?
[ link to this | view in thread ]
Re: Re:
I'm with you. We're not talking about a phone bill with charges on it because I let someone else use my phone. We're talking about tortious/criminal acts being committed using my phone line. I think there's good arguments for holding the subscriber responsible for the acts of others, like on a negligence theory, but I don't think the phone bill analogy is apt.
[ link to this | view in thread ]
Re: Re: Re: Pretending to be deceased?
[ link to this | view in thread ]
Re: Re: Re:
Why should it be considered "FUD" when assholes act like assholes?
[ link to this | view in thread ]
Re: Re: Re:
I hope you are one of those people who have the scripts enabled all the time LoL
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Pretending to be deceased?
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re:
Every computer that connects to a network sends its MAC address that is unique, it can be spoofed but not many hackers do that today yet.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re:
And that's the thing: none of the "evidence" produced by the companies bringing these suits has any merit. They haven't done anything to actually prove that it's real. (And this is generously presuming that they have any clue what they're doing...which, given their history, is very much in doubt.)
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
[ link to this | view in thread ]
Re: Re:
You might also want to try it under windows 3.1 to see how it goes. Dumbass.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re:
Hey, I just figured out my phone company and the pizza delivery I use are not service provider either! They should be liable for everything. Like, if they send pizza somewhere owned by the Mafia (not the MAFIAA though) they should go to jail for money laundering or racketeering or something!
[ link to this | view in thread ]
Re:
Additionally, you realize that wifi encryption is hackable, right? WEP is the security equivalent of wet tissue paper, and many people own routers which only support WEP. Does owning an old router impart liability?
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re:
Over and over again, you bring this complete bullshit out. I'll just start cut and pasting my comments from the last time.
"Long distance calls made on your phone is a billing issue between you and your phone company. And its a near certainty that you signed or agreed to be held responsible for the billing costs of those calls when you got the service.
A copyright infringement claim is a legal issue between you and a third party copyright holder. I would consider it highly unlikely that you signed an agreement with the copyright holder to be held legally responsible for copyright infringement that occurred on an IP address that happened to be leased to you at the time of infringement.
If someone breaks into a house and calls in a bomb threat from the phone, I have no problems with the police using the subscribers information as a starting point for an investigation into the identity of who called it in.
Under the law, I don't have a legal argument against a copyright holder filing an individual infringement suit for discovery of additional evidence against an individual unknown holder if they have more than just "this IP address was detected sharing content" - and then using the subscriber info from the ISP for further evidence collection that they have the correct person who was sharing the content."
[ link to this | view in thread ]
Re:
Civil action doesn't require anywhere near the level of proof you are claiming, only a preponderance of evidence. That is to say that reasonable doubt isn't an issue here.
It's the reason OJ technically isn't a murderer, but he is paying out a huge civil settlement for the rest of his life as a result of it.
The IP address is not the only thing on the table, it is the tool used to get the ISPs to release customer information. Beyond that, we cannot see at this point what they have in their case.
For a logician, you really seem to fail at basic logic.
[ link to this | view in thread ]
Re: Re: Re:
Then you are more stupid than I ever could be LoL
http://www.computerworld.com/s/article/9217912/Microsoft_exploits_uproar_over_Firefox_4_s_ret irement_to_beat_IE_drum
http://www.zdnet.com/blog/security/microsoft-expecting-exploits-for-criti cal-ie-vulnerabilities/9244
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re:
Ah, good, so I can rent a car or a gun and go rob a bank and it will the fault of the OWNER of the car/gun, and not me, since the blame doesn't fall on the ACTUAL person committing the offense. Thanks for clearing that up.
And yes, I know I just made a car analogy, but at least it wasn't how the car itself is like digital data.
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re: Re:
Eventually the same will happen to USCG.
A word of advice: "You'll look bad if you continue to defend these scammers. "
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re:
Alright this is like the 3rd time in this post that one of you shilltards (notice they are ALL AC's too) has brought this up. Here is your answer:
SO FUCKING WHAT?
The guy is DEAD, get it? So WHAT if he infringed while alive, he is DEAD. Don't you understand DEAD?
HE IS DEAD. Any claims or attempts at relief against him died with him.
Get a fucking clue, and Troll Harder next time.
[ link to this | view in thread ]
Re:
Also, how do they prove that they legitimately acquired that IP address, and that it did, in fact, do the illegal downloading? How do we guarantee that they didn't just pull IP addresses out of their ass?"
FINALLY, and AC with a brain! These are EXACTLY the questions that should be asked when a case like this comes up. No one does, however, as the lawyers, government and judiciary are all content to accept IP=GUILT without question. There is NO vetting of the legitimacy of the accusations, there is only "you MUST be guilty because we have an IP address" and the shilltrolls support this 100% without any proof required. The accused is left to prove they DIDN'T (a negative).
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Have you no shame???
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
The basic problem is that the correctness of the identification relies on the integrity of several pieces of s/w (Bit torrent itself, the ISP 's s/w and the s/w used to harvest the IP addresses. ALL s/w has errors. None of this information should ever stand up in court. It falls far short of what is required as evidence.
[ link to this | view in thread ]
Re: Re: Re:
If he knew anything at all he would know that this is an extortion scam - ands he wouldn't defend it.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
WRONG
They are suing a dead guy is entirely the point.
This demonstrates they are willing to sue anyone and everyone regardless.
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re:
Really? Please cite your source for that. MAC spoofing has been going on for years.
