The afternoon began with opening statements from the both sides.
Plaintiffs began by describing their industry and stating that their businesses are made up of "real people" who work to make musical recordings available to the public, from singers and songwriteres to graphic artists, talent scouts and others who many others involved in the process of purchasing tracks that the public can purchase.
They described that their industry has been greatly hurt in the past several years and they have been forced to engage in many layoffs and loss of revenues which they attribute to illegal distribution of music on the internet. They explain that they bring this case to show that Jammie Thomas violated copyrights in twenty-four of their sound recordings.
They went through the plain statement of their case, that they retained MediaSentry to use programs like KaZaA in the same manner as any other internet used by any internet user to locate tracks and download them. They then associate the information provided by MediaSentry with information they recieve pursuant to subpoena to internet service providers to identify those who they believe are responsible.
They described many of the witnesses they intend to call who will testify that a user identified by the alias tereastarr@KaZaA infringed on their copyrights and that the person responsible is Jammie Thomas-Rasset. The list of witnesses mentioned went through record company employees, experts, internet service provider employees, and others.
They also explain that no evidence will be shown of other distributions to internet users other than MediaSentry and give two explanations. First is that the KaZaA application does not keep records or logs of distributions, and second that the KaZaA network is designed so that no one else knows what distributions are occuring.
They then described other evidence that they intend to produce, such as that the tereastarr alias is unique to Jammie Thomas-Rasset and that the music tastes of those files they identified as being shared match those of the defendant, and that defendant intended to cover up the fact that she used KaZaA by replacing her computer hard drive.
Defense opening is much shorter and explains that if the jury believes everything that the plaintiffs tell them that they have only demonstrated that the transfers of music files did occur, and that no witness could testify that the defendant was the one who did them.
He then went on to describe that the plaintiffs in this case are asking for up to $3.6 million dollars be awarded for the claims of twenty-four infringing works, and that their initial claim of more than 1,700 music files would mean that by their damage theroy they could ask for an award of $250 million dollars, against a single individual defendant.
Defense claims that the recording industry will attempt to show Ms. Thomas-Rasset is at the center of an internet stealing ring - all occuring from the bedroom of her apartment.
Mr. Camara also offered another explanation for why the hard drive produced by defendant was not the one in her computer on February 21st, 2005. Defense offers that in March of 2005 the defendant's son hit the machine after playing a video game and that afterwards it would only start up to a blank screen. Defendant brought the computer to Best Buy, where it was purchased and warranted and that Best Buy made the decision to install a new hard drive since the previous one had failed.
Defense also states that Ms. Thomas is an avid music fan and that evidence will be shown that she has purchased over two hundred CDs, including CDs of all the tracks plaintiffs are suing for damages over.
He closes by asking the jury to look for "any evidence that Jammie Thomas did it" and then let her tesify to "prove it wrong".
The first witness was Gary Leak, general counsel for Sony Music Entertainment. He explains the organization of Sony into several labels, two of which are plaintiffs in this case. He begins by describing what goes in to making a track of music and all of the parties that go in to it. He then is asked about MediaSentry and how they gather evidence. Most of Mr Leak's testimony from this point forward is objected to by defense because Mr. Leak lacks personal knowledge of what went on in this specific case and that a foundation has not been established for the evidentiary exhibits they intend to introduce with him as a witness. After several sidebar conferences the only evidence admitted is eight certified copies of copyright registrations by Sony's labels, and CDs corresponding to those songs. He is asked about the copyright notices on these CDs and points them out for the jury.
Upon cross examination Mr. Leak was asked if several artists were ever employees of Sony Music Entertainment. He responded that to the best of his knowledge none of them had been, and that they had contracts with Sony whereby works they produced would be works made for hire.
He then asks Mr. Leak questions about what he thinks an appropriate amount of damages would by against Ms. Thomas-Rasset. He initially simply says that they are seeking statuatory damages which the jury should award, but does admit they are seeking up to $150,000 per work. He says that a "message should be sent" with the award.
He is also asked about what else the labels are doing in regards to combating illegal file-sharing. He states four things, educational campaigns, litigation against services which allow music to be distributed, litigation against individuals believed to have engaged in copyright infringement and working with ISPs. He is asked what the industry is doing in the U.S. with ISPs to which he has no knowledge, and the testimony briefly strayed towards France before Plaintiffs objected and were sustained on issues relating to the French "3-strikes" law.
