Sie sind auf Seite 1von 31

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 1 of 31

1 HUTCHENS LAW OFFICES, PLLC

Beth A. Hutchens (Arizona Bar No. 26837) 1212 E. Osborn Ste. 104 3 Phoenix, Arizona, 85014 480.310.2325 (phone) 4 888.891.1408 (fax) 5 beth@hutchenslawoffices.com
2 6 7 Attorneys for Plaintiff, 8 9 10 11

Third World Media, LLC UNITED STATES DISTRICT COURT DISTRICT OF ARIZONA, PHOENIX DIVISION

) 12 Third World Media, LLC, a California ) ) 13 ) Plaintiff, 14 ) ) vs. 15 ) 16 Arizona Members of Swarm of May ) ) 17 13, 2011 through July 12, 2011, ) Sharing Hash File ) 18 763E1BC277D2705C4B651957D0BE ) 19 CF3A7E872D86; and DOES 1 ) through 26, ) 20 ) Defendants. 21 ) )

Limited Liability Company,

Case No.___________________ (Copyright) COMPLAINT (1) DIRECT COPYRIGHT INFRINGEMENT 17 U.S.C. 501 (2) CONTRIBUTORY COPYRIGHT INFRINGEMENT (3) CIVIL CONSPIRACY (4) NEGLIGENCE

22 23 24

Plaintiff, Third World Media (hereinafter TWM or the Plaintiff) files

25 this complaint against multiple unknown Defendants and alleges as follows: 26 27

I. NATURE OF THE CASE 1. Plaintiff is the registered owner of the copyright to a motion picture,
1

28 Tokyo Cream Puffs 8 (hereinafter the Motion Picture). A true and correct

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 2 of 31

1 copy of the Application for Copyright Registration for the Motion Picture is 2 attached hereto as Exhibit 1. 3
1

2.

Defendants, whose true identities are currently unknown, acted in a

4 collective and interdependent manner in the unlawful reproduction and distribution 5 of Plaintiffs Motion Picture using BitTorrent file transfer protocol. 6

3.

Each time a Defendant unlawfully distributes a copy of Plaintiffs

7 copyrighted Motion Picture to others over the Internet, particularly via BitTorrent, 8 each recipient can then distribute that unlawful copy of the Motion Picture to 9 others without degradation in sound or picture quality.

Thus, a Defendants

10 distribution of even a single unlawful copy of the Motion Picture can result in the 11 nearly instantaneous worldwide distribution of that single copy to a limitless 12 number of people.

In this case, each Defendants copyright infringement built

13 upon the prior infringements, in a cascade of infringement. 14

4.

Plaintiff seeks redress for the Defendants rampant infringement of its

15 exclusive rights in the Motion Picture, and for injunctive relief to stop Defendants 16 from continuing to infringe upon Plaintiffs copyrighted works. 17 18

II. JURISDICTION AND VENUE 5. This Court has subject matter jurisdiction over Plaintiffs claims for

19 copyright infringement and related claims pursuant to 17 U.S.C. 101, et. seq., 20 and 28 U.S.C. 1331 and 1338(a). 21

6.

Defendants either reside in, solicit, transact, or are doing business

22 within the Jurisdiction; they have committed unlawful and tortious acts both within 23 and outside the Jurisdiction with the full knowledge that their acts would cause 24 25 The Ninth Circuit adopts the Application Approach, which is to say that that once a complete 26 application for copyright is received by the Copyright Office, the work will be considered to 27 have satisfied the registration requirement of 17 U.S.C 411(a) for purposes of infringement litigation. See Cosmetic Ideas, Inc. v. IAC/Interactivecorp, 606 F.3 612 (9th Cir., 2010). 28
2
1

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 3 of 31

1 injury in this Jurisdiction. As such, Defendants have sufficient contacts with this 2 judicial district to permit the Courts exercise of personal jurisdiction over each 3

7.

Plaintiffs claims arise out of the Defendants conduct which gives

4 rise to personal jurisdiction over Defendants. 5

8.

Venue is proper in this Court pursuant to 28 U.S.C. 1391(b)(2) and

6 1400(a). Although the true identities of each and every member of the collective 7 formed by the Defendants is unknown to the Plaintiff at this time, on information 8 and belief, each Defendant in this particular action may be found in this District as 9 the Plaintiff has, through the use of publicly available sources, traced each of the 10 Internet Protocol (IP) addresses to sources in Arizona. 11 12 13

III. THE PARTIES A. The Plaintiff, Liberty Media Holdings, LLC 9. Third World Media is a CA LLC with a mailing address of 20555

14 Devonshire St. #167, Chatsworth, CA 91311. 15 16

B. The Defendants 10. The true names and capacities, whether individual, corporate,

17 associate or otherwise, of defendants John/Jane Does 1-26 are unknown to 18 Plaintiff, who therefore sues said Defendants by such fictitious names. Plaintiff 19 knows each Defendant only by the Internet Protocol (IP) address assigned to the 20 account used by the Defendant by the account holders Internet Service Provider 21 (ISP) on the date and at the time at which the infringing activity of each 22 Defendant was observed.

The IP address used by each Defendant thus far

23 identified, together with the date and time at which his or her infringing activity 24 was observed is listed below. 25

11.

Each of the IP addresses noted in this Complaint has specifically been

26 traced to a physical address located in Arizona. The Doe Defendants all reside in 27 this jurisdiction and district, the complained of acts occurred in Arizona, and/or the 28
3

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 4 of 31

1 Doe Defendants have sufficient contacts such that they could reasonably be 2 expected to be haled into court here. 3

12.

Plaintiff intends to subpoena the ISPs that issued the Defendants IP

4 addresses in order to learn the identity of the account holders for the IP addresses 5 below. In most cases, the account holder will be the proper defendant in this case. 6 However, in some cases, further discovery may be necessary in some 7 circumstances for the limited purpose of ascertaining the identity of the proper 8 defendant. 9

13.

