Friday, October 07, 2005

Magistrate Judge (a) Permits RIAA Missouri Lawyers to Appear By Telephone (b) Orders RIAA Corporate Rep with "Settlement Authority" to Phone in Too

In the Atlantic v. Huggins peer to peer file sharing case in Brooklyn federal court, a settlement conference was scheduled for Friday, October 7th.

On September 21st, Mr. Huggins's lawyers asked the Magistrate to require a corporate officer from one of the RIAA companies -- with settlement authority -- to appear at the settlement conference. http://recordingindustryvspeople.blogspot.com/2005/09/atlantic-v-huggins-shook-hardy-bacon.html

On October 6th, the day before the conference, the RIAA's lawyers asked for permission for their Misssouri attorney to appear by telephone, and for the corporate officer not to appear at all. They indicated that their Missouri counsel had authority to "discuss settlement" but not that he had "settlement authority". http://recordingindustryvspeople.blogspot.com/2005/10/riaa-in-atlantic-v-huggins-asks.html

On October 6th, Magistrate Judge Robert M. Levy ruled that (a) a corporate representative of the plaintiffs did have to appear, but could do so by telephone, and (b) the Missouri lawyer could appear by telephone rather than in person.
October 6, 2005, order of Magistrate Judge Robert M. Levy.
(Alternate link)

p2pnet says "Organize"

p2pnet has called for people to engage in grassroots organizing against the RIAA lawsuit campaign:
http://p2pnet.net/story/6522

Thursday, October 06, 2005

RIAA in Atlantic v. Huggins Asks Permission for Shook Hardy Bacon to appear by telephone, and permission not to bring corporate officer

On the day before the scheduled settlement conference in peer to peer file sharing case Atlantic v. Huggins, in Brooklyn federal court, the RIAA's attorneys have asked the Magistrate Judge for permission (a) to allow the Shook Hardy Bacon attorney to appear by telephone rather than in person and (b) not to bring a corporate representative of the record companies.

The RIAA's attorney represented that the lawyers have "complete authority to discuss settlement", but did not say that they have settlement authority, which is the more usual term.

October 6, 2005, letter of Maryann E. Penney

Ed. note. Based on my experience with the RIAA cases, the lawyers do NOT have settlement authority. Having authority to "discuss" settlement is meaningless; it means having authority to waste the judge's and opposing counsel's time.
-R.B.

Wednesday, October 05, 2005

In Loud v. Does RIAA Opposes Motion to Quash in Manhattan Federal court

In Loud v. Does, a peer to peer filesharing case against numerous unknown "John Doe" defendants in Manhattan federal court, the RIAA has opposed Jane Doe's motion to quash.

Memorandum of law in opposition
(Alternate link)

Appendix to Memorandum of law in opposition
(Alternate link)

The lawyers for defendant are Ray Beckerman, Morlan Ty Rogers, and Daniel A. Singer of Beldock Levine & Hoffman LLP

RIAA in Atlantic v. Huggins Opposes Defendant's Request for a Pre-Motion Conference

In an unusual step, the RIAA's lawyers, in p2p file share case Atlantic v. Huggins, have opposed defendant's request for a pre-motion conference to discuss with the Court the defendant's proposed motion to dismiss.

October 5, 2005, letter
(Alternate link)

The lawyers for defendant are Ray Beckerman, Morlan Ty Rogers, and Daniel A. Singer of Beldock Levine & Hoffman LLP

"Sue 'em all" by John Hermann

p2pnet has published this interesting and informative article by John Hermann, the Berkley, Michigan, attorney representing many RIAA defendants in Detroit federal court:



Sue 'em all
By John Hermann

The recording industry and its trade association, the RIAA (Recording Industry Association of America) are in their second year of targeting users of peer-to–peer software programs under the guise of stamping out copyright infringement. The lawsuits are pursued in essentially two phases. First, The RIAA employs a team so called “investigators” who locate alleged infringers using the same software programs that they describe as being specifically designed for “online media distribution.”

