Beruflich Dokumente
Kultur Dokumente
Beth A. Hutchens (Arizona Bar No. 26837) 1212 E. Osborn Ste. 104 3 Phoenix, Arizona, 85014 480.310.2325 (phone) 4 888.891.1408 (fax) 5 beth@hutchenslawoffices.com
2 6 7 Attorneys for Plaintiff, 8 9 10 11
Third World Media, LLC UNITED STATES DISTRICT COURT DISTRICT OF ARIZONA, PHOENIX DIVISION
) 12 Third World Media, LLC, a California ) ) 13 ) Plaintiff, 14 ) ) vs. 15 ) 16 Arizona Members of Swarm of May ) ) 17 13, 2011 through July 12, 2011, ) Sharing Hash File ) 18 763E1BC277D2705C4B651957D0BE ) 19 CF3A7E872D86; and DOES 1 ) through 26, ) 20 ) Defendants. 21 ) )
Case No.___________________ (Copyright) COMPLAINT (1) DIRECT COPYRIGHT INFRINGEMENT 17 U.S.C. 501 (2) CONTRIBUTORY COPYRIGHT INFRINGEMENT (3) CIVIL CONSPIRACY (4) NEGLIGENCE
22 23 24
I. NATURE OF THE CASE 1. Plaintiff is the registered owner of the copyright to a motion picture,
1
28 Tokyo Cream Puffs 8 (hereinafter the Motion Picture). A true and correct
1 copy of the Application for Copyright Registration for the Motion Picture is 2 attached hereto as Exhibit 1. 3
1
2.
4 collective and interdependent manner in the unlawful reproduction and distribution 5 of Plaintiffs Motion Picture using BitTorrent file transfer protocol. 6
3.
7 copyrighted Motion Picture to others over the Internet, particularly via BitTorrent, 8 each recipient can then distribute that unlawful copy of the Motion Picture to 9 others without degradation in sound or picture quality.
Thus, a Defendants
10 distribution of even a single unlawful copy of the Motion Picture can result in the 11 nearly instantaneous worldwide distribution of that single copy to a limitless 12 number of people.
4.
15 exclusive rights in the Motion Picture, and for injunctive relief to stop Defendants 16 from continuing to infringe upon Plaintiffs copyrighted works. 17 18
II. JURISDICTION AND VENUE 5. This Court has subject matter jurisdiction over Plaintiffs claims for
19 copyright infringement and related claims pursuant to 17 U.S.C. 101, et. seq., 20 and 28 U.S.C. 1331 and 1338(a). 21
6.
22 within the Jurisdiction; they have committed unlawful and tortious acts both within 23 and outside the Jurisdiction with the full knowledge that their acts would cause 24 25 The Ninth Circuit adopts the Application Approach, which is to say that that once a complete 26 application for copyright is received by the Copyright Office, the work will be considered to 27 have satisfied the registration requirement of 17 U.S.C 411(a) for purposes of infringement litigation. See Cosmetic Ideas, Inc. v. IAC/Interactivecorp, 606 F.3 612 (9th Cir., 2010). 28
2
1
1 injury in this Jurisdiction. As such, Defendants have sufficient contacts with this 2 judicial district to permit the Courts exercise of personal jurisdiction over each 3
7.
8.
6 1400(a). Although the true identities of each and every member of the collective 7 formed by the Defendants is unknown to the Plaintiff at this time, on information 8 and belief, each Defendant in this particular action may be found in this District as 9 the Plaintiff has, through the use of publicly available sources, traced each of the 10 Internet Protocol (IP) addresses to sources in Arizona. 11 12 13
III. THE PARTIES A. The Plaintiff, Liberty Media Holdings, LLC 9. Third World Media is a CA LLC with a mailing address of 20555
B. The Defendants 10. The true names and capacities, whether individual, corporate,
17 associate or otherwise, of defendants John/Jane Does 1-26 are unknown to 18 Plaintiff, who therefore sues said Defendants by such fictitious names. Plaintiff 19 knows each Defendant only by the Internet Protocol (IP) address assigned to the 20 account used by the Defendant by the account holders Internet Service Provider 21 (ISP) on the date and at the time at which the infringing activity of each 22 Defendant was observed.
23 identified, together with the date and time at which his or her infringing activity 24 was observed is listed below. 25
11.
26 traced to a physical address located in Arizona. The Doe Defendants all reside in 27 this jurisdiction and district, the complained of acts occurred in Arizona, and/or the 28
3
1 Doe Defendants have sufficient contacts such that they could reasonably be 2 expected to be haled into court here. 3
12.
4 addresses in order to learn the identity of the account holders for the IP addresses 5 below. In most cases, the account holder will be the proper defendant in this case. 6 However, in some cases, further discovery may be necessary in some 7 circumstances for the limited purpose of ascertaining the identity of the proper 8 defendant. 9
13.