The connection table on my wireless router shows the MAC of each connected client. There are no forensics involved. Only eyes and a connection to the firewall on port 443 through a web browser. Your average computer user may not know where to look, but you don't need a degree to figure it out.
I think the whole shakedown is stupid, but let's be intelligent about this. Saying that people aren't spoofing MAC addresses or that you have to be some sort of computer god to see that people are connecting to your network are things that will hinder the argument because they will be used in the next straw-man argument by people on the other side.
In the proud tradition of /., I propose a car analogy. Judges seem to understand cars. If I have basic protection on my firewall, that's like having a basic car door locks. If someone breaks in, takes my car, and does something illegal then I should not be liable, even though the car belongs to me. I am one of the victims. Even if I leave the doors to my car unlocked and someone uses my car to run over old ladies and kittens, I am not liable for vehicular manslaughter and willful destruction of kittens.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Oh, you mean there must be no legitimate reason for unencrypted wifi, right?
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re:
This.
Further, although it's more difficult, it is possible and practical to crack WPA and WPA2 as well as WEP. It's done daily. So even those owning modern, locked-down APs could find themselves open to this kind of extortion.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
This demonstrates they are willing to sue anyone and everyone regardless.
They're suing a John Doe. They're suing an IP address. If the subscriber of the IP address is dead, how could they possibly know this when they sue? They can't. They don't know who the subscriber is. That's why the ISPs are subpoenaed in the first place, to put a name to the IP address.
[ link to this | view in thread ]
Re: Re:
True. Although if the only evidence is that a given IP address was used to infringe, that's very far from "a preponderance of evidence."
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
Let's say you get drunk, go driving, and crash into my parked car. You die the next day. You can bet that I will sue your successors for the repair of my car.
[ link to this | view in thread ]
Re: Re: Re: Re:
When somebody dies, their estate is liable for whatever debts they owe. I think you're missing that major point.
They didn't sue a dead guy. They sued a John Doe, known only by his IP address. This means that: (1) they don't know the identity of the subscriber of the IP address, and (2) they couldn't possibly know if that person is now dead.
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re: Re:
"The connection table on my wireless router shows the MAC of each connected client. There are no forensics involved. Only eyes and a connection to the firewall on port 443 through a web browser. Your average computer user may not know where to look, but you don't need a degree to figure it out."
Show for a limited time it gets overridden eventually hence the need to log the table and setup the software to do it which is out of the competence of ordinary people.
And I don't care what you do with your connection, I'm not the one trying to say he is guilty, just showing that today he would be screwed, maybe I was not very clear on that point so I apologize, what I was trying to say is that because judges are IT ignorant and lawyers are bloodsucking fuck ups he probably would be screwed since nobody in the legal department seams to believe that trying to secure a million lines of code or more for thousands of different setups from thousands of manufacturers around the world is like trying to secure a thousand acres farm from people trying to pass through it, or doing something wrong inside it, it ain't gonna happen, computers are deceivingly small, but the knowledge necessary to secure that crap is not and the human able to do it was not yet born, not even a team was put together.
[ link to this | view in thread ]
Hurt Locker producers
[ link to this | view in thread ]
Re: Re:
Also, could you say that you are providing a service in having an open wifi network as a defense?
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re: Re: Re:
Here in the UK we are far more civilised If someone is dead no case can be brought to them or their family. I understood the same in USA am I wrong? someone tell me even the copyright trolls are not that despicable.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re:
on all 23,000 J.Does.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
As other judges have noted, they're suing to get names and addresses in order to extort settle payments without evidence that the individuals connected to the IP addresses are the actual infringers. Since lawyers tend to cost a lot and not a lot of people have discretionary funds set aside on the off chance they'll be randomly sued because they chose to pay for an internet connection, they are inclined to settle even if they didn't commit the alleged act.
If you don't see anything wrong with this scenario, you need to take an ethics class.
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
Re: Re:
When they start geting subpoenas for infringement, maybe they will understand the beef that people have with the whole IP address = DNA fallacy.
Of course they will get off the hook, but whatever defense they use will then be usable by everyone else.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re:
No, if they do that then they will be worthless to their paymasters. It is best that they clear their mind of all truth and reason and continue to state the opinion they've been paid to say.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
If your IP address is used to infringe, that is evidence that you, the subscriber of that IP address, is the infringer. It's not conclusive evidence, but it's probative and material. It's relevant. It's enough to subpoena your ISP for your identity.
I agree with you though that they only want to "extort" payments. They're simply offering to settle in lieu of a protracted lawsuit. While it's distasteful, I don't think it's illegal or immoral.
[ link to this | view in thread ]
Re: Re: Re:
Yes - and that might be OK if it were a real lawsuit - but we know that it isn't. When they get identifying information USCG won't be starting by asking polite questions -they will be sending a demand for cash to make a threat go away. They are reckless as to whether they are threatening inniocent people or not - and that is why it is extortion rather than a real lawsuit.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
What if the dead guy owed millions of dollars to someone else when they died. Do you share in the loss too? What if the dead guy authored some books. Do you get publishing rights? Can you make a movie from their works? What if right before he died, he donated all of his possessions to a charity...can you now extort the charity?
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
But what I really wanted to say is that your drunk driving analogy is deeply flawed. In your analogy, real damage was done. In the case of copyright infringement, none (or so close to none that the difference is negligible) has been done.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
And there is the problem. They sued a complete unknown, about whom they knew nothing. The IP address is indicative of the identity of the infringer. That's how they end up suing a corpse.