The Defendants are a group of BitTorrent users or peers whose

10 computers are collectively interconnected for the sharing of a particular unique 11 file, otherwise known as a swarm. The particular file a BitTorrent swarm is 12 associated with has a unique hash (a file identifier generated by an algorithm 13 developed and implemented by the National Security Agency). The hash value in 14 this case is identified as 763E1BC277D2705C4B651957D0BECF3A7E872D86 15 (hereinafter the 763 Hash). 16

14.

Plaintiff is informed and believes, and based thereon alleges, that each

17 of the Defendants was and is the agent of the other Defendants, acting within the 18 purpose and scope of said agency. Plaintiff is further informed and believes and 19 based thereon alleges that each of the Defendants authorized and ratified the 20 conduct herein alleged of each of the other Defendants. 21

15.

Plaintiff believes that information obtained in discovery will lead to

22 the identification of each of the Defendants true names and permit the Plaintiff to 23 amend this Complaint to state the same.

Plaintiff further believes that the

24 information obtained in discovery may lead to the identification of additional 25 infringing parties to be added to this Complaint as defendants. Plaintiff will amend 26 this Complaint to include their proper names and capacities when they have been 27 determined. Plaintiff is informed and believes, and based thereon alleges, that each 28
4

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 5 of 31

1 of the fictitiously named Defendants participated in and are responsible for the acts 2 described in this Complaint and damage resulting therefrom. 3

16.

Plaintiff alleges on information and belief that each of the Defendants

4 named herein performed, participated in, or abetted in some manner, the acts 5 alleged herein, proximately caused the damages alleged and are liable to Plaintiff 6 for the damages and relief sought herein. 7

17.

Each of the fictitiously named Defendants engaged in their copyright

8 infringement scheme together. They all shared and republished the same Motion 9 Picture, between the dates of May 13, 2011 through July 12, 2011, and thus 10 collectively participated in the same swarm sharing the 763 Hash. 11

18.

The torrent swarm in this case is not an actual entity, but is rather

12 made up of thousands of individuals, located throughout the world, acting in 13 concert with each other, to achieve the common goal of infringing upon the 14 Plaintiffs copyrights both by illegally duplicating the Plaintiffs Motion Picture 15 and illegally distributing the Plaintiffs Motion Picture. 16 17

Defendant Doe 1 19. Defendant Doe 1 is unknown, but used the following IP address:

18 70.184.88.220. 19

20.

Doe 1 used this IP address to illegally republish and illegally

20 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 21 the 763 Hash to an unknown number of other individuals over the Internet. 22 23

21. 22.

The infringing activity took place on May 13, 2011 at 4:39 pm UTC. As Doe 1 was the first one detected as having distributed the Motion

24 Picture, Doe 1 is, on information and belief, the initial propagator of the 763 Hash 25 in the Bit Torrent swarm of May 13, 2011. 26 27

Defendant Doe 2 23. Defendant Doe 2 is unknown, but used the following IP address:
5

28 184.95.54.227.

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 6 of 31

24.

Doe 2 used this IP address to illegally republish and illegally

2 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 3 the 763 Hash to an unknown number of other individuals over the Internet. 4

25.

The infringing activity took place on May 13, 2011 at 9:28 am UTC,

5 less than one minute after Doe 1. 6 7

Defendant Doe 3 26. Defendant Doe 3 is unknown, but used the following IP address:

8 70.176.48.123. 9

27.

Doe 3 used this IP address to illegally republish and illegally

10 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 11 the 763 Hash to an unknown number of other individuals over the Internet. 12

28.

The infringing activity took place on May 17, 2011 at 2:20 am UTC,

13 88 hours, 52 minutes after Doe 2. 14 15

Defendant Doe 4 29. Defendant Doe 4 is unknown, but used the following IP address:

16 69.242.238.152. 17

30.

Doe 4 used this IP address to illegally republish and illegally

18 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 19 the 763 Hash to an unknown number of other individuals over the Internet. 20

31.

The infringing activity took place on May 18, 2011 at 7:04 am UTC,

21 28 hours, 44 minutes after Doe 3. 22 23

Defendant Doe 5 32. Defendant Doe 5 is unknown, but used the following IP address:

24 24.121.80.185. 25

33.

Doe 5 used this IP address to illegally republish and illegally

26 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 27 the 763 Hash to an unknown number of other individuals over the Internet. 28
6

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 7 of 31

34.

The infringing activity took place on May 18, 2011 at 12:51 am UTC,

2 less than one minute after Doe 4. 3 4

Defendant Doe 6 35. Defendant Doe 6 is unknown, but used the following IP address:

5 24.121.21.43. 6

36.

Doe 6 used this IP address to illegally republish and illegally

7 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 8 the 763 Hash to an unknown number of other individuals over the Internet. 9

37.

The infringing activity took place on May 21, 2011 at 10:14 am UTC,

10 81 hours, 23 minutes after Doe 5. 11 12

Defendant Doe 7 38. Defendant Doe 7 is unknown, but used the following IP address:

13 174.26.183.89. 14

39.

Doe 7 used this IP address to illegally republish and illegally

15 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 16 the 763 Hash to an unknown number of other individuals over the Internet. 17

40.

The infringing activity took place on May 24, 2011 at 9:00 am UTC,

18 70 hours, 46 minutes after Doe 6. 19 20

Defendant Doe 8 41. Defendant Doe 8 is unknown, but used the following IP address:

21 174.26.167.30. 22

42.

Doe 8 used this IP address to illegally republish and illegally

23 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 24 the 763 Hash to an unknown number of other individuals over the Internet. 25

43.

The infringing activity took place on May 26, 2011 at 7:22 pm UTC,

26 58 hours, 22 minutes after Doe 7. 27 28


7

Defendant Doe 9

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 8 of 31

44.

Defendant Doe 9 is unknown, but used the following IP address:

2 72.201.195.84. 3

45.

Doe 9 used this IP address to illegally republish and illegally

4 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 5 the 763 Hash to an unknown number of other individuals over the Internet. 6

46.

The infringing activity took place on June 2, 2011 at 12:47 pm UTC,

7 161 hours, 25 minutes after Doe 8. 8 9

Defendant Doe 10 47. Defendant Doe 10 is unknown, but used the following IP address:

10 75.164.78.149. 11

48.

Doe 10 used this IP address to illegally republish and illegally

12 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 13 the 763 Hash to an unknown number of other individuals over the Internet. 14

49.

