Feeds:
Posts
Comments

Archive for the ‘DMCA Scare Letters’ Category

There is a new problem that I am encountering where software developers are writing code in order to catch downloaders – not in the download of the software, but in the illegal USE of that software.  These software developers – with knowledge of the accused IP address of the so-called “pirates” are hiring attorneys to send out DMCA settlement demand letters, often requesting a hefty settlement for the piracy or use of that software without authorization.

Unlike the bittorrent cases that we have seen over the past six years — where an internet user would be caught downloading movies, music, or “scenes” using bittorrent or Popcorntime software (where the connection to other bittorrent users in a “bittorrent swarm” would reveal the IP address of the downloaders) — software developers are increasingly building in to their new software the capability to “phone home” to the developer. When the software “phones home,” it reports certain information to the software developer, including the IP address of users who are actively using the pirated software at that moment.

et

When a downloader accesses a “pirate” site (e.g., The Pirate Bay), and downloads a piece of software with a “crack,” that crack alters the software code, to allow it to be used in a “registered state” (e.g., cracked software will allow a user to enter a serial code to register the software whereas in an “uncracked” state, that serial code would be rejected.  Thus, the user sees a message such as “your serial code has been accepted.  Thank you for registering your software.) This “registered” state allows the downloader to actively use the software; however, it does not stop the software from phoning home.

Very often included in the cracked software package will be what is known as “a .NFO file,” (which is a text file, and “NFO” sounds like “info”) where the hacker, a.k.a. the “cracker,” will instruct the user to block the software from connecting to outside networks (often advising that the downloader use a software firewall, such as Comodo Firewall). Conventionally, the purpose of this instruction to the downloader is to avoid the common scenario where the software developer automatically updates the software to work around and invalidate any cracks which it discovers in the wild. As a result, the downloader would find that his once-registered software is no longer registered.

Some software developers who have become savvy to this trend will create a pop-up screen which alerts the downloader that his IP address has been flagged and gives him an opportunity to purchase the software at a discounted rate.  By using this method, the software developer attempts to turn a pirate into a paying customer in a manner that is both ethically and morally sound.  However, and pardon my jaded view of the matter, but people get greedy, and software developers get frustrated with the piracy of their software, and thus they often turn from good business judgment to using the law as a prickly weapon to sting those caught downloading their software.

And with this greed, here is the trend for which I wrote this article.  I am now seeing a trend that the software developers are contacting attorneys and asking those attorneys to use the Digital Millennium Copyright Act (“DMCA”) rules to force the ISPs to send settlement demand letters to the internet users who are suspected of illegally using that software without a license.  However, instead of trying to turn that downloader into a paying customer, the software developer decides instead to gouge the internet downloaders into paying a bloated fee for a software license. In this scenario, this internet user receives a letter demanding that the user purchase the pirated software for an amazingly high amount of money, for example, $5,000-$20,000. If that internet user does not purchase the software as the letter demands, the threat of a copyright infringement lawsuit looms.

Now the first company you might think of when reading this article is the Siemens Product Lifecycle Management Software Inc. company, who is currently suing John Doe Defendants for the download and unlicensed use of the Siemens NX software.  However, in defense of their lawyers, the Siemens attorneys are simply trying to stop engineers and companies who are using their software in a commercial manner from profiting from the use of their software without a license.  They are not gouging (so far as I know), and my personal experience with their attorneys have been (so far) positive.

Thus, the focus of this article is on other software developers and copyright holders who have begun to mimic the Siemens model of suing (or here, sending DMCA settlement letters through the ISPs and threatening to sue) users, and attempting to force them to purchase an enterprise-level, multi-thousand-dollar software license or face a copyright infringement lawsuit in a Federal court, even if they have absolutely no legitimate use or benefit from “owning” that software.

To the internet user who receives such a letter requesting a settlement:  It is important to know that following the instructions of the software developer and purchasing a license (even an expensive one (e.g., a $5,000 license where the software itself costs only $150) does not protect you from being sued. Rather, your compliance may simply operate as an admission of guilt. Instead of simply following the instructions of the settlement demand letter, here is why it is advisable to STOP, THINK, RESEARCH THE TOPIC, and hire an attorney (me, or any other attorney competent in both copyright litigation and software licensing) to resolve the claim or claims against you.