This is no different than being wronged by some unkown person in your neighborhood and so suing arbitrary people who happen to live nearby. It's flawed, unjust, and plain wrong.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
In my state you sue the successors, not the estate. You can't sue the estate because it's not a juridical entity. So "sue the successors" is correct for the state I live in. I understand what you're saying though. It is a bit confusing.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
By the same logic, only people who are doing something wrong have anything to hide...like their social security number, naked pictures of their wife, or embarrassing medical conditions.
[ link to this | view in thread ]
Re: Re: Re:
Yes. The literal reading of the law supports this, and it has been upheld in at least one court case.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
I disagree. Say someone commits a tort against me using the internet. How am I to find out who the wrongdoer is? All I have is the IP address. It makes sense to uncover the subscriber of the IP address. Perhaps that subscriber is the wrongdoer. Perhaps not. Chances are that once I uncover the subscriber's identity, I'll learn the identity of the wrongdoer.
They didn't sue a corpse. They sued a John Doe, known only by an IP address. It makes sense and is proper because it's the only way for a plaintiff to discover who did wrong to them.
[ link to this | view in thread ]
Re: Re: Re:
It does not matter. They tried to sue someone who is no longer able to defend themselves. Dead means that he no longer exists, legally speaking.
Moreover, have you ever tried to change an account upon the death of someone? It takes ages to do so. If they're suing a Doe that they have obtained information on, and it turns out they're dead, you don't go, "oh well, there's a little less money coming in." You go, "I'm sorry for your loss, we'll sort it out."
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
That statement indicates your ignorance. People don't subscribe to an IP address, the subscribe to an ISP (Internet Service Provider) who may assign them an IP address which is good for minutes or years. I'm not particularly inclined to trust that most ISPs are keeping sufficient records to know which customer is assigned which address at any given time.
They're simply offering to settle in lieu of a protracted lawsuit. While it's distasteful, I don't think it's illegal or immoral.
All I can say is ... you must have one f'ed up set of morals. Extortion is both immoral and unethical, and to some extent may be illegal for a lawyer. Other lawyers pulling these scams have had sanctions brought against them so it will come as no surprise when the same thing happens to USCG.
In addition to those two points, I'm amazed that you would try to argue the ethics of these types of lawsuits considering that the judge should have recused herself in the first place since she was a former representative of a related trade group with a similar legal agenda.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
Ah, good. Then this follows as well:
"If your car/gun that you rented is used to rob a bank, that is evidence that you, the owner of that car/gun, is the robber. It's not conclusive evidence, but it's probative and material. It's relevant. It's enough to subpoena your records for your identity."
[ link to this | view in thread ]
Re: Re: Re: Re:
Heck, it's built right into routers these days.
"Just go around and ask people you know how many are aware of MAC spoofing and if it was necessary to hack someone's internet, I'm pretty sure that not many people know what it is, outside a select group of people who discuss those issues."
I've known about it for years and I don't think I've ever discussed it before now. Does that make me part of your "select group"? Please, tell me I'm not part of your select group.
Oddly enough it doesn't have to be the unwashed masses that know about MAC spoofing to permit one person to use it for hiding his online activities. So I'm not sure what the point is of making this argument.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
And a shorthand way to say "subscriber to an ISP who assigns an IP address" is to say "subscriber to an IP address." I know how it works. There's no need to assume I'm ignorant just because I'm using shorthand.
All I can say is ... you must have one f'ed up set of morals. Extortion is both immoral and unethical, and to some extent may be illegal for a lawyer. Other lawyers pulling these scams have had sanctions brought against them so it will come as no surprise when the same thing happens to USCG.
There is evidence that the subscriber of the IP address (yes, I will continue to use my shorthand) is the infringer. It's not conclusive proof, but it's enough to get a lawsuit off the ground. Offering to settle with someone rather than pursue a lawsuit happens all the time, and it's favored in the legal system (most people settle before suit is brought/completed). To say it's immoral is silly.
In addition to those two points, I'm amazed that you would try to argue the ethics of these types of lawsuits considering that the judge should have recused herself in the first place since she was a former representative of a related trade group with a similar legal agenda.
I see no reason that she should have recused herself. She used to work for the RIAA. This suit was brought by a film company.
[ link to this | view in thread ]
Re: Re: Re:
I don't work for ACS or any other related company, or for anyone in the music or movie industries, or their susidiaries, or their advertising companies, or in any way related to them.
I just don't see the point here. The open Wi-Fi deal is the biggest excuse in the world, the "two black youths" of the internet. You want to pirate something? Just attach an open wi-fi and have a nice day.
What a joke!
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
And how exactly does an estate (or successors) defend against a copyright suit brought against a dead man? If they are unable to raise a meaningful defense (considering that the alleged actions where committed by someone unable to defend themselves) would an IP address be sufficient to get a civil judgement? Hardly. Just as an IP address isn't sufficient evidence to find probably cause ... well, except in the mind of someone who is completely ignorant.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Badly worded and badly thought out arguments hurt the cause. Pass it around.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Ah, good. Then this follows as well:
"If your car/gun that you rented is used to rob a bank, that is evidence that you, the owner of that car/gun, is the robber. It's not conclusive evidence, but it's probative and material. It's relevant. It's enough to subpoena your records for your identity."
Of course that follows. If you rent a car and that car is used in a murder, the fact that you rented the car is evidence that you may be tied up in that murder.
Perhaps you don't understand what "evidence" means.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
Well that's flat out wrong.