10 computers are collectively interconnected for the sharing of a particular unique 11 file, otherwise known as a swarm. The particular file a BitTorrent swarm is 12 associated with has a unique hash (a file identifier generated by an algorithm 13 developed and implemented by the National Security Agency). The hash value in 14 this case is identified as 763E1BC277D2705C4B651957D0BECF3A7E872D86 15 (hereinafter the 763 Hash). 16
14.
Plaintiff is informed and believes, and based thereon alleges, that each
17 of the Defendants was and is the agent of the other Defendants, acting within the 18 purpose and scope of said agency. Plaintiff is further informed and believes and 19 based thereon alleges that each of the Defendants authorized and ratified the 20 conduct herein alleged of each of the other Defendants. 21
15.
22 the identification of each of the Defendants true names and permit the Plaintiff to 23 amend this Complaint to state the same.
24 information obtained in discovery may lead to the identification of additional 25 infringing parties to be added to this Complaint as defendants. Plaintiff will amend 26 this Complaint to include their proper names and capacities when they have been 27 determined. Plaintiff is informed and believes, and based thereon alleges, that each 28
4
1 of the fictitiously named Defendants participated in and are responsible for the acts 2 described in this Complaint and damage resulting therefrom. 3
16.
4 named herein performed, participated in, or abetted in some manner, the acts 5 alleged herein, proximately caused the damages alleged and are liable to Plaintiff 6 for the damages and relief sought herein. 7
17.
8 infringement scheme together. They all shared and republished the same Motion 9 Picture, between the dates of May 13, 2011 through July 12, 2011, and thus 10 collectively participated in the same swarm sharing the 763 Hash. 11
18.
The torrent swarm in this case is not an actual entity, but is rather
12 made up of thousands of individuals, located throughout the world, acting in 13 concert with each other, to achieve the common goal of infringing upon the 14 Plaintiffs copyrights both by illegally duplicating the Plaintiffs Motion Picture 15 and illegally distributing the Plaintiffs Motion Picture. 16 17
Defendant Doe 1 19. Defendant Doe 1 is unknown, but used the following IP address:
18 70.184.88.220. 19
20.
20 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 21 the 763 Hash to an unknown number of other individuals over the Internet. 22 23
21. 22.
The infringing activity took place on May 13, 2011 at 4:39 pm UTC. As Doe 1 was the first one detected as having distributed the Motion
24 Picture, Doe 1 is, on information and belief, the initial propagator of the 763 Hash 25 in the Bit Torrent swarm of May 13, 2011. 26 27
Defendant Doe 2 23. Defendant Doe 2 is unknown, but used the following IP address:
5
28 184.95.54.227.
24.
2 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 3 the 763 Hash to an unknown number of other individuals over the Internet. 4
25.
The infringing activity took place on May 13, 2011 at 9:28 am UTC,
Defendant Doe 3 26. Defendant Doe 3 is unknown, but used the following IP address:
8 70.176.48.123. 9
27.
10 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 11 the 763 Hash to an unknown number of other individuals over the Internet. 12
28.
The infringing activity took place on May 17, 2011 at 2:20 am UTC,
Defendant Doe 4 29. Defendant Doe 4 is unknown, but used the following IP address:
16 69.242.238.152. 17
30.
18 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 19 the 763 Hash to an unknown number of other individuals over the Internet. 20
31.
The infringing activity took place on May 18, 2011 at 7:04 am UTC,
Defendant Doe 5 32. Defendant Doe 5 is unknown, but used the following IP address:
24 24.121.80.185. 25
33.
26 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 27 the 763 Hash to an unknown number of other individuals over the Internet. 28
6
34.
The infringing activity took place on May 18, 2011 at 12:51 am UTC,
Defendant Doe 6 35. Defendant Doe 6 is unknown, but used the following IP address:
5 24.121.21.43. 6
36.
7 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 8 the 763 Hash to an unknown number of other individuals over the Internet. 9
37.
The infringing activity took place on May 21, 2011 at 10:14 am UTC,
Defendant Doe 7 38. Defendant Doe 7 is unknown, but used the following IP address:
13 174.26.183.89. 14
39.
15 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 16 the 763 Hash to an unknown number of other individuals over the Internet. 17
40.
The infringing activity took place on May 24, 2011 at 9:00 am UTC,
Defendant Doe 8 41. Defendant Doe 8 is unknown, but used the following IP address:
21 174.26.167.30. 22
42.
23 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 24 the 763 Hash to an unknown number of other individuals over the Internet. 25
43.
The infringing activity took place on May 26, 2011 at 7:22 pm UTC,
Defendant Doe 9
44.
2 72.201.195.84. 3
45.
4 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 5 the 763 Hash to an unknown number of other individuals over the Internet. 6
46.
Defendant Doe 10 47. Defendant Doe 10 is unknown, but used the following IP address:
10 75.164.78.149. 11
48.
12 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 13 the 763 Hash to an unknown number of other individuals over the Internet. 14
49.