First, the attorney that you hire will provide a legal “buffer” between you and the copyright holder’s attorney. Your attorney will be able to speak on your behalf without admitting guilt, whereas an accused defendant speaking alone to the copyright holder’s attorney might accidentally claim that they were only using the software to test the software (an act which according to the law would be copyright infringement, and would subject the internet user to statutory damages of $150,000 or more if there are multiple instances of infringement). Thus, an attorney can stop the copyright holder’s attorney from contacting you directly by putting them “on notice” (a legal term) that the attorney is representing you and, thus, all communications must go through the attorney.

Additionally, the attorney that you hire (knowledgeable in both copyright law and in software licensing) would be able to negotiate a settlement to allow you to purchase a license at a steep discount from the “gouging” amount that the copyright holder’s attorney was initially asking for in the settlement demand letter. Moreover, your attorney could obtain a release of liability, releasing you from all liability surrounding the unlicensed use and the unlicensed copying of the pirated software – something you would not be in a position to negotiate if you were handling the matter.

Similarly, [or in the alternative,] your attorney might negotiate a software license to allow you to pay for your “experimental” use of their software.

If you are a student, then it may be a good strategy to have your attorney negotiate in the settlement agreement to allow you to purchase that product at a student discount at your local college as your “settlement payment.”

 The above are all options that an experienced copyright/software development attorney (me, or anyone else) would be able and knowledgeable to negotiate on your behalf.  Your attorney would be able to oversee the payment of the licensing fee or the purchase of the actual software [for your own future legitimate use] and to obtain for you a written release of liability from the software copyright holder’s attorney, which means that following the conclusion of the settlement or the signing of the software license, you would never be sued for copyright infringement or any sort of piracy in a Federal court.

These are the benefits of hiring an attorney for your settlement demand letter issue rather than simply going out and paying whatever fine is requested of you.  Remember: Following the copyright holders instructions to pay them a fee or to purchase a piece of software after-the-fact (after the unlicensed activity or infringement occurred) will not provide you any protection.  Paying a settlement fee alone will not provide you with a settlement agreement or a release of liability.  Without a release of liability, you could still be sued in a federal court for copyright infringement, piracy, or any other relevant law relating to the unlicensed use, piracy, and possibly the cracking of software.


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.

Read Full Post »

Every pirate knows that the only way to block the copyright trolls from identifying their true IP addresses (and thus sending out DMCA copyright infringement notices, as outfits such as CEG-TEK have been known to do) is through the use of a Virtual Private Network (VPN) [, and not just any VPN, but a paid VPN provider which does not track their subscribers’ activities*].

In recent weeks, I have heard from various copyright trolls that bittorrent users are “winning the piracy war,” in that their activities have thwarted the copyright holders from learning who they are. Armed with what is becoming common knowledge of free software which can be configured to stream pirated content (e.g., Kodi, formerly XBMC), internet users who wish to “unplug” from the cable companies are able to do so in a way in which it becomes difficult if not next to impossible to be caught viewing streamed content**. Not only this, but many have even purchased Amazon Fire sticks which can be jailbroken to allow the Kodi software to be installed on it, and they are watching pirated videos from their HDTV without even needing a computer.***

But what is the effect of “winning the war” on those who are left behind and don’t realize that they need to use a VPN if they are going to bittorrent their favorite movie, software, or video game? This is the point of the article.

The unintended consequence of bittorrent users learning to use a VPN, or migrating away from bittorrent and towards free streaming services is that copyright holders [who for three years now have enjoyed easy settlement money] are realizing that there simply are not enough people to send DMCA / copyright infringement notices to in order to line their pockets with gold and dirty cash. As a result, it is my experience that they are becoming “less nice” and they are trying to make more money from fewer downloaders. Case-in-point: Girls Gone Wild DMCA notices used to ask for one $300 settlement for a whole page of 60+ videos, but now they are asking for tens of thousands of dollars for that same “click” of a bittorrent file.