More importantly you use another example that is a poor stand in for reality. They are looking to uncover the identities of 24,000 people with one court filing. A simple examination of the IP addresses would indicate that the vast majority of those people don't reside in the district where the motion has been filed. That alone is a defect in the case which should have gotten it thrown out.
I guess when the strategy is slowly replacing impartial judges with ex-employees the RIAA and MPAA can expect a little more justice than the rest of us??
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
Tell me how a copyright holder could discover who is infringing on his copyright if he's unable to unmask the subscriber behind the IP address that's being used to infringe?
You guys do a lot of complaining, but you never offer a better alternative.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re:
The personal jurisdiction argument is interesting. What was Howell's logic? I think she said that it's premature to determine personal jurisdiction since it's only John Does being sued, and not any named defendants. I don't know enough about that to have an educated opinion. I found her arguments persuasive, but I've seen arguments the other way that are persuasive too. I'm not sure who's right on that point.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
Because collecting 25 thousand IP that don't tell you who was behind that piece of equipment it is pretty flimsy evidence, but the fact that those people you call copyright holders are having improper contacts with people and asking them money with veiled treats its all ok?
IN WHAT FUCKING WORLD DO YOU LIVE IN?
[ link to this | view in thread ]
Re: Re:
Macs are easily spoofed. Many routers and all macs (the apple/steve jobs kind) can do it out of the box through standard interface options, and it requires fairly minor digging with windows.
MAC addresses are also easily acquired, it's part of basic Wifi polling, among many other things.
Finally, many hackers spoof their mac addresses.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Perhaps you don't understand what "evidence" means."
Perhaps your reading comprehension is lacking. In the example, it was a car you RENTED, but the OWNER of the car (not you, as you are the RENTER) that gets arrested/charged for the crime.
Try to follow along better before you open your mouth to attempt to refute a point.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
It's not silly. It's extortion, plain and simple. And deeply offensive and immoral.
Not to say that all settlement offers are immoral, of course, but in these cases it's plain as day.
If you're a normal person who is innocent of infringement and you get one of these letters, you are faced with a choice: a heavy financial burden and not insignificant chance of financial ruin by having to defend yourself in court, or pay the settlement. I'd settle, despite my innocence, because the alternative is too dire.
How is that any different than a thug saying "pay me or I'll break your kneecaps?"
Settlement offers would not be immoral if the one offering them made at least a reasonable effort to ensure the person they're offering the settlement to is guilty. Unfortunately, in these cases, that does not happen. That's what makes it extortion.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
To what end? "Aha, the subscriber's name is John, therefore we now have sufficient evidence to establish infringement!".
The ip address is certainly evidence that the subscriber may have infringed, but it is not sufficient to prove that, even based upon a preponderance of evidence (as opposed to the higher standard in criminal cases).
Typically, in a scenario where you have some indicative but insufficient evidence, subpoenas are used to gather additional evidence in order to be considered "proof", that is certainly the intent at least.
The problem with all of this is that what they are not subpoenaing for further evidence, but for enough information to be able to threaten and extort.
They don't care about the truth, as evidenced by what they are subpoenaing.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Threatening to take an action you are legally entitled to take makes it not extortion. Breaking kneecaps is illegal. Filing suit for infringement is not.
Settlement offers would not be immoral if the one offering them made at least a reasonable effort to ensure the person they're offering the settlement to is guilty
There is enough evidence to instigate a suit in good faith, right? How do you figure that further effort is needed on the part of the plaintiff before offering to settle? Is that a legal imperative, or a moral one based on your personal view of morality?
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Do everyone knows how to retrieve those tables and more importantly how to monitor them and record those?
Will you give technical advice on how to monitor the network for signs of intrusion and try to recover any evidence not only from the routers/switches but from other places inside the OS and be responsible if you miss something?
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
But that is ok, when people start resorting to violence to settle this and you can bet it will come to that, I will have zero sympathy for you crazy people.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Miss-identification occurs all the time on the ISP logs, more in cases involving just collection of IP's that don't have logs of data transfers which can be done with wireshar, not only that but even if it is the right IP it doesn't prove the responsible for that IP was the one doing anything, he can be part of a botnet without knowing, he could have had his internet hijacked by others, it could have been a friend visiting.
How those that not cross your mind is just mind boggling, you suffer from tunnel vision don't you?.
[ link to this | view in thread ]
Re: Re: Re:
Only the very cautios ones and those are few.
[ link to this | view in thread ]
Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re:
And in Windows you actually have to edit the registry, how is that minor?
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re:
Spoofing IP:
The easiest way to spoof the IP in a P2P context can occur when the plaintiff uses the indirect detection method and simply queries the tracker as to what IPs are acting as peers. There is an option which allows specifying your IP address separately from the source IP address in the packet used to talk to the tracker. This allows someone to introduce any arbitrary IP address into the list of peer IPs kept by the tracker. Effectively, this means someone can frame you. Not all P2P software running on trackers is configured to allow this option. In fact, the, often cited, 2008 study done at the University of Washington indicated that only 5% of the BitTorrent trackers allowed this option. However, because of the existence of this option, plaintiffs should be restricted to using a direct method of detection for acquiring IPs to include in their lawsuits. The direct method monitors IPs address belonging to peers that are part of a swarm. This means that the IP address in question is actively involved in downloading/uploading the infringing content. It is still possible to spoof an IP address in this scenario but this is now much harder and not possible in the most typical situation. This typical situation is where you gain access to the internet with an account from an ISP. Here, you can spoof the source IP in any packet you send, but you will not be receiving packets with that IP address in the destination. Additionally, ISPs filter outgoing packets with source IPs not in the ISP's range.