As with all peer-to-peer programs, the peer-to-peer programs simply allows for the exchange of information, not all of which is copyrighted. Possible uses include such benign examples a photos among family members, research material, personal interest items.

Certain sound recordings and/or written items which are beyond the limitations of the copyright protection may also be legitimately exchanged such as works of Beethoven , Dickens, etc.

Notwithstanding the number of legitimate applications, the industry has attempted to target all peer-to-peer software systems as being primarily used to facilitate the exchange of copyrighted material.

Unfortunately, the methods locating potential infringers fail to adequately distinguish those who are, in fact, infringers from other individuals who have no association with potential infringing activity.

Typically, the RIAA minions use the very programs they claim are “vehicles for infringement” to locate other individuals either hosting or seeking files which appear to be copyrighted materials. By conducting a search or viewing another peer member’s shared list, the investigators are able to locate files which they believe constitute protected works.

For instance, if the investigative outfit were to view another peer member’s shared file bearing the name Madonna – Like A Virgin, they typically assumethe file is a audio, mp3 or WVA version of Madonna’s copyrighted sound recording . Rather than examining the contents of the file to verify that it is, in fact, a Madonna tune, the investigator simply assume it is because it's stored on a peer system and because it bears a similar identification to a popular artist.

Many of the early peer systems (ie, Kazaa, LimeWire, etc) have defaults that make it easy to identify unsophisticated infringers who may not even know what they're doing is potentially infringing.

These defaults enable other individuals, including the RIAA, to view and/or exchange all of the materials within the host's shared file. Because allowing others access to copyrighted material is also a violation of the copyright act, downloading isn't required for someone to be liable under the act. On top of that, because the potential damages for infringement are statutorily defined, based on the number of materials “exchanged,” a person could have only downloaded a couple of songs and yet still be liable for thousands of dollars in damages for each and every song that was in their folder because they're allegedly being offered for exchange.

The irony of targeting early peer system users is that the serious offenders are smart enough to change the default settings so as to mask their file hosting, or use more recent peer systems that shield the host files from view.

The naïve and uninformed, meanwhile, are easy prey for the RIAA.

Complete Text of Article.

First Annual Peer-to-Peer Litigation Summit

First Annual Peer-to-Peer Litigation Summit

When: November 3, 2005

Where: Northwestern University Law School, Chicago, IL

In September 2003, members of the Recording Association of America filed the
first wave of lawsuits against individual  peer-to-peer (P2P) file
sharers. Two years and 14,000 lawsuits later, both P2P file-sharing and
file-sharing litigation continue unabated, and members of the Motion Picture
Association of America (MPAA) are now suing individual Internet users as
well. It's time to step back and consider where this litigation has been,
where it's going, and whether there is a better way.

This one-day conference brings together public and private defense
attorneys, clients, investigators, advocates and academics to discuss the
latest developments in peer-to-peer litigation. How do the RIAA and MPAA go
about identifying plaintiffs? What are the most effective legal strategies
and tactics? Is it better to settle immediately, or fight it out in the
courts? How is this impacting the individuals sued? What is the role of ISPs
in this quagmire? Should Congress step in and, if so, what legislation is
needed? Are there other ways to compensate authors for their
works? Panelists will address these topics and more. Audience members will
be strongly encouraged to share their experiences as well.

Cost: $150

For more information and to register for this conference, please go to
www.signmeup.com/51363.

Sponsors: Privacy Resolutions, P.C. and Electronic Frontier Foundation

RIAA Deliberately sues 14-year old

You may recall the case of Priority Records v. Chan, a case against the mother of a 13-year old girl, who may have accessed a peer to peer file sharing account. When the mother moved to have the case dismissed on summary judgment, the RIAA withdrew its case against the mother. The court held that if the RIAA wanted to sue the child, it would have to have a guardian ad litem appointed.