Defendant Doe 11 50. Defendant Doe 11 is unknown, but used the following IP address:
18 72.201.214.207. 19
51.
20 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 21 the 763 Hash to an unknown number of other individuals over the Internet. 22
52.
Defendant Doe 12 53. Defendant Doe 12 is unknown, but used the following IP address:
26 68.104.139.30. 27 28
8
54.
2 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 3 the 763 Hash to an unknown number of other individuals over the Internet. 4
55.
Defendant Doe 13 56. Defendant Doe 13 is unknown, but used the following IP address:
8 70.176.212.201. 9
57.
10 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 11 the 763 Hash to an unknown number of other individuals over the Internet. 12
58.
Defendant Doe 14 59. Defendant Doe 14 is unknown, but used the following IP address:
16 68.231.96.2. 17
60.
18 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 19 the 763 Hash to an unknown number of other individuals over the Internet. 20
61.
Defendant Doe 15 62. Defendant Doe 15 is unknown, but used the following IP address:
24 174.30.138.119. 25
63.
26 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 27 the 763 Hash to an unknown number of other individuals over the Internet. 28
9
64.
Defendant Doe 16 65. Defendant Doe 16 is unknown, but used the following IP address:
5 68.228.54.241. 6
66.
7 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 8 the 763 Hash to an unknown number of other individuals over the Internet. 9
67.
Defendant Doe 17 68. Defendant Doe 17 is unknown, but used the following IP address:
13 72.201.99.220. 14
69.
15 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 16 the 763 Hash to an unknown number of other individuals over the Internet. 17
70.
Defendant Doe 18 71. Defendant Doe 18 is unknown, but used the following IP address:
21 68.98.8.222. 22
72.
23 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 24 the 763 Hash to an unknown number of other individuals over the Internet. 25
73.
The infringing activity took place on June 21, 2011 at 10:22 pm UTC,
1 2
Defendant Doe 19 74. Defendant Doe 19 is unknown, but used the following IP address:
3 72.201.145.231. 4
75.
5 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 6 the 763 Hash to an unknown number of other individuals over the Internet. 7
76.
The infringing activity took place on June 25, 2011 at 3:47 pm UTC,
Defendant Doe 20 77. Defendant Doe 20 is unknown, but used the following IP address:
11 68.96.55.121. 12
78.
13 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 14 the 763 Hash to an unknown number of other individuals over the Internet. 15
79.
Defendant Doe 21 80. Defendant Doe 21 is unknown, but used the following IP address:
19 70.162.114.52. 20
81.
21 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 22 the 763 Hash to an unknown number of other individuals over the Internet. 23
82.
Defendant Doe 22 83. Defendant Doe 22 is unknown, but used the following IP address:
27 68.3.196.151. 28
11
84.
2 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 3 the 763 Hash to an unknown number of other individuals over the Internet. 4
85.
Defendant Doe 23 86. Defendant Doe 23 is unknown, but used the following IP address:
8 69.9.25.16. 9
87.
10 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 11 the 763 Hash to an unknown number of other individuals over the Internet. 12
88.
Defendant Doe 24 89. Defendant Doe 24 is unknown, but used the following IP address:
16 72.201.207.90. 17
90.
18 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 19 the 763 Hash to an unknown number of other individuals over the Internet. 20
91.
Defendant Doe 25 92. Defendant Doe 25 is unknown, but used the following IP address:
24 72.201.12.111. 25
93.
26 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 27 the 763 Hash to an unknown number of other individuals over the Internet. 28
12
94.
The infringing activity took place on July 12, 2011 at 1:44 am UTC,
Defendant Doe 26 95. Defendant Doe 26 is unknown, but used the following IP address:
5 72.201.65.45. 6
96.
7 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 8 the 763 Hash to an unknown number of other individuals over the Internet. 9
97.
The infringing activity took place on July 12, 2011 at 10:29 am UTC,
IV. COPYRIGHT AND BITTORRENT 98. Peer to Peer (hereinafter P2P) is a file sharing mechanism that
13 allows files to be swapped directly between users' computers instead of having the 14 file first stored on a server between them.
A person wanting to use P2P file Then that person can use the
16 program to share files with other P2P users. When a person uses P2P, other users 17 can connect directly to his or computer to download a file, as opposed to getting 18 that file off of a server. 19
99.
20 sharing large amounts of data on the Internet, including files containing digital 21 versions of motion pictures. BitTorrent breaks up and distributes large files into 22 smaller pieces.