The infringing activity took place on June 5, 2011 at 2:26 pm UTC,

15 73 hours, 39 minutes after Doe 9. 16 17

Defendant Doe 11 50. Defendant Doe 11 is unknown, but used the following IP address:

18 72.201.214.207. 19

51.

Doe 11 used this IP address to illegally republish and illegally

20 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 21 the 763 Hash to an unknown number of other individuals over the Internet. 22

52.

The infringing activity took place on June 6, 2011 at 2:07 pm UTC,

23 23 hours, 41 minutes after Doe 10. 24 25

Defendant Doe 12 53. Defendant Doe 12 is unknown, but used the following IP address:

26 68.104.139.30. 27 28
8

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 9 of 31

54.

Doe 12 used this IP address to illegally republish and illegally

2 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 3 the 763 Hash to an unknown number of other individuals over the Internet. 4

55.

The infringing activity took place on June 6, 2011 at 8:16 pm UTC, 6

5 hours, 9 minutes after Doe 11. 6 7

Defendant Doe 13 56. Defendant Doe 13 is unknown, but used the following IP address:

8 70.176.212.201. 9

57.

Doe 13 used this IP address to illegally republish and illegally

10 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 11 the 763 Hash to an unknown number of other individuals over the Internet. 12

58.

The infringing activity took place on June 6, 2011 at 9:38 pm UTC, 1

13 hour, 22 minutes after Doe 12. 14 15

Defendant Doe 14 59. Defendant Doe 14 is unknown, but used the following IP address:

16 68.231.96.2. 17

60.

Doe 14 used this IP address to illegally republish and illegally

18 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 19 the 763 Hash to an unknown number of other individuals over the Internet. 20

61.

The infringing activity took place on June 7, 2011 at 3:56 am UTC, 6

21 hours, 18 minutes after Doe 13. 22 23

Defendant Doe 15 62. Defendant Doe 15 is unknown, but used the following IP address:

24 174.30.138.119. 25

63.

Doe 15 used this IP address to illegally republish and illegally

26 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 27 the 763 Hash to an unknown number of other individuals over the Internet. 28
9

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 10 of 31

64.

The infringing activity took place on June 8, 2011 at 10:09 pm UTC,

2 42 hours, 13 minutes after Doe 14. 3 4

Defendant Doe 16 65. Defendant Doe 16 is unknown, but used the following IP address:

5 68.228.54.241. 6

66.

Doe 16 used this IP address to illegally republish and illegally

7 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 8 the 763 Hash to an unknown number of other individuals over the Internet. 9

67.

The infringing activity took place on June 9, 2011 at 3:36 am UTC, 5

10 hours, 27 minutes after Doe 15. 11 12

Defendant Doe 17 68. Defendant Doe 17 is unknown, but used the following IP address:

13 72.201.99.220. 14

69.

Doe 17 used this IP address to illegally republish and illegally

15 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 16 the 763 Hash to an unknown number of other individuals over the Internet. 17

70.

The infringing activity took place on June 9, 2011 at 12:43 pm UTC,

18 9 hours, 7 minutes after Doe 16. 19 20

Defendant Doe 18 71. Defendant Doe 18 is unknown, but used the following IP address:

21 68.98.8.222. 22

72.

Doe 18 used this IP address to illegally republish and illegally

23 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 24 the 763 Hash to an unknown number of other individuals over the Internet. 25

73.

The infringing activity took place on June 21, 2011 at 10:22 pm UTC,

26 297 hours, 39 minutes after Doe 17. 27 // 28 //


10

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 11 of 31

1 2

Defendant Doe 19 74. Defendant Doe 19 is unknown, but used the following IP address:

3 72.201.145.231. 4

75.

Doe 19 used this IP address to illegally republish and illegally

5 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 6 the 763 Hash to an unknown number of other individuals over the Internet. 7

76.

The infringing activity took place on June 25, 2011 at 3:47 pm UTC,

8 89 hours, 25 minutes after Doe 18. 9 10

Defendant Doe 20 77. Defendant Doe 20 is unknown, but used the following IP address:

11 68.96.55.121. 12

78.

Doe 20 used this IP address to illegally republish and illegally

13 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 14 the 763 Hash to an unknown number of other individuals over the Internet. 15

79.

The infringing activity took place on July 4, 2011 at 7:02 pm UTC,

16 219 hours, 15 minutes after Doe 19. 17 18

Defendant Doe 21 80. Defendant Doe 21 is unknown, but used the following IP address:

19 70.162.114.52. 20

81.

Doe 21 used this IP address to illegally republish and illegally

21 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 22 the 763 Hash to an unknown number of other individuals over the Internet. 23

82.

The infringing activity took place on July 5, 2011 at 7:56 am UTC, 12

24 hours, 54 minutes after Doe 20. 25 26

Defendant Doe 22 83. Defendant Doe 22 is unknown, but used the following IP address:

27 68.3.196.151. 28
11

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 12 of 31

84.

Doe 22 used this IP address to illegally republish and illegally

2 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 3 the 763 Hash to an unknown number of other individuals over the Internet. 4

85.

The infringing activity took place on July 6, 2011 at 6:40 pm UTC, 34

5 hours, 44 minutes after Doe 21. 6 7

Defendant Doe 23 86. Defendant Doe 23 is unknown, but used the following IP address:

8 69.9.25.16. 9

87.

Doe 23 used this IP address to illegally republish and illegally

10 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 11 the 763 Hash to an unknown number of other individuals over the Internet. 12

88.

The infringing activity took place on July 7, 2011 at 2:55 pm UTC, 20

13 hours, 15 minutes after Doe 22. 14 15

Defendant Doe 24 89. Defendant Doe 24 is unknown, but used the following IP address:

16 72.201.207.90. 17

90.

Doe 24 used this IP address to illegally republish and illegally

18 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 19 the 763 Hash to an unknown number of other individuals over the Internet. 20

91.

The infringing activity took place on July 9, 2011 at 11:53 am UTC,

21 44 hours, 58 minutes after Doe 23. 22 23

Defendant Doe 25 92. Defendant Doe 25 is unknown, but used the following IP address:

24 72.201.12.111. 25

93.