Incredibly, the RIAA has now brought a lawsuit against the child -- now 14 years old -- and has moved for appointment of a guardian ad litem
(Alternate link)
.
(Alternate link #2)

News coverage:

p2pnet.net

Monday, October 03, 2005

Oregon RIAA Victim Fights Back; Sues RIAA for Electronic Trespass, Violations of Computer Fraud & Abuse, Invasion of Privacy, RICO, Fraud

ATLANTIC V. ANDERSEN

This is the case peer-to-peer file sharers have been waiting for. Tanya Andersen, a 41 year old disabled single mother living in Oregon, has countersued the RIAA for Oregon RICO violations, fraud, invasion of privacy, abuse of process, electronic trespass, violation of the Computer Fraud and Abuse Act, negligent misrepresentation, the tort of "outrage", and deceptive business practices.

Ms. Andersen's counterclaims demand a trial by jury.

Ms. Andersen made the following allegations, among others:


1. For a number of years, a group of large, multinational, multi-billion dollar record companies, including these plaintiffs, have been abusing the federal court judicial
system for the purpose of waging a public relations and public threat campaign targeting digital file sharing activities. As part of this campaign, these record companies retained MediaSentry to invade private home computers and collect personal information. Based on private information allegedly extracted from these personal home computers, the record companies have reportedly filed lawsuits against more than 13,500 anonymous “John Does.”

2. The anonymous “John Doe” lawsuits are filed for the sole purpose of information farming and specifically to harvest personal internet protocol addresses from internet service providers.

3. After an individual’s personal information is harvested, it is given to the record companies’ representatives and the anonymous “John Doe” information farming suits are then typically dismissed.

4. The record companies provide the personal information to Settlement Support Center, which engages in prohibited and deceptive debt collection activities and other illegal conduct to extract money from the people allegedly identified from the secret lawsuits. Most of the people subjected to these secret suits do not learn that they have been “sued” until demand is made for payment by the record companies’ lawyers or Settlement Support Center.....

5. Tanya Andersen is a 42-year-old single mother of an eight-year-old daughter living in Tualatin, Oregon. Ms. Andersen is disabled and has a limited income from Social Security.

6. Ms. Andersen has never downloaded or distributed music online. She has not infringed on any of plaintiffs’ alleged copyrighted interest.....

7. Ms. Andersen has, however, been the victim of the record companies’ public threat campaign. The threats started when the record companies falsely claimed that Ms. Andersen had been an “unnamed” defendant who was being sued in federal court in the District of Columbia. She was never named in that lawsuit and never received service of a summons and complaint.

8. Neither did Ms. Andersen receive any timely notice that the suit even existed. That anonymous suit was filed in mid-2004. Ms. Andersen first learned that she was being “sued” when she received a letter dated February 2, 2005, from the Los Angeles, California, law firm Mitchell Silverberg & Knupp, LLP. The LA firm falsely claimed that Ms. Andersen had downloaded music, infringed undisclosed copyrights and owed hundreds of thousands of dollars. Ms. Andersen was understandably shocked, fearful, and upset. ....

9. After receiving the February 2, 2005 letter, Ms. Andersen contacted the record companies’ “representative,” which turned out to be Settlement Support Center, LLC. This company was formed by the record companies for the sole purpose of coercing payments from people who had been identified as targets in the anonymous information farming suits. Settlement Support Center is a Washington State phone solicitation company which engages in debt collection activities across the country.

10. When Ms. Andersen contacted Settlement Support Center, she was advised that her personal home computer had been secretly entered by the record companies’ agents, MediaSentry.

11. Settlement Support Center also falsely claimed that Ms. Andersen had “been viewed” by MediaSentry downloading “gangster rap” music at 4:24 a.m. Settlement Support Center also falsely claimed that Ms. Andersen had used the login name “gotenkito@kazaa.com.” Ms. Andersen does not like “gangster rap,” does not recognize the name “gotenkito,” is not awake at 4:24 a.m. and has never downloaded music.

12. Settlement Support Center threatened that if Ms. Andersen did not immediately pay them, the record companies would bring an expensive and disruptive federal lawsuit using her actual name and they would get a judgment for hundreds of thousands of dollars.