The programs that a person uses to download files are called The
23 BitTorrent clients. A peer is any computer running a BitTorrent client. 24 process works as follows: 25 26 27 28
a. First, a person creates a torrent file by uploading a file from data stored on their computer to their BitTorrent client. This breaks up the file into many smaller chunks. The peer distributing the file creates a unique identifying hash code (an algorithm that maps
13
1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
large data sets into smaller data sets) known as the SHA-1 hash, which is recorded in the torrent file. The torrent file contains a roadmap to the IP addresses of other users who are sharing the media file identified by the same unique hash value, as well as specifics about the media file. The media file could be any large file, such as a digital motion picture or music file. b. When a user wants to download a large file, he or she opens the torrent file with a BitTorrent client. After reading the roadmap, the client connects uploaders of the file (i.e. those that are distributing the content) with downloaders of the file (i.e. those that are copying the content). During this process, the client reaches out to one or more trackers that are identified on the roadmap. A tracker is an Internet server application that records the IP addresses associated with users who are currently sharing any number of media files identified by their unique hash values and then directs a BitTorrent users computer to other users who have the particular file each user is seeking to download. c. Since BitTorrent breaks up and distributed files in small chunks, once a user has even a single piece of a larger file, he or she can share that piece with others. Rather than downloading a file from a single source, the BitTorrent protocol allows users to join a "swarm," or group, of hosts to download and upload from each other simultaneously. 100. For a BitTorrent user, this process is quite simple. When a BitTorrent user seeks to download a motion picture, he or she merely conducts an Internet search for a torrent file of the motion picture, music, or other large file he or she wants. The user then opens the appropriate torrent file, which may be found
14
1 2 3
online on any number of torrent search engine websites, using a BitTorrent client application. 101. Because BitTorrent client software generally lacks the ability to
4 search for torrents, end-users use search engines or other websites that contain 5 indices of torrent files to find files being made available by other BitTorrent users. 6 These torrent files do not contain audio or visual media, but instruct the users 7 BitTorrent client where to go and how to obtain the desired file. 8
9 containing one or more tracker locations, which it then uses to connect to at least 10 one tracker that will identify IP addresses where the file is available. Each IP 11 address identifies an uploading user who is currently running a BitTorrent client on 12 his or her computer and who is currently offering the desired motion picture file 13 for download.
14 downloading the motion picture file without any further effort from the user, by 15 communicating with the BitTorrent client programs running on the uploading 16 users computers. 17
103. The life cycle of a file shared using BitTorrent begins with just one
18 individual the initial propagator, sometimes called a seed user or seeder. 19 The initial propagator intentionally elects to share a file with a torrent swarm. The 20 original file, in this case, contains Plaintiffs entire copyrighted work. 21
104. Other members of the swarm who want a copy of (in this case) the
22 Plaintiffs copyrighted work connect to the seed to download the file, wherein the 23 download creates an exact digital copy of Plaintiffs copyrighted work on the 24 downloaders computers.
25 additional infringer joins the collective swarm, and each new infringer receives the 26 same or different pieces of the file from each other thief in the swarm who has 27 already downloaded any part of the file. Eventually, once the initial propagator has 28 distributed each piece of the file to at least one other infringer, so that together the
15
1 pieces downloaded by members of the swarm comprises the whole motion picture 2 when reassembled, the initial propagator may leave the swarm, and the remaining 3 infringers can still obtain a full copy of the motion picture by exchanging the 4 pieces of the motion picture that each one has. 5
105. Files downloaded in this method are received in hundreds or even Each piece that is downloaded is immediately
7 thereafter made available for distribution to other users seeking the same complete 8 file. The effect of this technology makes every downloader also an uploader of the 9 content. This means that every user who has a copy of the infringing material in a 10 swarm may also be a source for later downloaders of that material. 11
106. But there is honor among thieves. For a person to remain in good
12 standing within the BitTorrent community, it is important to upload as many files 13 as one downloads. Trackers keep track of the amount of data each peer uploads 14 and downloads. Those who merely download files, without uploading and sharing 15 files, are derisively called leechers. 16
107. Being a leecher is not only pejorative terminology, but leechers are
17 also punished by the torrent swarm with slower download speeds, and in some 18 cases, banning from the tracker. BitTorrents protocol stalls the downloads of 19 leechers, in an effort to preserve network speed for the more prolific appropriators. 20 The sharing of files as users receive them, then, is inherent in BitTorrents use for 21 the protocol to be of any utility to the end user. 22
23 file throughout the collective peer users. As more peers join the collective swarm 24 of simultaneous uploaders and downloaders, the frequency of successful 25 downloads also increases. Any seed peer that has downloaded a file prior to a 26 subsequent peer download of the same file automatically becomes a source for the 27 subsequent peer so long as that first peer is online at the time the subsequent peer 28 requests download of the file from the swarm.