Another possibility for spoofing is when the owner of the tracker falsely injects an IP address to act as a peer. This reinforces the idea that only direct detection method should be allowed. One where the plaintiff has to monitor the ongoing traffic involved in a swarm. Also, it should go without saying that the plaintiff should not control the tracker and, for other reasons, should not be the initial seed, or act as a seed, period.
My understanding is that courts aren't requiring the method of collecting IPs be detailed by the plaintiff. They should, even at the initial stage of filing a lawsuit.
Others using your IP address to infringe:
There are many different situations where multiple computers can use the same IP or multiple people can use the same computer. How can one tell who the infringing party is? The plaintiff should be required to collect information in addition to a source IP address that can help to identify the actual infringer. Information in the HTTP header can be used to fingerprint the computer involved. In my mind, this is still not conclusive evidence, but should be enough to initiate a lawsuit.
The crux of the problem is that these are civil suits, not criminal complaints. There has been no forensics done on the computer associated with the alleged IP address. It would be too expensive for the plaintiff to acquire enough convincing evidence to convict if they are going after hundreds or thousands of infringers. On the other hand it is also too expensive for a defendant to defend themselves and any option to settle rather than fight because of the expense leads to extortion.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
You can't without costing yourself a lot of money or introducing oppressive laws. It follows that the smart thing to do is to find ways to make money without relying on copyright enforcement. This site has given plenty of examples of how to do this.
However the prent case is an extortion scam pure and simple. They aren't going to use the IP information to "investigate who the infringer is". They're just going to send a demand for money. In this they are reckless as to whether the person they accuse is innocent or not.
This had been found to be against legal code of practice in the UK and the lawyers involved have been fined and banned from practising. The solicitors regulatory authority, commenting on the case said
"“Some of those affected were vulnerable members of the public. There was significant distress. We are pleased that this matter has been brought to a conclusion and hope that it serves as a warning to others."
If the US is a country with a proper legal system then the
same will happen there. USCG should heed the warning and stop this abuse now.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Ok...so you have no problem with loaning (or renting, or if its stolen) your car to someone who robs a bank with it and YOU are arrested and charged with robbery, right?
Ok. Be 'round to pick your car up tomorrow. Enjoy your time in the big house.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
Whacking a wi-fi on your internet connection doesn't suddenly give you an invisibility cloak.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
Gotta love shills.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
If you have open wifi - then you are providing a service - which makes you a service provider.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
Whacking a wi-fi on your internet connection doesn't suddenly give you an invisibility cloak.
I don't think it's that simple. If I let someone use my wifi, I might be responsible in some way for what they do, or I might not. It depends on the circumstances. But I don't think it's right to say that I'll always be responsible for whatever any invitee does on my connection.
Let's have an example. You're my brother-in-law and you're at my house. I let you use my wifi and I give you the password to get on it. You had told me you wanted to check your email. While on my wifi, you send an email to President Obama threatening to kill him. I had no idea that you were going to do this, and it was not foreseeable. Am I liable in any way? No.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
I mean, if you set up a TOR exit node, then you KNOW you are supporting infringement!
What do you have to hide?
[ link to this | view in thread ]
Re: Re: Re: Re:
This established what exactly?
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
I suspect she has no interest in determining the appropriate jurisdiction and I would go so far as to bet money that she will allow the suit to move forward (if it is actually pursued) regardless of the victim's defendant's locations.
I'll repeat, she should have recused herself; being a copyright lobbyist on behalf of the RIAA is a clear conflict of interest in a copyright case and if you can't admit that I would strongly consider cheating on your ethics exam ... it may be hard to pass otherwise.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
I'm going to say this as kindly as possible. Stop quoting pieces of text and then NOT responding to them. You used "shorthand" (which isn't really shorthand), whatever, fascinating. What you didn't address is that IP addresses are changed constantly and most ISPs don't have logging of a sufficient quality to sand up in court. Trust me, I have friends who work in computer forensics and IP addresses are sometimes a side note but never represent the bulk of the evidence.
Offering to settle with someone rather than pursue a lawsuit happens all the time, and it's favored in the legal system (most people settle before suit is brought/completed). To say it's immoral is silly.
Stop being intellectually dishonest ... and condescending. No one said that offering to settle a case is immoral. However, sending a settlement offer for a case which doesn't exist and never will is immoral. I always wish I could have a reasonable conversation with you Average Joe, but you will never pull your head out of your ass long enough to see how ridiculous you are being.
This meticulous devotion to the code of law (regardless of the moral or ethical implications) is why everyone hates lawyers. They hate you even more when you have a meticulous devotion to your own idea of what the law is rather than what it actually is (or was intended to be.)
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
"The court remains unpersuaded that the peer-to-peer architecture of the BitTorrent technology justifies the joinder of otherwise unrelated defendants in a single action," wrote (PDF) federal Magistrate Judge Joseph Spero last week before launching into a detailed analysis of how BitTorrent "swarm" activity might be mapped to existing legal notions about "acting in concert":
First, the Hansmeier declaration [about BitTorrent technology] argues at length about the "concerted activity" within a given swarm. Presumably he does so in response to the concern highlighted by Judge Ryu that users in different swarms have nothing in common other than downloading the same work, which as this court and others have noted is insufficient under our precedent. But the Hansmeier declaration itself offers overwhelming evidence that the IP addresses were in fact gathered from multiple swarms.