13. Ms. Andersen explained to Settlement Support Center that she had never downloaded music, she had no interest in “gangster rap,” and that she had no idea who “gotenkito” was.

14. Ms. Andersen wrote Settlement Support Center and even asked it to inspect her computer to prove that the claims made against her were false.

15. An employee of Settlement Support Center admitted to Ms. Andersen that he believed that she had not downloaded any music. He explained, however, that Settlement Support Center and the record companies would not quit their debt collection activities because to do so would encourage other people to defend themselves against the record companies’ claims.

16. Instead of investigating, the record company plaintiffs filed suit this against Ms. Andersen. F. The Record Companies have no Proof of Infringement.

17. Despite making false representations to Ms. Andersen that they had evidence of infringement .... plaintiffs knew that they had no factual support for their claims.

18. No downloading or distribution activity was ever actually observed. None ever occurred. Regardless, the record companies actively continued their coercive and deceptive debt collection actions against her. Ms. Andersen was falsely, recklessly, shamefully, and publicly accused of illegal activities in which she was never involved.

Ms. Andersen further alleged:

20. Entering a person’s personal computer without their authorization to snoop around, steal information, or remove files is a violation of the common law prohibition against trespass to chattels.

21. The record company plaintiffs employed MediaSentry as their agent to break into Ms. Andersen’s personal computer (and those of tens of thousands of other people) to secretly spy on and steal information or remove files. MediaSentry did not have Ms. Andersen’s permission to inspect, copy, or remove private computer files. If MediaSentry accessed her private computer, it did so illegally and secretly. In fact, Ms. Andersen was unaware that the trespass occurred until well after she was anonymously sued.

22. According to the record companies, the agent, Settlement Support Center used the stolen private information allegedly removed from her home computer in their attempt to threaten and coerce Ms. Anderson into paying thousands of dollars. ....

Under the provisions of the Computer Fraud and Abuse Act (18 U.S.C. § 1030) it is illegal to break into another person’s private computer to spy, steal or remove private information, damage property, or cause other harm.

26. Ms. Andersen regularly used her personal computer to communicate with friends and family across the country and for interstate e-commerce. Ms. Andersen had password protection and security in place to protect her computer and personal files from access by others.

27. The record company plaintiffs employed MediaSentry as their agent to bypass Ms. Andersen’s computer security systems and break into her personal computer to secretly spy and steal or remove private information. MediaSentry did not have her permission to inspect, copy, or remove her private computer files. It gained access secretly and illegally.

28. According to the record companies’ agent, Settlement Support Center, used this stolen private information in their attempt to threaten and coerce Ms. Andersen into paying thousands of dollars. ....

31. According to the record companies, Ms. Andersen’s personal computer was invaded by MediaSentry after she was identified with a nine digit code (an Internet Protocol Address (“IPA”)) obtained from the anonymous information farming lawsuits. MediaSentry did not have permission to inspect Ms. Andersen’s private computer files. It gained access only by illegal acts of subterfuge.

32. The record companies’ agent has falsely represented that information obtained in this invasive and secret manner is proof of Ms. Andersen’s alleged downloading. Ms. Andersen never downloaded music but has been subjected to public derision and embarrassment associated with plaintiffs’ claims and public relations campaign.

33. The record companies have used this derogatory, harmful information to recklessly and shamefully publicly accuse Ms. Andersen of illegal activities without even taking the opportunity offered by Ms. Andersen to inspect her computer. .....

36. Despite knowing that infringing activity was not observed, the record companies used the threat of expensive and intrusive litigation as a tool to coerce Ms. Andersen to pay many thousands of dollars for an obligation she did not owe. The record companies pursued their collection activities and this lawsuit for the primary purpose of threatening Ms. Andersen (and many others) as part of its public relations campaign targeting electronic file sharing.

37. The record companies have falsely represented and pleaded that information obtained in this invasive and secret manner is proof of Ms. Andersen’s alleged downloading and distribution of copyrighted audio recordings. Ms. Andersen never downloaded music but has been subjected to public derision and embarrassment.....