16
1 collective swarm downloads as articulated above, every infringer is and by 2 necessity together simultaneously both stealing the Plaintiffs copyrighted 3 material and redistributing it. 4
109. Plaintiff has recorded each Defendant named herein actually 110. Plaintiffs Motion Picture is easily discernable as a professional work. created the works using professional performers, directors,
7 Plaintiff
8 cinematographers, lighting technicians, set designers and editors. Plaintiff created 9 each work with professional-grade cameras, lighting, and editing equipment. 10
11 World Media ), and a statement as required by 18 U.S.C. 2257 that age 12 verification records for all individuals appearing in the works are maintained at 13 corporate offices in Chatsworth, CA. 14
15 work being publicly distributed by Does 1-26 by and through the BitTorrent 16 network. 17
18 works owned by and registered to Plaintiff in violation of 17 U.S.C. 106(1) and 19 (3). 20 21 22
V. DEFENDANTS ARE MEMBERS OF A SINGLE BITTORRENT SWARM 114. Defendants are peer members who have all collectively participated in
23 the same P2P network swarm that was utilized to unlawfully infringe upon 24 Plaintiffs exclusive rights in its copyrighted film without permission. 25
26 a torrent file containing information sufficient to locate and download Plaintiffs 27 copyrighted Motion Picture. Thereafter, each Defendant opened the torrent file 28
17
1 using a BitTorrent client application that was specifically developed to read such 2 files. 3
4 National Security Agency associated with the instant action is the 763 Hash. Each 5 Defendant is a member of the same collective swarm associated with the 763Hash, 6 and each acted collectively, and in concert, in effectuating the illegal and 7 unauthorized sharing of Plaintiffs copyrighted work. 8
9 collectively connected to the Internet that contained or possibly still contains a 10 torrent file identifying Plaintiffs copyrighted work. Each computer also contained 11 or still contains Plaintiffs copyright work, which was downloaded using the 12 information encoded in that torrent file. 13
14 Motion Picture. Moreover, they did not only replicate the same motion picture, but 15 all of the Defendants, as members of the same swarm, republished, duplicated, and 16 replicated the precise same copy and same 763 Hash version of the Motion Picture, 17 thus demonstrating that all of the Defendants shared and replicated the same 18 motion picture with one another, thus linking them all together in a massive 19 conspiracy and concerted effort to deprive the Plaintiff of its exclusive rights in the 20 Motion Picture under the Copyright Act. 21
119. Defendant peers each utilized a torrent file to upload and download
22 Plaintiffs copyrighted film without permission through use of the BitTorrent file 23 transfer protocol. 24
120. Each Defendant peer, consistent with using a BitTorrent P2P network,
25 obtained a torrent file containing sufficient information to locate and download a 26 copy of Plaintiffs Motion Picture. 27
1 Defendant used that information to connect to other Defendants for the purpose of 2 sharing Plaintiffs copyrighted work with other members of the BitTorrent 3 collective network. 4
5 downloaded through a single swarm collective among the various Defendants in 6 concert all members sharing the same exact video, using the same exact hash 7 identifier. 8
9 copyrighted Motion Picture, the Defendant peers shared the Motion Picture 10 between each other by trading small portions of the file containing a digital copy of 11 the Motion Picture. More precisely, the BitTorrent network divided the original 12 copyrighted work into many small pieces and distributed these pieces throughout 13 the swarm until each of the collectively participating Defendants in the swarm had 14 a partial or complete infringing copy of the Motion Picture. 15
16 collective swarm, infringing upon Plaintiffs exclusive rights in its work by 17 uploading (distributing) and downloading (reproducing) Plaintiffs copyrighted 18 film, and through their actions each Defendant assisted each and every other 19 Defendant, each members of the P2P network swarm, to illegally download 20 Plaintiffs copyrighted work. 21 22 23
VI. FIRST CAUSE OF ACTION (Copyright Infringement 17 U.S.C. 501) 125. The Plaintiff re-alleges and incorporates by reference the allegations
126. Plaintiff is, and at all relevant times has been, the copyright owner of
26 the copyrighted work infringed upon by all Defendants, Tokyo Cream Puffs 8. 27 Exh. 1. 28
19
127. Among the exclusive rights granted to each Plaintiff under the
2 Copyright Act are the exclusive rights to reproduce the Motion Picture and to 3 distribute it rights which Defendants maliciously and intentionally infringed 4 upon. 5
128. Plaintiff is informed and believes, and on that basis alleges, that
6 Defendants without the permission or consent of Plaintiff, have used, and continue 7 to use, the BitTorrent file transfer protocol to distribute the Motion Picture to the 8 public, and/or make the Motion Picture available for distribution to others, 9 including other BitTorrent users. In doing so, Defendants have violated Plaintiffs 10 exclusive rights of reproduction and distribution. Defendants actions constitute 11 infringement of Plaintiffs copyrights and exclusive rights under the Copyright 12 Act. 13
129. Plaintiff is informed and believes and on that basis alleges that the 130. As a result of Defendants infringement of Plaintiffs copyrights and
16 exclusive rights under the Copyright Act, Plaintiff is entitled to either actual or 17 statutory damages pursuant to 17 U.S.C. 504(c), and to its attorney fees pursuant 18 to 17 U.S.C. 505. 19
131. The conduct of Defendants is causing and will continue to cause Such harm will continue unless the Plaintiff has no
22 adequate remedy at law. Pursuant to 17 U.S.C. 502 and 503, Plaintiff is entitled 23 to injunctive relief prohibiting Defendants from further infringing Plaintiffs 24 copyrights, and ordering Defendants to destroy all copies of the Motion Picture 25 made in violation of Plaintiffs exclusive rights under the Copyright Act. 26 27 28
20
1 2 3
VII. SECOND CAUSE OF ACTION (CONTRIBUTORY COPYRIGHT INFRINGEMENT) 1. Plaintiff re-alleges and incorporates by reference the allegations It is helpful to think of the process of torrenting in the context of a
2.