Doe 25 used this IP address to illegally republish and illegally

26 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 27 the 763 Hash to an unknown number of other individuals over the Internet. 28
12

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 13 of 31

94.

The infringing activity took place on July 12, 2011 at 1:44 am UTC,

2 61 hours, 51 minutes after Doe 24. 3 4

Defendant Doe 26 95. Defendant Doe 26 is unknown, but used the following IP address:

5 72.201.65.45. 6

96.

Doe 26 used this IP address to illegally republish and illegally

7 distribute copies of the Plaintiffs copyrighted Motion Picture through the use of 8 the 763 Hash to an unknown number of other individuals over the Internet. 9

97.

The infringing activity took place on July 12, 2011 at 10:29 am UTC,

10 8 hours, 45 minutes after Doe 25. 11 12

IV. COPYRIGHT AND BITTORRENT 98. Peer to Peer (hereinafter P2P) is a file sharing mechanism that

13 allows files to be swapped directly between users' computers instead of having the 14 file first stored on a server between them.

A person wanting to use P2P file Then that person can use the

15 sharing must first download a P2P program.

16 program to share files with other P2P users. When a person uses P2P, other users 17 can connect directly to his or computer to download a file, as opposed to getting 18 that file off of a server. 19

99.

BitTorrent is a P2P file sharing protocol used for distributing and

20 sharing large amounts of data on the Internet, including files containing digital 21 versions of motion pictures. BitTorrent breaks up and distributes large files into 22 smaller pieces.

The programs that a person uses to download files are called The

23 BitTorrent clients. A peer is any computer running a BitTorrent client. 24 process works as follows: 25 26 27 28

a. First, a person creates a torrent file by uploading a file from data stored on their computer to their BitTorrent client. This breaks up the file into many smaller chunks. The peer distributing the file creates a unique identifying hash code (an algorithm that maps
13

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 14 of 31

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28

large data sets into smaller data sets) known as the SHA-1 hash, which is recorded in the torrent file. The torrent file contains a roadmap to the IP addresses of other users who are sharing the media file identified by the same unique hash value, as well as specifics about the media file. The media file could be any large file, such as a digital motion picture or music file. b. When a user wants to download a large file, he or she opens the torrent file with a BitTorrent client. After reading the roadmap, the client connects uploaders of the file (i.e. those that are distributing the content) with downloaders of the file (i.e. those that are copying the content). During this process, the client reaches out to one or more trackers that are identified on the roadmap. A tracker is an Internet server application that records the IP addresses associated with users who are currently sharing any number of media files identified by their unique hash values and then directs a BitTorrent users computer to other users who have the particular file each user is seeking to download. c. Since BitTorrent breaks up and distributed files in small chunks, once a user has even a single piece of a larger file, he or she can share that piece with others. Rather than downloading a file from a single source, the BitTorrent protocol allows users to join a "swarm," or group, of hosts to download and upload from each other simultaneously. 100. For a BitTorrent user, this process is quite simple. When a BitTorrent user seeks to download a motion picture, he or she merely conducts an Internet search for a torrent file of the motion picture, music, or other large file he or she wants. The user then opens the appropriate torrent file, which may be found
14

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 15 of 31

1 2 3

online on any number of torrent search engine websites, using a BitTorrent client application. 101. Because BitTorrent client software generally lacks the ability to

4 search for torrents, end-users use search engines or other websites that contain 5 indices of torrent files to find files being made available by other BitTorrent users. 6 These torrent files do not contain audio or visual media, but instruct the users 7 BitTorrent client where to go and how to obtain the desired file. 8

102. The downloading users BitTorrent client then extracts a list

9 containing one or more tracker locations, which it then uses to connect to at least 10 one tracker that will identify IP addresses where the file is available. Each IP 11 address identifies an uploading user who is currently running a BitTorrent client on 12 his or her computer and who is currently offering the desired motion picture file 13 for download.

The downloading users BitTorrent software then begins

14 downloading the motion picture file without any further effort from the user, by 15 communicating with the BitTorrent client programs running on the uploading 16 users computers. 17

103. The life cycle of a file shared using BitTorrent begins with just one

18 individual the initial propagator, sometimes called a seed user or seeder. 19 The initial propagator intentionally elects to share a file with a torrent swarm. The 20 original file, in this case, contains Plaintiffs entire copyrighted work. 21

104. Other members of the swarm who want a copy of (in this case) the

22 Plaintiffs copyrighted work connect to the seed to download the file, wherein the 23 download creates an exact digital copy of Plaintiffs copyrighted work on the 24 downloaders computers.

As additional infringers request the same file, each

25 additional infringer joins the collective swarm, and each new infringer receives the 26 same or different pieces of the file from each other thief in the swarm who has 27 already downloaded any part of the file. Eventually, once the initial propagator has 28 distributed each piece of the file to at least one other infringer, so that together the
15

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 16 of 31

1 pieces downloaded by members of the swarm comprises the whole motion picture 2 when reassembled, the initial propagator may leave the swarm, and the remaining 3 infringers can still obtain a full copy of the motion picture by exchanging the 4 pieces of the motion picture that each one has. 5

105. Files downloaded in this method are received in hundreds or even Each piece that is downloaded is immediately

6 thousands of individual pieces.