Second, even if the IP addresses at issue in this motion all came from a single swarm, there is no evidence to suggest that each of the addresses "acted in concert" with all of the others. In fact, the nearly six-week span covering the activity associated with each of the addresses calls into question whether there was ever common activity linking the addresses in this case. In this age of instant digital gratification, it is difficult to imagine, let alone believe, that an alleged infringer of the copyrighted work would patiently wait six weeks to collect the bits of the work necessary to watch the work as a whole. At the very least, there is no proof that bits from each of these addresses were ever assembled into a single swarm. As the court previously explained, under this court's precedent regarding other file sharing protocols, merely infringing the same copyrighted work over this period is not enough.
Finally, nothing in the BitTorrent architecture changes the fact that each defendant also will likely have a different defense."
The bold part? That's where Howell is out of concert. Of course, since she helped draft those laws, she knows how to work around the system and allow these plaintiffs to sue for settlement damages instead of doing what's right.
[ link to this | view in thread ]
Re: Re: Re: Re:
What? I'm not exactly sure what you mean, but assuming I've understood this, because I am asserting that MAC addresses are easily changed, you claim I want to tell people what to do? Are you sure you're replying to the comment you think you're replying to?
"And in Windows you actually have to edit the registry, how is that minor?"
Weren't we talking about hackers? Try to keep up.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Whether I pass the MPRE does not turn on whether I believe Howell should have recused herself. Your suggestion otherwise is just silly. She obviously saw no reason to recuse herself, and as a new judge, you'd think she'd be sensitive to the issue, erring on the side of caution in case of doubt. It seems to me that your judgment is clouded, not hers.
[ link to this | view in thread ]
"I've taken several pay cuts over the last few years, my wife is disabled, I can barely afford to feed my family much less hire a lawyer."
"TOO BAD! Pay up, chump!"
What a wonderful guy this judge is. What a shining bastion of humanitarianism.
I bet he can kill puppies and butterflies just by staring at them.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Legalized extortion is still extortion.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
You may have evidence that ISPs don't "have logging of a sufficient quality to stand up in court," but that's news to me. I'd love to see your evidence. Do share. I assume you have precedent cases you can point me to as well. I'd love to see a court that held this. I'm not saying they don't exist... I'm only saying I'm unaware of any.
Stop being intellectually dishonest ... and condescending. No one said that offering to settle a case is immoral. However, sending a settlement offer for a case which doesn't exist and never will is immoral. I always wish I could have a reasonable conversation with you Average Joe, but you will never pull your head out of your ass long enough to see how ridiculous you are being.
I actually feel in my gut that there's something wrong with it too. I've been unable to suss out exactly why it seems that way. I'm enjoying the back and forth with you because it's helping me to see the arguments. If my head seems up my ass, it's partly because I'm playing Devil's advocate on this point.
This meticulous devotion to the code of law (regardless of the moral or ethical implications) is why everyone hates lawyers. They hate you even more when you have a meticulous devotion to your own idea of what the law is rather than what it actually is (or was intended to be.)
It's not a meticulous devotion to the law. I'm trying to understand if it's "wrong" in the legal sense, the moral sense, or both. I think the law's wrong all the time, yet it's constantly evolving. If everything was perfect nothing could ever change for the better. That would be boring.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
Here are two off the top of my head:
Network traffic analysis (deep packet inspection) - this mean being directly connected to an ISPs network data and monitoring which cable modems are sending and receiving traffic.
Run a torrent tracker and torrent site - once people subscribe you would have significantly more data about them.
Of course both of those are difficult, expensive, and also likely to give false positives. But copyright law makes it quite clear that the burden of enforcing the right falls to the person who has been granted the right ... so I don't really care what they do. I'm much more concerned about false accusations and their incredible cost.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Awhile back, TorrentFreak had two lawyers come in and do an article on exactly that issue. One lawyer said "you have open wifi, you're guilty" the other said "you have open wifi, you're not guilty". Both explained their points. The former resorted to saying you are guilty due to negligence and cited a law from 1932 (or so) as precedent for said guilt. The law involved radios on boats. The other lawyer explained it in relation to how it pertains to current laws. Well, so many people were more curious about the ridiculousness of "open wifi = guilt" that the second lawyer came back and did another article this week that basically dissected the "guilty" lawyers position and broke it down and explained how it is inaccurate and won't fly in a court of law.
The article that explained why "open wifi DOES NOT equal guilt and why negligence won't fly in court" can be found here:
https://torrentfreak.com/open-wifi-and-pirates-why-copyright-negligence-won%E2%80%99t-fly-110 827/
The other two articles that originally came before this are linked to in the top of said article. Try reading it. For those of you who haven't that is. Read it all though, slowly and try comprehending it. I know there are some ACs on here who'll go read it and then then come back and cover there ears and say "blah blah blah I can't hear you" and resume the "you're guilty, it's your fault, etc" stance. That's a given, but I think that article shoots down anything they say. And yes, there has also been a recent article on TF where a U.S. judge did clearly say that an "IP address DOES NOT equal guilt, much less a specific person" and another explaining how the "evidence" used by the USCG was flawed and incorrect in quite a few cases, hence all those studios using their services dropped their lawsuits, because the evidence was shoddy at best and it'd already been stated as such by several other courts.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Two examples from my personal life. I recently contacted Time Warner Cable because of a problem with my modem. After giving them my account number, current IP address, name, and phone number it still took them 12 tries to find the right cable modem.