I am also noticing that CEG-TEK is acting differently, perhaps in response to what has been described to me as a steep decline in numbers of “pirates” to whom they can send DMCA notices. In the past few weeks, it has been my experience that Copyright Enforcement Group (CEG-TEK) is now sending multiple notices out to the ISPs for the same download. In one case regarding their Girls Gone Wild client that I mentioned above, CEG-TEK sent literally over 1,000 notices to one ISP for the alleged download of one bittorrent file.

At first I thought this was a glitch in their computer system, but then it occurred to me that maybe CEG-TEK somehow benefits from keeping the numbers of DMCA notices sent to the ISPs artificially high. Is there any benefit to them to be doing this? I have been racking my brain on this topic and I still cannot come up with a reason.

Honestly, here is my concern. When an animal is backed against the wall, what does it do? It attacks. If indeed we are winning the bittorrent piracy war, I am concerned that CEG-TEK will begin taking on new clients who thrive on stacking their bittorrent files with hundreds of adult films. Those who are sophisticated will understand exactly who I am speaking about.  

They will then trap the unsuspecting bittorrent user who “clicks on a bittorrent file” in their spider web, and that user will receive hundreds of DMCA notices which will scare the b’jeebies out of him.  Then they will give in to the urging of their less-than-ethical client, and they will agree to start charging more than the $300 per title that they currently do (remember, at one point, CEG-TEK used to charge $200 per title, and then at what I understood to be the urging of their client, they raised the settlement amount to $300 per title).  So they are pliable, as we have seen in the past.

In the end, just as we saw hints of this with the recent Girls Gone Wild debacle, CEG-TEK will morph from a $300 per title copyright enforcement outfit (lamb) into a $3,500 per title shakedown outfit (wolf) where they base their settlement amounts on the client’s ability to pay rather than what they believe is a “fair” amount to compensate the copyright holders.

Last, but not least, I learned that CEG-TEK threatened an accused downloader with criminal prosecution this week. For those of you who know me, I have spent almost every day since 2010 working on copyright infringement cases. NEVER until last week have I seen a copyright holder threaten an accused internet user with criminal charges for a copyright infringement matter.

In sum, the times they are a changin’. If we are indeed winning the war, what will CEG-TEK turn into in order to survive?  And, what will their copyright holders (who for the most part have been docile and lazy these past few years) do when their easy income stream dries up?


CONTENT CUT FROM THE ARTICLE:

*[UNRELATED PERSONAL NOTE: I am a fan of such VPN providers not because they make piracy more difficult to detect, but because I believe strongly in a person’s right to be anonymous. The amount of snooping that happens with internet trackers, cookies, and newer methods literally sickens me, and I do not believe that advertising companies and ISPs should have so much knowledge about their customers. For this reason, I have nothing wrong with sharing for privacy purposes that examples of VPNs that you can rely on can be easily found by searching “torrentfreak secure vpn” on Google, or just by going to TorrentFreak’s website where they review VPN providers which take your anonymity seriously. Just be sure to have some mechanism in place that if the VPN connection goes down, even for a second, that your real IP isn’t exposed to whatever site you happen to be visiting, or to whatever server you happen to be connected to. This is called a “DNS leak,” and there are easy ways to configure your system to lock down the connection if or when the VPN goes down, even for a second.]

** NOTE: There is a popular software called PopcornTime which I am sad to share has given our firm many clients who have been caught downloading mainstream movies (e.g., The Dallas Buyers Club cases, Voltage Pictures’ Fathers & Daughters Nevada, LLC cases, and most recently, Millennium Film’s London Has Fallen (“LHF”) movie cases, etc.). Most recently, I have been seeing new CEG-TEK notices for Millennium Film’s “Criminal” movie which the copyright holders have already started suing in “Criminal Productions, Inc. v. John Doe” copyright infringement lawsuits . The reason for so many getting caught is that PopcornTime appears to be a software which allows you to stream video content, but it uses bittorrent as its back-end to download the movies.