7 thereafter made available for distribution to other users seeking the same complete 8 file. The effect of this technology makes every downloader also an uploader of the 9 content. This means that every user who has a copy of the infringing material in a 10 swarm may also be a source for later downloaders of that material. 11

106. But there is honor among thieves. For a person to remain in good

12 standing within the BitTorrent community, it is important to upload as many files 13 as one downloads. Trackers keep track of the amount of data each peer uploads 14 and downloads. Those who merely download files, without uploading and sharing 15 files, are derisively called leechers. 16

107. Being a leecher is not only pejorative terminology, but leechers are

17 also punished by the torrent swarm with slower download speeds, and in some 18 cases, banning from the tracker. BitTorrents protocol stalls the downloads of 19 leechers, in an effort to preserve network speed for the more prolific appropriators. 20 The sharing of files as users receive them, then, is inherent in BitTorrents use for 21 the protocol to be of any utility to the end user. 22

108. This distributive nature of BitTorrent leads to a rapid viral sharing of a

23 file throughout the collective peer users. As more peers join the collective swarm 24 of simultaneous uploaders and downloaders, the frequency of successful 25 downloads also increases. Any seed peer that has downloaded a file prior to a 26 subsequent peer download of the same file automatically becomes a source for the 27 subsequent peer so long as that first peer is online at the time the subsequent peer 28 requests download of the file from the swarm.
16

Because of the nature of the

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 17 of 31

1 collective swarm downloads as articulated above, every infringer is and by 2 necessity together simultaneously both stealing the Plaintiffs copyrighted 3 material and redistributing it. 4

109. Plaintiff has recorded each Defendant named herein actually 110. Plaintiffs Motion Picture is easily discernable as a professional work. created the works using professional performers, directors,

5 publishing the Motion Picture via BitTorrent. 6

7 Plaintiff

8 cinematographers, lighting technicians, set designers and editors. Plaintiff created 9 each work with professional-grade cameras, lighting, and editing equipment. 10

111. Each of Plaintiffs works is marked with Plaintiffs trademark (Third

11 World Media ), and a statement as required by 18 U.S.C. 2257 that age 12 verification records for all individuals appearing in the works are maintained at 13 corporate offices in Chatsworth, CA. 14

112. At various times, Plaintiff discovered and documented its copyrighted

15 work being publicly distributed by Does 1-26 by and through the BitTorrent 16 network. 17

113. Defendants, without authorization, copied and distributed audiovisual

18 works owned by and registered to Plaintiff in violation of 17 U.S.C. 106(1) and 19 (3). 20 21 22

V. DEFENDANTS ARE MEMBERS OF A SINGLE BITTORRENT SWARM 114. Defendants are peer members who have all collectively participated in

23 the same P2P network swarm that was utilized to unlawfully infringe upon 24 Plaintiffs exclusive rights in its copyrighted film without permission. 25

115. Defendants initiated their infringement by searching for and obtaining

26 a torrent file containing information sufficient to locate and download Plaintiffs 27 copyrighted Motion Picture. Thereafter, each Defendant opened the torrent file 28
17

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 18 of 31

1 using a BitTorrent client application that was specifically developed to read such 2 files. 3

116. The unique file identifier generated by an algorithm developed by the

4 National Security Agency associated with the instant action is the 763 Hash. Each 5 Defendant is a member of the same collective swarm associated with the 763Hash, 6 and each acted collectively, and in concert, in effectuating the illegal and 7 unauthorized sharing of Plaintiffs copyrighted work. 8

117. Each Defendant owns or otherwise has control of a different computer

9 collectively connected to the Internet that contained or possibly still contains a 10 torrent file identifying Plaintiffs copyrighted work. Each computer also contained 11 or still contains Plaintiffs copyright work, which was downloaded using the 12 information encoded in that torrent file. 13

118. All of the Defendants republished and duplicated the Plaintiff's

14 Motion Picture. Moreover, they did not only replicate the same motion picture, but 15 all of the Defendants, as members of the same swarm, republished, duplicated, and 16 replicated the precise same copy and same 763 Hash version of the Motion Picture, 17 thus demonstrating that all of the Defendants shared and replicated the same 18 motion picture with one another, thus linking them all together in a massive 19 conspiracy and concerted effort to deprive the Plaintiff of its exclusive rights in the 20 Motion Picture under the Copyright Act. 21

119. Defendant peers each utilized a torrent file to upload and download

22 Plaintiffs copyrighted film without permission through use of the BitTorrent file 23 transfer protocol. 24

120. Each Defendant peer, consistent with using a BitTorrent P2P network,

25 obtained a torrent file containing sufficient information to locate and download a 26 copy of Plaintiffs Motion Picture. 27

121. After each Defendant peer downloaded a torrent containing


18

28 information concerning sources of Plaintiffs copyrighted Motion Picture, each

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 19 of 31

1 Defendant used that information to connect to other Defendants for the purpose of 2 sharing Plaintiffs copyrighted work with other members of the BitTorrent 3 collective network. 4

122. Plaintiffs copyrighted Motion Picture was then uploaded and

5 downloaded through a single swarm collective among the various Defendants in 6 concert all members sharing the same exact video, using the same exact hash 7 identifier. 8

123. Once connected to the BitTorrent swarm sharing Plaintiffs

9 copyrighted Motion Picture, the Defendant peers shared the Motion Picture 10 between each other by trading small portions of the file containing a digital copy of 11 the Motion Picture. More precisely, the BitTorrent network divided the original 12 copyrighted work into many small pieces and distributed these pieces throughout 13 the swarm until each of the collectively participating Defendants in the swarm had 14 a partial or complete infringing copy of the Motion Picture. 15

124. Based on this information, Defendants all participated in the same

16 collective swarm, infringing upon Plaintiffs exclusive rights in its work by 17 uploading (distributing) and downloading (reproducing) Plaintiffs copyrighted 18 film, and through their actions each Defendant assisted each and every other 19 Defendant, each members of the P2P network swarm, to illegally download 20 Plaintiffs copyrighted work. 21 22 23

VI. FIRST CAUSE OF ACTION (Copyright Infringement 17 U.S.C. 501) 125. The Plaintiff re-alleges and incorporates by reference the allegations

24 contained in each paragraph above. 25

126. Plaintiff is, and at all relevant times has been, the copyright owner of

26 the copyrighted work infringed upon by all Defendants, Tokyo Cream Puffs 8. 27 Exh. 1. 28
19

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 20 of 31

127. Among the exclusive rights granted to each Plaintiff under the

2 Copyright Act are the exclusive rights to reproduce the Motion Picture and to 3 distribute it rights which Defendants maliciously and intentionally infringed 4 upon. 5

128. Plaintiff is informed and believes, and on that basis alleges, that

6 Defendants without the permission or consent of Plaintiff, have used, and continue 7 to use, the BitTorrent file transfer protocol to distribute the Motion Picture to the 8 public, and/or make the Motion Picture available for distribution to others, 9 including other BitTorrent users. In doing so, Defendants have violated Plaintiffs 10 exclusive rights of reproduction and distribution. Defendants actions constitute 11 infringement of Plaintiffs copyrights and exclusive rights under the Copyright 12 Act. 13