It is hard to find case law around the quality of logging as I don't know if anyone has ruled on it directly. Typically, there is a lot of other evidence and the IP address is a side note. I have several friends in computer forensics (both criminal and civil) and neither of them really trust IP addresses as a sufficient means of identifying someone. My friend who works for the FBI (looking for kiddy porn producers) would hardly trust an IP address to determine anything let alone consider it enough for a warrant.
It's only in civil court that such flimsy evidence could be used.
As for the immoral / unethical side of the conversation, I feel like the problem is obvious. USCG (and others like them) are not really trying to sue anyone. Knowing how you think (to a limited degree) I think you would be much more comfortable with this whole arrangement if you believed that they would ever pursue a lawsuit; however, I think we both know that they are using the court system like muscle in a extortion scam and will collect as many settlements as possible before dropping the cases against the remaining defendants.
That is a huge abuse of the justice system. I also think that you are reasonable enough to agree that the current penalties for non-commercial copyright infringement are WAAAAAY out of line with any actual harm / damages. Any lawyer in their right mind should be horrified that stealing a CD from a record store carries a smaller penalty than downloading it from a website. At least in one case the harm is quantifiable.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re:
Oh and it is pretty much clear that many of the people they targeted were innocent. I agree that the "open wifi excuse" is a joke - in fact it seems to have been pushed by the plaintiffs - because once the defendant uses it they are pretty much admitting that infringement took place via their connection. In fact they need not admit that much - there are plenty of other reasons why an innocent party being accused - one of which is that the plaintiff's IP harvesting s/w is faulty - but of course they don't care aboiut that - because they can make more money from scaring innocent people.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Umm...I'm guilty of that. I once left my computer on for two months straight, 24/7, to download a file through Bittorent (I had crappy internet then). There are patient people out there.
And just in case people say why don't you buy it then, the price in electricity used was a saving versus the purchase of the software (which would have been hundreds, if not thousands).
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
In the one sense, if I hijack your email and send a threatening message, you and I both agree that only I would be at fault, you would be held blameless (perhaps you left the web browser open on your email inbox and I happened to look at your computer).
However, if the wifi is open, now you, the subscriber, are responsible? Most routers are set to open by default, you need a little bit of computer know-how to secure them. The average joe doesn't have that know-how. The average joe wouldn't know they had to do that, unless their ISP said so and gave them instructions or did it for them.
There are all sorts of reasons for why an IP address was logged. My favourite one is that some of the more popular torrent trackers poison their own IP lists, by putting in fake IP addresses that aren't actually connected to the tracker. If the people doing the suing are using this as pretty much their only evidence (and I have yet to hear about any other evidence, just an IP address), then it should be thrown out, because the evidence is completely unreliable.
[ link to this | view in thread ]
Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re:
For example, just today, my boss called me in and said I was in trouble for going into the office and doing nothing for an hour last week. Her proof (which she only mentioned, but completely neglected to actually show me) was that my equipment was logged out according to the computers for an hour. That one piece of evidence is meaningless: I could have been using someone else's equipment, I could have been doing work that didn't involve that equipment, the computer records could be faulty etc.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Ah, so if it's legal, it must be moral. Got it.
This is where we differ. I don't see any indication that these actions are done in good faith. I see every indication that they are done scattershot, knowing full well that the odds are overwhelming that a sizable percentage of the people being threatened have done nothing wrong and will settle anyway.
It's all about the extortion, not about justice.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
I don't believe your definition of extortion is accurate, not in a common-sense way at least.
If a pair of large thugs with baseball bats threaten to bash me unless I pay them, I probably will because I would not be able to defend my self against them and losing the money is the least bad option.
If a law firm threatens threaten to sue me for a large amount of money unless I pay them some smaller amount, I probably will pay them because I would not be able to afford to defend myself against them and losing the lesser amount of money is the least bad option.
I really don't see much difference here. This is exactly the position a lot of the accused people find themselves in.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Thanks for the thoughtful response. If it's such a huge abuse of the legal system, then it should be easy to stop, right? What's the holdup?
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Please stop misusing the term FUD. You clearly don't know what it means. I'm am neither Fearful, Uncertain or Doubtful about he statement that they sued a dead guy, and I doubt many others are.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
If you CHOOSE to build, say, a road, and provide access to other drivers, as a private individual and not as as service provider, you should bear responsiblity for what happens on that road. So all their speeding and parking tickets get sent to you. Sound reasonable?
[ link to this | view in thread ]
Re: Re: Re: Re:
Yeah, not really.
In most cases, it would be pretty easy to determine whether or not the owner of the WiFi was the guilty party. All you have to do is watch the traffic. Of course, that would mean you'd have to actually investigate and it would make these extortion attempts too expensive to engage in.
In other words, it's a win for society at large.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Operating an open Wifi qualifies as a "transient service provider":
There is no requirement under the law that you be a commercial or corporate entity, or be operating for any particular purpose.
There is one potential gotcha, though. The law requires that you have (and implement) a mechanism by which you can disconnect people who use your service for illegal purposes.
All modern access points provide the technical mechanism (a configuration option that lets you block access to specific MAC addresses). Practically, this means that if you are told that a user is breaking the law and you don't try to block him, you lose your service provider status.
If you haven't noticed or been informed of the activity, or if you can't identify the culprit, then you are likely to be safe.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
Threatening to take an action you are legally entitled to take makes it not extortion. Breaking kneecaps is illegal. Filing suit for infringement is not.
The Solicitors Disciplinary Tribunal in the UK disagrees with you:
The Solicitors Disciplinary Tribunal (SDT) has suspended two Davenport Lyons lawyers from practising and fined them £20,000 each for sending “intimidating letters” to individuals they accused of illegal file-sharing.