*** NOTE: The Amazon Fire sticks which have Kodi installed in my opinion can still get you caught for copyright infringement. The reason for this is that they connect directly to the internet exposing your real IP address. Most people don’t realize that they need to also configure their ROUTER to connect to the internet through their paid VPN provider.


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.

Read Full Post »

dmca gone wild

I have been sitting on this article for a few days because I was not sure what to make of it.

I don’t know if what I am noticing is based on greed on behalf of the “Girls Gone Wild” copyright holder (a.k.a., GGW Brands LLC) based on their corporate shakeup and recent bankruptcy, or whether CEG-TEK’s computer system has been going haywire sending sometimes hundreds of DMCA copyright infringement notifications for one “click” of a bittorrent file, or if there is a shift coming where CEG-TEK will be using the DMCA notices in a new way to extort larger and larger settlements from accused downloaders.

BACKGROUND [SKIP IF YOU KNOW HOW BITTORRENT WORKS]:
CEG-TEK has always tried to be a modestly clean organization.  While an internet user downloads a video using bittorrent software, CEG-TEK’s servers are “dipping in and out” of the various bittorrent swarms which share their 100+ clients’ [usually adult] videos, and while CEG-TEK is “in the room” (so to speak, meaning, while CEG-TEK’s servers are connected to the bittorrent swarm [in which the internet users’ bittorrent software downloads file fragments from multiple individuals also in that same bittorrent swarm, and in which the bittorrent software shares (“seeds”) file fragments it has acquired to other bittorrent users in the swarm who are lacking that particular file fragment in order to obtain the entire shared file(s)), CEG-TEK writes down the IP addresses of each of the file sharers, they identify which ISP that IP address belongs to, and their computer sends a DMCA notice to that ISP.  That DMCA “scare letter” notice is then forwarded to the account holder who was assigned that IP address at that particular date and time.

So with the Girls Gone Wild copyright holder, in the olden days (meaning up until two weeks ago), an internet user would click on a bittorrent file which contained something like 20-30 GGW videos, but when we logged into the CopyrightSettlements.com website to view the claims against my client, there would only be a few claims of copyright infringement.  Why?  Because GGW was having CEG-TEK ask for $300 per copyrighted DVD (which it itself contained many “files” or “scenes”).  Point being, one click, one copyrighted DVD pirated, one $300 settlement.

This is no longer the case.  Now when an internet user clicks a download link on a bittorrent website (sample screenshot of a GGW bittorrent link below — this one containing 95 video files), the same 20-30 video files are downloaded, but instead of ONE (1) DMCA notice being sent to the internet subscriber’s ISP, these past few weeks, 20-30 DMCA notices are being sent.

TPB_GGW

To make the effect of downloading Girls Gone Wild videos more egregious, instead of asking for $300 for each GGW DVD pirated, the copyrightsettlements.com website now lists 20-30 “cases,” asking for $300 for each file downloaded, rather than $300 for each DVD.  Thus, in the 20-30 file example, now an accused internet user will see a settlement request of $6,000-$9,000 for one click of a bittorrent website (or in the example shown above with 95 video files, CEG-TEK would now be asking for a $28,500 settlement, when before it would have been just a few hundred dollars).

Now, let’s take the scenario further, because I’ve seen settlement amounts as high as $78,000 in the past few days.  How?

That same internet user who clicked on this link above containing 95 titles leaves his bittorrent software running in the background.  He does not realize that after the downloads are complete, his software is set to “seed” (upload) the files to other bittorrent users who have not yet acquired all 64.02 Gigabytes of data (as if someone actually has that amount of free space on their hard drive to download all of those videos, and as if each and every video was actually downloaded — both topics outside the scope of this article).