40. The record companies knowingly represented materially false information to Ms. Andersen in an attempt to extort money from her.

41. For example, between February and March 2005, the record companies, through their collection agent Settlement Support Center, falsely claimed that they had proof that Ms. Andersen’s IPA had been “viewed” downloading and distributing over 1,000 audio files for which it sought to collect hundreds of thousands of dollars. This statement was materially false. Ms. Andersen never downloaded or distributed any audio files nor did the record companies or any of their agents ever observe any such activity associated with her personal home computer.....

49. Despite having never observed any downloading or distribution associated with Ms. Andersen’s personal home computer and despite refusing Ms. Andersen’s offer to allow an inspection of her own computer, the record companies wrongfully continued their improper debt collection activities against her.....

50. The record companies pursued debt collection activities for the inappropriate purpose of illegally threatening Ms. Andersen and many thousands of others. This tortious abuse was motivated by and was a central part of a public relations campaign targeting electronic file sharing.

51. An employee of Settlement Support Center admitted to Ms. Andersen that he believed that she had not downloaded any music. He explained that Settlement Support Center and the record companies would not quit the debt collection activity against her because to do so would encourage other people to defend themselves against the record companies’ claims.

52. The record companies were aware of Ms. Andersen’s disabilities and her serious health issues. Settlement Support Center knew that its conduct would cause extreme distress in Ms. Andersen. As a result of defendant’s conduct, Ms. Andersen suffered severe physical and emotional distress and health problems.

53. The record companies’ conduct resulted in damages, including harm to Ms. Andersen’s health and property in an amount to be specifically proven at trial......

55. Oregon’s Unlawful Trade Practices Act prohibits those in trade or commerce from engaging in unfair or deceptive practices in the course of business with consumers. ORS 646.605 et seq.

56. The record companies’ agent, Settlement Support Center, is a company doing business in Washington which was established to engage in debt collection activities in manystates, including Washington and Oregon.

57. Settlement Support Center acting as the record companies’ agent made false and deceptive statements to Ms. Andersen in an attempt to mislead, threaten, and coerce her into paying thousands of dollars.

58. Settlement Support Center acting as the record companies’ agent has made similar false and deceptive statements to many other residents of Washington and Oregon, and across the country. The public interest has been and continues to be directly impacted by plaintiffs’ deceptive practices.

59. The record companies’ conduct resulted in damages and harm to Ms. Andersen and her property in an amount to be specifically proven at trial. ....

61. The Oregon Racketeer Influenced and Corrupt Organization Act prohibits companies from engaging in organized racketeering or criminal activities. ORS 166.715 et seq.

62. As fully set forth above, the record companies hired MediaSentry to break into private computers to spy, view files, remove information, and copy images. The record companies received and transmitted the information and images to Settlement Support Center. As the record companies’ agent, Settlement Support Center then falsely claimed that the stolen information and images showed Ms. Andersen’s downloading and distributing over 1,000 audio files. The record companies falsely claimed that Ms. Anderson owed hundreds of thousands of dollars in an attempt to coerce and extort payment from her.

63. The record companies directed its agents to unlawfully break into private computers and engage in extreme acts of unlawful coercion, extortion, fraud, and other criminal conduct.

64. The record companies and their agents stood to financially benefit from these deceptive and unlawful acts. Proceeds from these activities are used to fund the operation of the record companies’ continued public threat campaigns.

65. These unlawful activities were not isolated. The record companies have repeated these unlawful and deceptive actions with many other victims throughout the United States.

Answer and counterclaim.
(Alternate link)

Ms. Andersen is represented by:
Lory R. Lybeck
Lybeck Murphy, LLP
500 Island Corporate Center
7525 SE 24 Street
Mercer Island, WA 98040-2336
(206) 230-4255
lrl@lybeckmurphy.com

Technical Difficulties

It appears that, due to the popularity of the answer and counterclaims in Atlantic v. Andersen, the data transfer capacity of the web site I use to host the litigation documents has been exceeded.

I will attempt to get some alternative links.

Sorry for the inconvenience.

-R.B.