It is possible to do something which you are technically legally entitled to do in a way that makes it illegal.
It is a bit like stalking. Every individual action a stalker takes is legal - but the sum total is not.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
The legal system...
It's been more or less stopped in the UK - once the courts actually got around to it - the scam has simply moved on to fresh pastures.
[ link to this | view in thread ]
Re: Re:
I mean if we allow Dead people to be infringed upon, why not allow Dead people to do the infringing as well....
Your great, great, grandfather used the same words that my great, great, great, grandmother wrote in her diary.... Give us your house and your horse, and my great, great, great grandmother can finally rest in pieces....
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
Meaning the group of people who know about this is small in comparison to the whole of society and if anybody non initiated in the arts of IT is ever in the position that it needs to disprove something he will need an "expert"(and I use the term loosely) to do it.
[ link to this | view in thread ]
Re: Re: Re: Re: Re:
And the answer is, you probably don't, you call in somebody who can, somebody who knows where the information is and how to monitor it.
If you are ever faced with that in the current climate the judges need to be educated on the art by someone whith verifiable credentials and not a geek-squad person or a local hacker.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re:
What they are doing is no different than the criminals in the old days who went to businesses and requested protection money to keep their businesses from incurring financial losses/property damage (at their hands). Except here they are demanding settlement money to keep from incurring financial loss/bankruptcy for the next 30 years (and trust me, companies like this CAN keep a case in litigation until the vast majority of their victims are so far in debt that they can't continue to litigate). There is no "extort", what they are doing IS extortion as far as I am concerned, and extortion IS illegal.
And even if we split hairs on the finer points of legality, I most certainly do consider such activity immoral. Mainly because even if you condone a "fight fire with fire" mentality, the vast majority of people who are engaged in the most illegal/immoral activities also tend to be among the most technically savvy as well, and for whom IP spoofing/routing/masking is among the easiest of tricks. Therefore these lawsuits are perhaps the least efficient method for finding the very people it says it is looking for.
And again, my personal opinion is that anyone to claim otherwise means they are either lying and/or of questionable moral character at best.
Which ever way you cut it, either the industry knows all of this, and doesn't care (in which case they fail to garner my support/sympathy) or they are simply too incompetent to deserve to stay in business (in which case they fail to garner my support/sympathy).
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
If even companies that have a vested interest in billing someone for what he uses can't get it right what in God's name make you think that an ISP that has zero motivation to maintain accurate logs of what people do would fare any better?
More do we know how the collection of that data was done in the first place? could that be verified by a neutral third party?
Did that judge assert the veracity of such claims?
Answer that judge did nothing, she failed to ascertain that the facts presented before her where accurate.
Also you have said before that people should be responsible for their networks and who uses them, since computers code have hundreds of millions of lines and no single human being is capable of understanding it all in any meaningful way what you are implying is just not possible, can you describe the OSI layer levels and how they interact with each other? Can you read the code from a program and be able to fix it if it needs to be fixed?
That is just likely as you are to read law in mandarin and understand how the judicial system of another country works and being able to enforce it by yourself.
Are you going to learn the laws of every other country and how to read them? can you do it?
If no, why are you asking anybody to learn about hundreds of millions of lines of code and be responsible for it all?
[ link to this | view in thread ]
Re:
We covered the Randazza open wifi means your guilty, and the best they could come up with was well this lawsuit said it was. And they shut up shortly after we pointed out that it was a settlement not an actual punishment of the court. In fact the amount was specifically set out so they it could be used to scare other people targeted with the boogeyman of even if you didn't do it and knew nothing about it you still owe me money because you didn't protect my clients copyright.
[ link to this | view in thread ]
Re: Re: Re: Re:
They were lying through their teeth, to a Judge in court papers... but don't let that color your opinion of lawyers.
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
I would probably support a subpoena to have the account holder questioned under oath and/or have their computer system examined by a neutral third party.
But, at the end of the day, the sueing entity, should really look at their business models before starting a course of sueing their customers.
[ link to this | view in thread ]
Re: Re:
[ link to this | view in thread ]
RICO
Since I, as Mike and others, believe that the mass filings are fishing expeditions with little evidence to support them are done much more to scare people into paying up instead of going to court. Now if I go out and scare people to extort money from them I would probably be charged with blackmail and/or (God forbid!) a RICO violation and lose everything I have.
Funny how the "LEGAL" way, using the court, makes blackmail okay.
Cure: get the IP laws changed to allow for ONLY recovery of lost PROFIT (since no organization had any COSTS) and limit fines to a much smaller amount. Then the lawyers will have to find some other way to make money.
This is, of course, for civil violations. I do not want to see some criminal organizations that rip music or movies to sell get away with it. Throw the book at them.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re:
Not sure what an expert would prove or disprove. Establishing that someone gained access to a wifi after the fact is essentially impossible, especially with most routers and default settings.
[ link to this | view in thread ]
Re: Re: Re: Re: Re: Re: Re: Re: Re: Re: Re:
So you ignore the conflict of interest in the fact that she crafted the laws she is now upholding... Very telling.
[ link to this | view in thread ]
[ link to this | view in thread ]
Re:
http://www.techdirt.com/articles/20110825/03043315676/us-copyright-group-lawsuits-based-h ighly-questionable-evidence.shtml
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Re:
[ link to this | view in thread ]
Im a victim
[ link to this | view in thread ]