It takes roughly 4-5 days for a Charter or a CenturyLink subscriber to receive his DMCA notice, so by the time he learns that he has done something wrong by that “one click,” his ISP has changed his IP address 5 times (IP addresses are leased to subscribers for 24 hours, although this differs from ISP to ISP), that means that CEG-TEK “thinks” he has 475 instances of infringement (MATH: 95 videos * 5 days seeded = 475 instances of infringement).  Thus, when those 29 downloaders and 5 uploaders shown in the image above (listed as “29 leechers” and “5 seeders”) get their DMCA copyright infringement notice for this particular torrent five (5) days later, each one of them will see a settlement amount of $142,500.  Obscene.

Now obviously a lawyer (myself or anyone else) can negotiate the amount of the settlement, or, based on the copyright holder’s tendency to sue or knowing the limitations of CEG-TEK’s abilities to know who you are [taking into consideration the ISP and the known information such as geolocation data as to where you live, etc.], I may just as easily suggest that you ignore the claims against you, but quite frankly, if CEG-TEK is really expecting to get a $142K settlement (or even a $10K settlement), well, this suggests to me that maybe they are getting a bit greedy.

In sum, here is what I know:

1) Girls Gone Wild and CEG-TEK (as their agents) are now asking for $300 settlements for each and every video file downloaded.

2) CEG-TEK’s computer systems are going haywire, and ISPs are receiving HUNDREDS of DMCA violation notifications for files contained within one bittorrent file.

3) CEG-TEK’s computer systems lock out users who have more than ten (10) claims against them with a note to call their 800 number to discuss the claims with them.  This means that your claims WILL LIKELY BE LOCKED when you try to log in and you will get their “Please contact Ira Siegel” notice.

4) If you made the mistake and called them, you would be faced with an obscenely high settlement amount to negotiate down from.

My interpretation:

Here is my interpretation of what is going on.  I see two possible causes for what we are seeing.

The founder of Girls Gone Wild appears not to be an upright citizen.  He has been reportedly convicted of tax evasion, bribery, false imprisonment, assault causing great bodily injury, dissuading a witness, record-keeping violations, and he has even reportedly pleaded no contest to child abuse and prostitution.  It does not jolt me to add copyright trolling to his list of indiscretions, and thus if this new development is coming from CEG-TEK’s “Girls Gone Wild” client rather than from CEG-TEK itself (management), I am not surprised by what I am seeing.

From 2007 – 2013, GGW advertised up the wazoo on late night infomercials, and they used to sell their DVDs, but there was a point where something happened to their business — the internet happened, and people stopped purchasing their videos.

In 2013, I remember hearing about a lot of drama and “shake-ups” on the corporate level, where Girls Gone Wild was talking about filing for bankruptcy, and where they were no longer putting their focus on the sale of DVDs.  Rather, moving forward, they would be focusing on “intellectual property monetization,” which is another way of saying that they hired a number of lawyers and copyright enforcement entities (e.g., CEG-TEK, or Copyright Enforcement Group) to elicit settlements from those internet users who they blame for the collapse of their company.

In sum, either Girls Gone Wild is tired of collecting a few bucks here and there, or CEG-TEK is no longer happy with the $300 settlement and they are trying to increase the settlement amounts to lawsuit levels without having to file a lawsuit.  Either way, be aware that things are changing, and I will let you know as I see the shift reveal itself in a more pronounced way.


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.

Read Full Post »

We already know that it is the business model of CEG-TEK and other copyright monetization companies is to develop relationships with the internet service providers (“ISPs”), and to have them forward copyright infringement / DMCA notices to their subscribers.

I have mentioned this already with regard to the relationships CEG-TEK has with Charter, CenturyLink, and Suddenlink, and as we know, COX Communications, Inc. signed on with CEG-TEK in December of 2015, and has been sending CEG-TEK’s DMCA violation notices to their users.  What we did not notice until now is that Cox Communications has become CEG-TEK’s “golden goose.”

WHY COX IS CEG-TEK’s “GOLDEN GOOSE”:

Why Cox? Because Cox provides its users the same IP address each day. This “one subscriber, one static IP address” trend provides copyright holders and government officials an “ID” of sorts which allows them to identify a particular IP address, watch the activities of that IP address over time as it interacts with different websites (e.g., to see what links that internet user clicks on, to learn where they shop online, what accounts they use, what items they purchase, and what bittorrent downloads they participate in).  Then, when they have developed enough of a profile on that user to convict, they then trace that IP address back to a certain Cox Communications account for prosecution, or in our case, extortion.

