Feeds

US Judge says IP addresses don't identify pirates

“Abusive litigation” by copyright trolls criticised

3 Big data security analytics techniques

A US judge has labelled an attempt to sue internet subscribers whose accounts were used to download four pornographic films “abusive litigation” and also criticised legal arguments that an IP address is a valid way to identify an individual online.

The comments were made by Gary R Brown, United States Magistrate Judge, in a case known as K-Beech, Inc. v. John Does 1-37 and associated cases involving entities called Malibu Media and Patrick Collins Inc. K-Beech proudly states it makes films for “adults who enjoy extremely graphic and explicit XXX entertainment.” Some of those products, the company alleged, were illegally downloaded using BitTorrent.

K-Beech thinks it knows who did so and provided the court with what Judge Brown described as “an IP address purportedly corresponding to a physical address”.

Judge Brown thinks that's a lousy way of identifying anyone, and in his judgement said so in no uncertain terms: “However, the assumption that the person who pays for Internet access at a given location is the same individual who allegedly downloaded a single sexually explicit film is tenuous, and one that has grown more so over time. An IP address provides only the location at which one of any number of computer devices may be deployed, much like a telephone number can be used for any number of telephones.

“Thus, it is no more likely that the subscriber to an IP address carried out a particular computer function – here the purported illegal downloading of a single pornographic film – than to say an individual who pays the telephone bill made a specific telephone call.”

The Judge also criticised plaintiffs' arguments that they should be granted access to more information about the identity of IP address users, as “... the alleged infringer could be the subscriber, a member of his or her family, an employee, invitee, neighbor or interloper.”

The Judge also noted that some of the defendants look to have good cases.

One has stated under oath that he closed the account allegedly used to download K-Beech's films before the time of the downloads. Another is “... an octogenarian with neither the wherewithal nor the interest in using BitTorrent” while a third stated that “... her wireless router was not secured and she lives near a municipal parking lot, thus providing access to countless neighbors and passersby.”

Another defendant's testimony seems to show that K-Beech is more interested in intimidating defendants than giving them the chance to prove they did not download its works.

“Upon receipt of the Complaint, I reached out to Plaintiff and spoke to a self-described “Negotiator” in an effort to see if I could prove to them … that I had nothing to do with the alleged copyright infringements,” one defendant said. “The Negotiator was offered unfettered access to my computer, my employment records, and any other discovery they may need to show that I was not the culpable party. Instead, the Negotiator refused and was only willing to settle the Complaint for thousands of dollars.” The Negotiator later failed to return voice mails.

Judge Brown's view of that behaviour is dim, as he writes that the “... plaintiffs have employed abusive litigations tactics to extract settlements from John Doe defendants. Indeed, this may be the principal purpose of these actions, and these tactics distinguish these plaintiffs from other copyright holders with whom they repeatedly compare themselves.”

Brown also criticises the plaintiffs' tactics of adding many defendants to a single action, saying it appears to be abusing a loophole that allows litigants to file only one court fee even though they act against many defendants.

“Nationwide, these plaintiffs have availed themselves of the resources of the court system on a scale rarely seen,” the judgement reads. “It seems improper that they should profit without paying statutorily required fees.”

The judgement nonetheless permits the plaintiffs Malibu Media and Patrick Collins to “... obtain the name, address, and Media Access Control address for each Defendant designated as John Doe 1” and says the defendants' internet service providers must hand over relevant information. ®

High performance access to file storage

More from The Register

next story
Did a date calculation bug just cost hard-up Co-op Bank £110m?
And just when Brit banking org needs £400m to stay afloat
One year on: diplomatic fail as Chinese APT gangs get back to work
Mandiant says past 12 months shows Beijing won't call off its hackers
Whoever you vote for, Google gets in
Report uncovers giant octopus squid of lobbying influence
Lavabit loses contempt of court appeal over protecting Snowden, customers
Judges rule complaints about government power are too little, too late
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Don't let no-hire pact suit witnesses call Steve Jobs a bullyboy, plead Apple and Google
'Irrelevant' character evidence should be excluded – lawyers
EFF: Feds plan to put 52 MILLION FACES into recognition database
System would identify faces as part of biometrics collection
Putin tells Snowden: Russia conducts no US-style mass surveillance
Gov't is too broke for that, Russian prez says
Ex-Tony Blair adviser is new top boss at UK spy-hive GCHQ
Robert Hannigan to replace Sir Iain Lobban in the autumn
Alphadex fires back at British Gas with overcharging allegation
Brit colo outfit says it paid for 347KVA, has been charged for 1940KVA
prev story

Whitepapers

Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
SANS - Survey on application security programs
In this whitepaper learn about the state of application security programs and practices of 488 surveyed respondents, and discover how mature and effective these programs are.