129. Plaintiff is informed and believes and on that basis alleges that the 130. As a result of Defendants infringement of Plaintiffs copyrights and

14 foregoing acts of infringement were willful and intentional. 15

16 exclusive rights under the Copyright Act, Plaintiff is entitled to either actual or 17 statutory damages pursuant to 17 U.S.C. 504(c), and to its attorney fees pursuant 18 to 17 U.S.C. 505. 19

131. The conduct of Defendants is causing and will continue to cause Such harm will continue unless the Plaintiff has no

20 Plaintiff great and irreparable injury.

21 Defendants are enjoined from such conduct by this Court.

22 adequate remedy at law. Pursuant to 17 U.S.C. 502 and 503, Plaintiff is entitled 23 to injunctive relief prohibiting Defendants from further infringing Plaintiffs 24 copyrights, and ordering Defendants to destroy all copies of the Motion Picture 25 made in violation of Plaintiffs exclusive rights under the Copyright Act. 26 27 28
20

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 21 of 31

1 2 3

VII. SECOND CAUSE OF ACTION (CONTRIBUTORY COPYRIGHT INFRINGEMENT) 1. Plaintiff re-alleges and incorporates by reference the allegations It is helpful to think of the process of torrenting in the context of a

4 contained in each paragraph above. 5

2.

6 constructed puzzle. In furtherance of sharing this puzzle, it is deconstructed into 7 tiny pieces. These pieces are then uploaded, copied and distributed among one or 8 more peers. When an infringer seeks to download the original file, he downloads a 9 torrent file containing information concerning where each of the distributed pieces 10 of the file can be found, i.e., how to find and contact each peer. Each torrent file 11 that contains information about the same original file is contains the same hash 12 value, which is a string of letters and numbers that uniquely identifies the original 13 file that the torrent client may use to locate and download the torrent file. This 14 torrent file is capable of locating all the unique corresponding pieces that make up 15 the original file (and any additional copies of each piece that may be available). 16 Once all the pieces are located and downloaded they are reconstructed back into 17 the original order completing the entire original copyrighted file. 18

3.

When users all possess the same infringing work with the same exact

19 hash value (as in this case), it is because each infringer possesses an exact digital 20 copy, containing the exact bits unique to that file, of the original work. In essence, 21 although hundred of users may be uploading the copyrighted work, you will 22 receive only the exact parts of a singular hash, not a compilation of available 23 pieces from multiple hashes. 24

4.

Beyond directly copying and distributing the copyrighted works on

25 BitTorrent, some of the Defendants knowingly provided internet access to other 26 Defendants who used the BitTorrent protocol to upload and distribute the work. 27 These Defendants who provided internet access to infringers, best thought of as 28 intermediaries, provided the essential element needed for other Defendants to
21

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 22 of 31

1 commit direct infringement on the BitTorrent protocol, and to contribute to 2 countless others copyright infringement. 3

5.

Each of the Defendants published, or contributed to the publication of,

4 the precise same hash file, described in Paragraph 13, to the BitTorrent network. 5

6.

Each Defendant downloaded, uploaded and distributed the Motion

6 Picture to each other, or knowingly contributed to this goal through providing 7 internet necessary to accomplish such copying and distribution, in concert with one 8 another and through use of the exact same protocol. 9

7.

Because it is the exact same motion picture, using the exact same

10 hash, in the same general timeframe, the transaction of events at issue in this 11 Complaint is common to all Defendants, thus rendering the Defendants properly 12 joined in this action. 13

8.

BitTorrent users upload infringing works in concert in order to gain

14 access and ability to download other infringing copyrighted works. 15

9.

Defendants who allow others to use their internet connections receive,

16 or may receive, a combination of access of the infringing works, compensation for 17 access to the internet access used to commit the infringement, accrued goodwill 18 from other Defendants, and other benefits. 19

10.

As each of the thousands of people who illegally downloaded the

20 movie accessed this illegal publication, they derived portions of their illegal 21 replication of the file from multiple persons, including but not limited to the 22 Defendants named in this action, through either the Defendants direct copying and 23 distribution of the copyrighted work or the provision of internet services that 24 effected this same outcome. 25

11.

The Defendants knew of the infringement, were conscious of their

26 own infringement or contribution thereto, and the Defendants were conscious of 27 the fact that multiple other persons derivatively downloaded the file containing the 28 Plaintiffs Motion Picture.
22

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 23 of 31

12.

The infringement by other BitTorrent users could not have occurred

2 but for the Defendants participation in uploading the Plaintiffs protected work, 3 through use of the BitTorrent protocol or provision of internet services used to 4 copy and distribute the work.

As such, the Defendants participation in the

5 infringing activities of others is substantial. 6

13.

The Defendants each profited from this contributory infringement by

7 way of being granted access to a greater library of other infringing works, some of 8 which belonged to the Plaintiff and some of which belonged to other copyright 9 owners. 10 11 12

VIII. THIRD CAUSE OF ACTION (CIVIL CONSPIRACY) 14. Plaintiff re-alleges and incorporates by reference the allegations

13 contained in each paragraph above. 14

15.

Without authorization, each of the Doe Defendants uploaded and

15 distributed Plaintiffs copyrighted works by and through the BitTorrent file transfer 16 protocol. 17

16.

The BitTorrent file transfer protocol is typically used to locate,

18 reproduce, and distribute infringing content. 19

17.

Plaintiff is informed and believes and based thereon alleges that the

20 material made available by and through the BitTorrent file transfer protocol 21 includes a substantial amount of obviously unauthorized material including, for 22 example, first run feature films prior to DVD or even box office release. 23

18.

In order to access and use the BitTorrent file transfer protocol, a user

24 must first download special software called a BitTorrent client. 25

19.

The center of the conspiracy is the scheme to traffic in infringing If authorities remove any of the BitTorrent trackers from service, the

26 content.

27 others may continue to operate. 28


23

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 24 of 31

20.