6 constructed puzzle. In furtherance of sharing this puzzle, it is deconstructed into 7 tiny pieces. These pieces are then uploaded, copied and distributed among one or 8 more peers. When an infringer seeks to download the original file, he downloads a 9 torrent file containing information concerning where each of the distributed pieces 10 of the file can be found, i.e., how to find and contact each peer. Each torrent file 11 that contains information about the same original file is contains the same hash 12 value, which is a string of letters and numbers that uniquely identifies the original 13 file that the torrent client may use to locate and download the torrent file. This 14 torrent file is capable of locating all the unique corresponding pieces that make up 15 the original file (and any additional copies of each piece that may be available). 16 Once all the pieces are located and downloaded they are reconstructed back into 17 the original order completing the entire original copyrighted file. 18
3.
When users all possess the same infringing work with the same exact
19 hash value (as in this case), it is because each infringer possesses an exact digital 20 copy, containing the exact bits unique to that file, of the original work. In essence, 21 although hundred of users may be uploading the copyrighted work, you will 22 receive only the exact parts of a singular hash, not a compilation of available 23 pieces from multiple hashes. 24
4.
25 BitTorrent, some of the Defendants knowingly provided internet access to other 26 Defendants who used the BitTorrent protocol to upload and distribute the work. 27 These Defendants who provided internet access to infringers, best thought of as 28 intermediaries, provided the essential element needed for other Defendants to
21
1 commit direct infringement on the BitTorrent protocol, and to contribute to 2 countless others copyright infringement. 3
5.
4 the precise same hash file, described in Paragraph 13, to the BitTorrent network. 5
6.
6 Picture to each other, or knowingly contributed to this goal through providing 7 internet necessary to accomplish such copying and distribution, in concert with one 8 another and through use of the exact same protocol. 9
7.
Because it is the exact same motion picture, using the exact same
10 hash, in the same general timeframe, the transaction of events at issue in this 11 Complaint is common to all Defendants, thus rendering the Defendants properly 12 joined in this action. 13
8.
9.
16 or may receive, a combination of access of the infringing works, compensation for 17 access to the internet access used to commit the infringement, accrued goodwill 18 from other Defendants, and other benefits. 19
10.
20 movie accessed this illegal publication, they derived portions of their illegal 21 replication of the file from multiple persons, including but not limited to the 22 Defendants named in this action, through either the Defendants direct copying and 23 distribution of the copyrighted work or the provision of internet services that 24 effected this same outcome. 25
11.
26 own infringement or contribution thereto, and the Defendants were conscious of 27 the fact that multiple other persons derivatively downloaded the file containing the 28 Plaintiffs Motion Picture.
22
12.
2 but for the Defendants participation in uploading the Plaintiffs protected work, 3 through use of the BitTorrent protocol or provision of internet services used to 4 copy and distribute the work.
13.
7 way of being granted access to a greater library of other infringing works, some of 8 which belonged to the Plaintiff and some of which belonged to other copyright 9 owners. 10 11 12
VIII. THIRD CAUSE OF ACTION (CIVIL CONSPIRACY) 14. Plaintiff re-alleges and incorporates by reference the allegations
15.
15 distributed Plaintiffs copyrighted works by and through the BitTorrent file transfer 16 protocol. 17
16.
17.
Plaintiff is informed and believes and based thereon alleges that the
20 material made available by and through the BitTorrent file transfer protocol 21 includes a substantial amount of obviously unauthorized material including, for 22 example, first run feature films prior to DVD or even box office release. 23
18.
In order to access and use the BitTorrent file transfer protocol, a user
19.
The center of the conspiracy is the scheme to traffic in infringing If authorities remove any of the BitTorrent trackers from service, the
26 content.
20.
The purpose of the BitTorrent file transfer protocol (i.e., for certain
2 participants to identify themselves as a source for a file hash to one or more 3 trackers and thereby facilitate the reproduction and distribution of infringing copies 4 of copyrighted works between a network of coconspirators) is apparent to any user 5 who downloads a BitTorrent client and uses the client for that purpose. 6
21.
7 wants to download, he or she can then use the BitTorrent client to locate that file, 8 or any portion thereof, on the computers of other users offering the file for 9 distribution and then transfer the infringing file to his or her computer. 10
22.
The transfer of infringing files cannot occur without the existence and
11 assistance of the participant users, including the Defendants named herein, who 12 supply the infringing content. 13
23.