For CEG-TEK, they are focusing their efforts on Cox because by doing so, they do not need to obtain from the ISP a past list of IP addresses assigned to that user, and it is very easy for CEG-TEK to go back in time and check their own logs of the past bittorrent swarms to see whether that particular subscriber / IP address participated in any other downloads of their other clients. Some have suggested to me that CEG-TEK can do a search to see what other bittorrent downloads the accused Cox subscriber has participated in. In short, Cox’s “one subscriber, one static IP address” is nothing short of a violation of their subscriber’s privacy, and it is only a matter of time before someone’s IP address gets “followed” and someone gets hurt because Cox is not obscuring the identity of their subscribers.

BRIGHT HOUSE NETWORK IS NOW WORKING WITH CEG-TEK:

Other than Cox, I have recently learned that Bright House Networks (brighthouse.com) is now working with CEG-TEK. I do not yet know in what capacity they are working with CEG-TEK, or in what kind of relationship, but it appears as if they are a new ISP “recruit” in CEG-TEK’s “war” against piracy.

NEW CHARTER COMMUNICATIONS POLICIES AS TO HOW THEY FORWARD DMCA NOTIFICATIONS (THE GOOD AND THE BAD):

For the thousands of you who are Charter subscribers, Charter has recently changed the way they forward the DMCA notices, and this can only be good for subscribers. Instead of forwarding the notices in an e-mail, they are now asking subscribers to “log in” to their website, where only then can then view and copy for themselves a copy of CEG-TEK’s letters.

This is both very good, and bad. On the good side, any “hoops” an ISP makes a subscriber jump through to see the claim(s) against him might annoy the subscriber, but it no doubt infuriates the copyright holders and “monetization” companies (like CEG-TEK) that rely on them seeing their DMCA notices to provide their copyright holder clients their dirty money (I could have said “ill-gotten gains,” but emotionally, calling it “dirty money” seemed to fit better).

THE PROBLEM OF “LOST” DMCA NOTICES:

However, BUYER BEWARE! I have received many calls about people who have physically LOST their DMCA notice because they did not copy it down when they viewed it. And when they called me about it panicked, because I couldn’t see the claims because they did not know who was claiming copyright infringement against them, I couldn’t tell them whether the copyright holder was a “copyright troll” or not, or whether they are suing downloaders in the federal courts. So please, as soon as you access the DMCA violation notices sent to you, either download a copy of it for yourself, or copy-and-paste it into a text file.

GOOGLE FIBER IS A DISORGANIZED ISP WHICH HAS ALSO LOST DMCA NOTICES:

Google Fiber subscribers also — Google Fiber seems to not be organized as to keeping track of the DMCA notices that they are forwarding to their subscribers. So when an internet user inadvertently deletes that notice, it is gone forever. Neither I, nor anyone else can help you fight or settle (or even advise you as to your options) if you accidentally deleted the notice. I suspect that if you are reading this article, it may already be too late.

CANADA — NEW CANADIAN ISP RECRUITS:

Okay, last piece of news and then I need to get back to work. As we know, CEG-TEK has been sending letters for months to Canadians and forcing the ISPs to send these letters to their subscribers under what is known as “notice and notice.” I have written about the problem and the solutions here in my “CEG-TEK: What are your financial risks and considerations of ignoring, settling, or being sued for copyright infringement if you live in Canada or Australia?” article. The news is that just as CEG-TEK is growing their business by signing on new ISPs in the US, this is also true in Canada.

The new Canadian ISPs now working with CEG-TEK appear to be Videotron (a.k.a., Vidéotron), Bell Aliant (www.bellaliant.ca), and Eastlink (www.eastlink.ca) — this will also affect their FibreOP users under the ISP names NorthernTel, DMTS, Telebec (Télébec), and Cablevision. If anyone receives notices from these internet providers, I would like to see them, as I hear that CEG-TEK is not following the notice rules.