The purpose of the BitTorrent file transfer protocol (i.e., for certain

2 participants to identify themselves as a source for a file hash to one or more 3 trackers and thereby facilitate the reproduction and distribution of infringing copies 4 of copyrighted works between a network of coconspirators) is apparent to any user 5 who downloads a BitTorrent client and uses the client for that purpose. 6

21.

Once a user identifies and selects the infringing content he or she

7 wants to download, he or she can then use the BitTorrent client to locate that file, 8 or any portion thereof, on the computers of other users offering the file for 9 distribution and then transfer the infringing file to his or her computer. 10

22.

The transfer of infringing files cannot occur without the existence and

11 assistance of the participant users, including the Defendants named herein, who 12 supply the infringing content. 13

23.

Plaintiff is informed and believes and based thereon alleges that each

14 of the Defendants downloaded and/or used/distributed a BitTorrent client for the 15 purpose of conspiring with other BitTorrent users to reproduce and distribute 16 movies in violation of copyright laws. 17

24.

Plaintiff is informed and believes and based thereon alleges that at the

18 time each Doe Defendant downloaded and/or used/distributed a BitTorrent client 19 for the purpose of obtaining or sharing Plaintiffs movie, he or she knew the client 20 would provide access to infringing movies made available by other users and 21 would allow the Defendant to provide the infringing movie to other BitTorrent 22 users. 23

25.

Plaintiff is informed and believes, and based thereon alleges, that at

24 the time each Doe Defendant downloaded and/or used/distributed a BitTorrent 25 client for the purposes of obtaining or sharing Plaintiffs movie, he or she intended 26 to access a network of other BitTorrent users for the purpose of reproducing and 27 exchanging infringing copies of the movie in violation of copyright laws. 28
24

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 25 of 31

26.

Plaintiff is informed and believes, and based thereon alleges, that

2 BitTorrent clients reward users for making content available to others by enabling 3 faster download speeds for those who make content available. 4

27.

Plaintiff is informed and believes and based thereon alleges that each

5 Defendant without authorization offered large amounts of infringing content to 6 others, knowing that other BitTorrent users would download the infringing content 7 and further distribute it in exchange for still more infringing content. 8

28.

Plaintiff is informed and believes, and based thereon alleges, that each

9 Defendant distributed infringing movies in anticipation of receiving copies of 10 infringing movies in return, including Plaintiffs copyrighted Motion Picture. 11

29.

Each Doe Defendant knew or should have known that the infringing

12 content the Defendant downloaded to her or his computer came from the 13 computers of other users, who made the content available to him or her, as well as 14 others in the same network of BitTorrent users, in violation of copyright laws. 15

30.

Each Doe Defendant understood the nature of the conspiracy to

16 violate copyrights and agreed to join the conspiracy by downloading a BitTorrent 17 client with the intention of using that BitTorrent client, or simplu using a 18 BitTorrent client previously downloaded, to knowingly download, reproduce, and 19 distribute infringing files with coconspirators. 20

31.

Each Defendant engaged in an unlawful act in furtherance of the

21 conspiracy when he or she, without authorization, used a BitTorrent client to 22 download, reproduce, and distribute copies of Plaintiffs copyright registered 23 works. 24

32.

Defendants, all and each of them, conspired with the other Defendants

25 by agreeing to provide infringing reproductions of various copyright protected 26 works, including Plaintiffs works, in exchange for infringing reproductions of 27 other copyright protected works, including Plaintiffs works. 28
25

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 26 of 31

33.

Each Defendant took affirmative steps to advance the conspiracy by

2 unlawfully and without authorization reproducing Plaintiffs copyrighted works 3 and distributing those works to coconspirators by and through the BitTorrent file 4 transfer protocol in anticipation of receiving other infringing copies of copyright 5 protected works in exchange. 6

34.

The Defendants conspiracy with others to unlawfully reproduce and

7 distribute infringing copies of its works by and through the BitTorrent file transfer 8 protocol caused Plaintiff harm in an amount to be determined at trial. 9 10 11 12 13

Each Defendant is jointly and severally liable for the harm Plaintiff suffered as a result of the Defendants participation in the conspiracy to violate copyright laws. VII. SECOND CAUSE OF ACTION (CONTRIBUTORY COPYRIGHT INFRINGEMENT) 1. Plaintiff re-alleges and incorporates by reference the allegations It is helpful to think of the process of torrenting in the context of a

14 contained in each paragraph above. 15

2.

16 constructed puzzle. In furtherance of sharing this puzzle, it is deconstructed into 17 tiny pieces. These pieces are then uploaded, copied and distributed among one or 18 more peers. When an infringer seeks to download the original file, he downloads a 19 torrent file containing information concerning where each of the distributed pieces 20 of the file can be found, i.e., how to find and contact each peer. Each torrent file 21 that contains information about the same original file is contains the same hash 22 value, which is a string of letters and numbers that uniquely identifies the original 23 file that the torrent client may use to locate and download the torrent file. This 24 torrent file is capable of locating all the unique corresponding pieces that make up 25 the original file (and any additional copies of each piece that may be available). 26 Once all the pieces are located and downloaded they are reconstructed back into 27 the original order completing the entire original copyrighted file. 28
26

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 27 of 31

3.

When users all possess the same infringing work with the same exact

2 hash value (as in this case), it is because each infringer possesses an exact digital 3 copy, containing the exact bits unique to that file, of the original work. In essence, 4 although hundred of users may be uploading the copyrighted work, you will 5 receive only the exact parts of a singular hash, not a compilation of available 6 pieces from multiple hashes. 7

4.

Beyond directly copying and distributing the copyrighted works on

8 BitTorrent, some of the Defendants knowingly provided internet access to other 9 Defendants who used the BitTorrent protocol to upload and distribute the work. 10 These Defendants who provided internet access to infringers, best thought of as 11 intermediaries, provided the essential element needed for other Defendants to 12 commit direct infringement on the BitTorrent protocol, and to contribute to 13 countless others copyright infringement. 14

5.

Each of the Defendants published, or contributed to the publication of,

15 the precise same hash file, described in Paragraph 13, to the BitTorrent network. 16

6.