Plaintiff is informed and believes and based thereon alleges that each
14 of the Defendants downloaded and/or used/distributed a BitTorrent client for the 15 purpose of conspiring with other BitTorrent users to reproduce and distribute 16 movies in violation of copyright laws. 17
24.
Plaintiff is informed and believes and based thereon alleges that at the
18 time each Doe Defendant downloaded and/or used/distributed a BitTorrent client 19 for the purpose of obtaining or sharing Plaintiffs movie, he or she knew the client 20 would provide access to infringing movies made available by other users and 21 would allow the Defendant to provide the infringing movie to other BitTorrent 22 users. 23
25.
24 the time each Doe Defendant downloaded and/or used/distributed a BitTorrent 25 client for the purposes of obtaining or sharing Plaintiffs movie, he or she intended 26 to access a network of other BitTorrent users for the purpose of reproducing and 27 exchanging infringing copies of the movie in violation of copyright laws. 28
24
26.
2 BitTorrent clients reward users for making content available to others by enabling 3 faster download speeds for those who make content available. 4
27.
Plaintiff is informed and believes and based thereon alleges that each
5 Defendant without authorization offered large amounts of infringing content to 6 others, knowing that other BitTorrent users would download the infringing content 7 and further distribute it in exchange for still more infringing content. 8
28.
Plaintiff is informed and believes, and based thereon alleges, that each
9 Defendant distributed infringing movies in anticipation of receiving copies of 10 infringing movies in return, including Plaintiffs copyrighted Motion Picture. 11
29.
Each Doe Defendant knew or should have known that the infringing
12 content the Defendant downloaded to her or his computer came from the 13 computers of other users, who made the content available to him or her, as well as 14 others in the same network of BitTorrent users, in violation of copyright laws. 15
30.
16 violate copyrights and agreed to join the conspiracy by downloading a BitTorrent 17 client with the intention of using that BitTorrent client, or simplu using a 18 BitTorrent client previously downloaded, to knowingly download, reproduce, and 19 distribute infringing files with coconspirators. 20
31.
21 conspiracy when he or she, without authorization, used a BitTorrent client to 22 download, reproduce, and distribute copies of Plaintiffs copyright registered 23 works. 24
32.
Defendants, all and each of them, conspired with the other Defendants
25 by agreeing to provide infringing reproductions of various copyright protected 26 works, including Plaintiffs works, in exchange for infringing reproductions of 27 other copyright protected works, including Plaintiffs works. 28
25
33.
2 unlawfully and without authorization reproducing Plaintiffs copyrighted works 3 and distributing those works to coconspirators by and through the BitTorrent file 4 transfer protocol in anticipation of receiving other infringing copies of copyright 5 protected works in exchange. 6
34.
7 distribute infringing copies of its works by and through the BitTorrent file transfer 8 protocol caused Plaintiff harm in an amount to be determined at trial. 9 10 11 12 13
Each Defendant is jointly and severally liable for the harm Plaintiff suffered as a result of the Defendants participation in the conspiracy to violate copyright laws. VII. SECOND CAUSE OF ACTION (CONTRIBUTORY COPYRIGHT INFRINGEMENT) 1. Plaintiff re-alleges and incorporates by reference the allegations It is helpful to think of the process of torrenting in the context of a
2.
16 constructed puzzle. In furtherance of sharing this puzzle, it is deconstructed into 17 tiny pieces. These pieces are then uploaded, copied and distributed among one or 18 more peers. When an infringer seeks to download the original file, he downloads a 19 torrent file containing information concerning where each of the distributed pieces 20 of the file can be found, i.e., how to find and contact each peer. Each torrent file 21 that contains information about the same original file is contains the same hash 22 value, which is a string of letters and numbers that uniquely identifies the original 23 file that the torrent client may use to locate and download the torrent file. This 24 torrent file is capable of locating all the unique corresponding pieces that make up 25 the original file (and any additional copies of each piece that may be available). 26 Once all the pieces are located and downloaded they are reconstructed back into 27 the original order completing the entire original copyrighted file. 28
26
3.
When users all possess the same infringing work with the same exact
2 hash value (as in this case), it is because each infringer possesses an exact digital 3 copy, containing the exact bits unique to that file, of the original work. In essence, 4 although hundred of users may be uploading the copyrighted work, you will 5 receive only the exact parts of a singular hash, not a compilation of available 6 pieces from multiple hashes. 7
4.
8 BitTorrent, some of the Defendants knowingly provided internet access to other 9 Defendants who used the BitTorrent protocol to upload and distribute the work. 10 These Defendants who provided internet access to infringers, best thought of as 11 intermediaries, provided the essential element needed for other Defendants to 12 commit direct infringement on the BitTorrent protocol, and to contribute to 13 countless others copyright infringement. 14
5.
15 the precise same hash file, described in Paragraph 13, to the BitTorrent network. 16
6.