Next witness was Chris Connelly from MediaDefender/MediaSentry. He was questioned by Mr. Oppenheim. He described the process they use to collect information, mainly that they do the same thing as any other internet user could do except for two things: they have automated tools to use KaZaA and other networks and that they collect additional evidence as these automated tools use the software. He testified that they tested this automated software and that it had a "zero error rate".
At this point most of the MediaSentry evidence was admitted as Mr. Connelley described it. Screenshots, user logs, download logs, system logs, and CD-Rs made of MP3 files that MediaSentry acquired. Mr. Camara objected to some of this testimony on the workings of the technology and KaZaA as Mr. Connelley was not an expert, but these objections were overruled.
He also testified that MediaSentry had no evidence of files distributed to anyone other than MediaSentry for the same reasons brought up in the opening. He additionally offered testimony of IM messages sent via KaZaA to tereastarr@KaZaA warning of copyright infringement. He claimed under direct questioning that these messages would not be something that a KaZaA user would typically ignore since they present themselves as pop-ups in the middle of the computer screen.
Mr. Camara's questioning of Mr. Connelley focused at first on his claim of a "zero error rate". Mr. Connelley testified that the claims of a zero error rate were backed up by other clients of MediaSentry, and also admitted that no one else has access to or reviewed the code MediaSentry used in its automated processes. He also claimed, interestingly, that he beleived no one had ever asked to examine the source code and that if such a request was made he would think that it would be granted by the company under some sort of confidentiality agreement.
He then asked about the instant messages and whether or not the application could be configured to suppress these, he testified that he believed it could but that it was not the default behavior. This matter was questioned on redirect and recross and the result of the testimony was that MediaSentry collected evidence that the computer that the instant messages were sent to did recieve them, but he had no way of knowing that they were ever displayed and that they were never replied to.
Final witness of the day was from Charter Communications. The subpoena upon charter and the response was moved in to evidence and the witness described the methods used by Charter to tie an IP address with a specific date and time to a modem MAC address back to their billing system which has the individual contact information and e-mail address.
The initial legal notice that Charter sent to Ms. Thomas was also displayed and initially the witness claimed that it was sent via Federal Express, so that it would not likely be something that would be missed by the defendant. Upon cross-examination she admitted that she had no way of knowing whether or not the defendant noticed this letter or whether or not she had recieved it.
Trial then broke for the day. There are two motions that counsel was instructed to brief the court on by midnight and will be heard at 8am tomorrow morning. Plaintiffs asked that they be provided with breifs that they claim defense had already written, but the court stuck with the initial instruction of briefing by midnight for argument tomorrow morning.
Keywords: lawyer digital copyright law online internet law legal download upload peer to peer p2p file sharing filesharing music movies indie independent label freeculture creative commons pop/rock artists riaa independent mp3 cd favorite songs intellectual property portable music player
9 comments:
The "zero error rate" will be what they put on MS's grave. Did they mention the dead person, the homeless man, or the half a dozen other examples where they have gotten the initial identification wrong.
They sent notice via fedex?! Don't they have procedures for serving notice on someone that guarantee that they receive the notice?
I wonder who will be the first to use Mr. Connelley own statements in order to demand production of the source code for MS's tools.
Oh, one question. Does Mr. Connelley's statement open the door to testimony from other cases as rebuttal despite the judge ruling that the other cases are off-limits?
"Hey, can we have that brief before midnight? It's not like we bill at twice our normal rate for working that late."
Then again, these people have tried to sue networkable laser printers for file sharing. Why should any more laziness surprise me.
Thanks for the great write-up Marc! I look forward to reading the rest of the week's updates. You're doing a real service to all of us following.
Regarding the hard drive that was replaced at Best Buy...I'm a Geek Squad agent and the program we use to keep track of orders goes back at least until 2002, with the one to track purchases going back to the late 90's. Shouldn't her lawyer have gotten a hold of that order to completely dispel any notion that she was trying to cover things up?
- GS Agent
is the jury being sequestered or are they going home each night?
They also explain that no evidence will be shown of other distributions to internet users other than MediaSentry and give two explanations. First is that the KaZaA application does not keep records or logs of distributions, and second that the KaZaA network is designed so that no one else knows what distributions are occuring.
To this man this case should have ended exactly at this moment. Plaintiffs admit that they cannot prove that any distribution has ever occurred. End of infringement. Why did this go on for even another second?
Also since they know that KaZaA never kept any logs, why did they need to perform a forensic anal exam of the suspect computer's hard drive? What could they have ever been legally looking for? The mere presence of music files, or even a completely legal P2P program, does not prove distribution. Are they searching for leftover browser files? someone's personal resume? Fishing is more like it.
{The Common Man Speaking}
Post a Comment