Each Defendant downloaded, uploaded and distributed the Motion

17 Picture to each other, or knowingly contributed to this goal through providing 18 internet necessary to accomplish such copying and distribution, in concert with one 19 another and through use of the exact same protocol. 20

7.

Because it is the exact same motion picture, using the exact same

21 hash, in the same general timeframe, the transaction of events at issue in this 22 Complaint is common to all Defendants, thus rendering the Defendants properly 23 joined in this action. 24

8.

BitTorrent users upload infringing works in concert in order to gain

25 access and ability to download other infringing copyrighted works. 26

9.

Defendants who allow others to use their internet connections receive,

27 or may receive, a combination of access of the infringing works, compensation for 28


27

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 28 of 31

1 access to the internet access used to commit the infringement, accrued goodwill 2 from other Defendants, and other benefits. 3

10.

As each of the thousands of people who illegally downloaded the

4 movie accessed this illegal publication, they derived portions of their illegal 5 replication of the file from multiple persons, including but not limited to the 6 Defendants named in this action, through either the Defendants direct copying and 7 distribution of the copyrighted work or the provision of internet services that 8 effected this same outcome. 9

11.

The Defendants knew of the infringement, were conscious of their

10 own infringement or contribution thereto, and the Defendants were conscious of 11 the fact that multiple other persons derivatively downloaded the file containing the 12 Plaintiffs Motion Picture. 13

12.

The infringement by other BitTorrent users could not have occurred

14 but for the Defendants participation in uploading the Plaintiffs protected work, 15 through use of the BitTorrent protocol or provision of internet services used to 16 copy and distribute the work.

As such, the Defendants participation in the

17 infringing activities of others is substantial. 18

13.

The Defendants each profited from this contributory infringement by

19 way of being granted access to a greater library of other infringing works, some of 20 which belonged to the Plaintiff and some of which belonged to other copyright 21 owners. 22 23 24

IX. FOURTH CAUSE OF ACTION (NEGLIGENCE) 14. Plaintiff re-alleges and incorporates by reference the allegations

25 contained in each paragraph above. 26

15.

Upon information and belief, Defendants accessed, or controlled

27 access, to the Internet connection used in performing the unauthorized copying and 28 sharing of Plaintiffs Motion Picture described above.
28

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 29 of 31

16.

Upon information and belief, Defendants failed to adequately secure

2 their Internet access, whether accessible only through their computer when 3 physically connected to an Internet router, or accessible to many computers by use 4 of a wireless router, and failed to prevent its use for this unlawful purpose. 5

17.

Reasonable Internet users take steps to secure their Internet access

6 accounts to prevent the use of such accounts for nefarious and illegal purposes. As 7 such, Defendants failure to secure their Internet access accounts, and thereby 8 prevent such illegal uses thereof, constitutes a breach of the ordinary care that 9 reasonable persons exercise in using an Internet access account. 10

18.

Upon information and belief, Plaintiff alleges that Defendants failure

11 to secure their Internet access allowed for the copying and sharing of Plaintiffs 12 Motion Picture by use of the BitTorrent protocol on Defendants respective 13 Internet connections, and interfering with Plaintiffs exclusive rights in the 14 copyrighted work. 15

19.

Upon information and belief, by virtue of this unsecured access,

16 Defendants negligently allowed the use of their Internet access accounts to perform 17 the above-described copying and sharing of Plaintiffs copyrighted Motion Picture. 18

20.

Upon information and belief, had Defendants taken reasonable care in

19 securing access to their Internet connections, such infringements as those described 20 above would not have occurred by the use of their Internet access accounts. 21

21.

Upon information and belief, Defendants negligent actions allowed

22 others to unlawfully copy and share Plaintiffs copyrighted Motion Picture, 23 proximately causing financial harm to Plaintiff and unlawfully interfering with 24 Plaintiffs exclusive rights in the Motion Picture. 25 26 27 28

PLAINTIFFS REQUEST FOR RELIEF For an injunction providing that: 1. Each Defendant shall be and hereby is enjoined from directly or
29

indirectly infringing upon the Plaintiffs copyrights in the Motion Picture or any

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 30 of 31

1 2 3 4 5 6 7 8 9 10 11

other works, whether now in existence or later created, that are owned or controlled by Plaintiff (or any parent, subsidiary, or affiliate of Plaintiff), including without limitation by using the Internet or any online media distribution system to reproduce (i.e., download) any of Plaintiffs works, to distribute (i.e., upload) any of Plaintiffs works, or to make any of Plaintiffs works available for distribution to the public, except pursuant to a lawful license or with the Plaintiffs express consent. Each Defendant also shall destroy all copies of Plaintiffs works that Defendant has downloaded onto any computer hard drive or server and shall destroy all copies of those downloaded works transferred onto any physical medium or device in each Defendants possession, custody, or control. 2. For damages for each infringement of each copyrighted work pursuant

12 to 17 U.S.C. 504. These damages may be actual or statutory, but if statutory 13 damages are elected, the Defendants acts were willful in nature, justifying an 14 award of up to $150,000 per infringement, and Plaintiff reserves the right to make 15 such an election. 16 17 18

3. 4. 5.

For Plaintiffs costs in this action. For Plaintiffs attorneys fees incurred in bringing this action. For such other and further relief, either at law or in equity, general or

19 special, to which Plaintiff may be entitled that the Court deems just and proper. 20 21 22 23 24 25 26 27 28
30

Respectfully submitted this 2 day of October, 2011.

/s/ Beth Hutchens, Esq. HUTCHENS LAW OFFICES, PLLC Attorneys for Plaintiffs

Case 2:11-cv-01932-NVW Document 1 Filed 10/02/11 Page 31 of 31

1 I hereby certify that the foregoing document was filed electronically using this 2 Courts CM/ECF system on October 2, 2011. As the identities of Doe Defendants 3 1 through 26 are unknown at this time, Plaintiff is unable to serve any defendant. 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28
31

DATED this 2 day of October, 2011. BETH A. HUTCHENS HUTCHENS LAW OFFICES, PLLC

/s

BETH A. HUTCHENS Attorney for Plaintiff

Das könnte Ihnen auch gefallen