17 Picture to each other, or knowingly contributed to this goal through providing 18 internet necessary to accomplish such copying and distribution, in concert with one 19 another and through use of the exact same protocol. 20
7.
Because it is the exact same motion picture, using the exact same
21 hash, in the same general timeframe, the transaction of events at issue in this 22 Complaint is common to all Defendants, thus rendering the Defendants properly 23 joined in this action. 24
8.
9.
1 access to the internet access used to commit the infringement, accrued goodwill 2 from other Defendants, and other benefits. 3
10.
4 movie accessed this illegal publication, they derived portions of their illegal 5 replication of the file from multiple persons, including but not limited to the 6 Defendants named in this action, through either the Defendants direct copying and 7 distribution of the copyrighted work or the provision of internet services that 8 effected this same outcome. 9
11.
10 own infringement or contribution thereto, and the Defendants were conscious of 11 the fact that multiple other persons derivatively downloaded the file containing the 12 Plaintiffs Motion Picture. 13
12.
14 but for the Defendants participation in uploading the Plaintiffs protected work, 15 through use of the BitTorrent protocol or provision of internet services used to 16 copy and distribute the work.
13.
19 way of being granted access to a greater library of other infringing works, some of 20 which belonged to the Plaintiff and some of which belonged to other copyright 21 owners. 22 23 24
IX. FOURTH CAUSE OF ACTION (NEGLIGENCE) 14. Plaintiff re-alleges and incorporates by reference the allegations
15.
27 access, to the Internet connection used in performing the unauthorized copying and 28 sharing of Plaintiffs Motion Picture described above.
28
16.
2 their Internet access, whether accessible only through their computer when 3 physically connected to an Internet router, or accessible to many computers by use 4 of a wireless router, and failed to prevent its use for this unlawful purpose. 5
17.
6 accounts to prevent the use of such accounts for nefarious and illegal purposes. As 7 such, Defendants failure to secure their Internet access accounts, and thereby 8 prevent such illegal uses thereof, constitutes a breach of the ordinary care that 9 reasonable persons exercise in using an Internet access account. 10
18.
11 to secure their Internet access allowed for the copying and sharing of Plaintiffs 12 Motion Picture by use of the BitTorrent protocol on Defendants respective 13 Internet connections, and interfering with Plaintiffs exclusive rights in the 14 copyrighted work. 15
19.
16 Defendants negligently allowed the use of their Internet access accounts to perform 17 the above-described copying and sharing of Plaintiffs copyrighted Motion Picture. 18
20.
19 securing access to their Internet connections, such infringements as those described 20 above would not have occurred by the use of their Internet access accounts. 21
21.
22 others to unlawfully copy and share Plaintiffs copyrighted Motion Picture, 23 proximately causing financial harm to Plaintiff and unlawfully interfering with 24 Plaintiffs exclusive rights in the Motion Picture. 25 26 27 28
PLAINTIFFS REQUEST FOR RELIEF For an injunction providing that: 1. Each Defendant shall be and hereby is enjoined from directly or
29
indirectly infringing upon the Plaintiffs copyrights in the Motion Picture or any
1 2 3 4 5 6 7 8 9 10 11
other works, whether now in existence or later created, that are owned or controlled by Plaintiff (or any parent, subsidiary, or affiliate of Plaintiff), including without limitation by using the Internet or any online media distribution system to reproduce (i.e., download) any of Plaintiffs works, to distribute (i.e., upload) any of Plaintiffs works, or to make any of Plaintiffs works available for distribution to the public, except pursuant to a lawful license or with the Plaintiffs express consent. Each Defendant also shall destroy all copies of Plaintiffs works that Defendant has downloaded onto any computer hard drive or server and shall destroy all copies of those downloaded works transferred onto any physical medium or device in each Defendants possession, custody, or control. 2. For damages for each infringement of each copyrighted work pursuant
12 to 17 U.S.C. 504. These damages may be actual or statutory, but if statutory 13 damages are elected, the Defendants acts were willful in nature, justifying an 14 award of up to $150,000 per infringement, and Plaintiff reserves the right to make 15 such an election. 16 17 18
3. 4. 5.
For Plaintiffs costs in this action. For Plaintiffs attorneys fees incurred in bringing this action. For such other and further relief, either at law or in equity, general or
19 special, to which Plaintiff may be entitled that the Court deems just and proper. 20 21 22 23 24 25 26 27 28
30
/s/ Beth Hutchens, Esq. HUTCHENS LAW OFFICES, PLLC Attorneys for Plaintiffs
1 I hereby certify that the foregoing document was filed electronically using this 2 Courts CM/ECF system on October 2, 2011. As the identities of Doe Defendants 3 1 through 26 are unknown at this time, Plaintiff is unable to serve any defendant. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
31
DATED this 2 day of October, 2011. BETH A. HUTCHENS HUTCHENS LAW OFFICES, PLLC
/s