As for the older ISP names — Bell Canada, Rogers Cable, Shaw Communications (sjrb.ca), ACN Canada, Electronic Box Inc., TELUS Communications, Start Communications, and TekSavvy, yes, these are still in play. The only one of these that has my respect thus far is TekSavvy which has tried to protect their users by fighting back, but even so, they are still sending CEG-TEK’s DMCA violation / copyright infringement letters, so my respect is limited.


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.

Read Full Post »

Obviously I am not privy to the contracts signed between CEG-TEK and the internet service providers (“ISPs”).

There are three possible relationships between a copyright enforcement company and the ISP through which they send DMCA letters informing subscribers that unless they settle the claims against them for downloads that allegedly occurred, they might be implicated in a copyright infringement lawsuit.

1) A RELATIONSHIP OF FORCE AND THREATS AGAINST THE ISP (where CEG-TEK threatens, and the ISP complies),

2) A RELATIONSHIP OF PROFIT FOR BOTH SIDES (where CEG-TEK pays, and the ISP cooperates), and

3) A RELATIONSHIP OF PURE MOTIVE (both CEG-TEK and the ISP hold hands and cooperate, to “fight piracy”).

SCENARIO 1) “A RELATIONSHIP OF FORCE AND THREATS AGAINST THE ISP” (where CEG-TEK threatens, and the ISP complies)

In the first scenario, a company or set of attorneys representing the copyright holders contacts the ISP and informs them that they might be in violation and subject to various lawsuits, fines, and penalties for not complying with the U.S. Digital Millennium Copyright Act (“DMCA”), and other statutes (in Canada, the ISPs are literally required to pass on claims to their customers, and this is referred to as “notice and notice”). If the ISPs do not comply, they could be sued for millions of dollars for encouraging piracy on their networks (I am speaking loosely in the vernacular).

ISPs across the US would be included in this first scenario, which explains how many of the bigger ones such as Comcast [who I understood were originally NOT working with CEG-TEK, because doing so would violate how they are supposed to act by being part of the “Six Strikes” system] started sending out abridged CEG-TEK infringement notices a few months ago, even to first time offenders.  Another such example of ISPs who “take steps” to stop infringement is Charter, which has been known to temporarily suspend their users who are accused of copyright infringement, but only with a pop-up notice that they need to click on to acknowledge the claim of copyright infringement against them before their internet service is resumed, unhindered.

NOTE: Comcast also has a strong profit motive as demonstrated in Scenario 2 (below), as does Charter, who has been known to be working with CEG-TEK since the beginning of their operation.  We believe the relationship between Charter and CEG-TEK is one of “for mutual profit” (Scenario 2) because CEG-TEK has obtained information about accused downloaders that they could only obtain with the help of the ISP.  Also, I understand that over the years, there have been periods of “tension,” (as I called them) where Charter has held back the sending of the CEG-TEK DMCA infringement notices for sometimes weeks at a time, only to send them all at once (my joke at the time was, “I guess they were waiting for their payment.”)  All jokes aside, the point here is to note both the Comcast example and the Charter example to show the actions an ISP will take to make it look as if they are “taking steps” to fight piracy.

In each of these scenarios, the ISP does the absolute minimum to comply with the claims against their customers, but what you don’t see is the “wink and a nod” from the ISP that they are likely not going to shut your account down or lose you as a customer over this (in other words, your activity violates the ISP’s terms of service “TOS” or “PUA”, but I have not been hearing of anyone’s account being shut down).

UNRELATED, BUT STILL VERY IMPORTANT: I have even heard that ISP customer service representatives actively tell their subscribers [in ignorance of the law] to just delete the infringing content and to ignore the notices.

FYI, look up “spoliation” of evidence, where the victories of the copyright holders in the US against downloaders happen where the copyright holder can prove that the accused defendant wiped his hard drive or deleted the infringing content after being notified by the copyright holder that there was a claim of copyright infringement against the subscriber. Thus, take what the ISP customer service representative says with a grain of salt because even though they might not care that the download happened on their network, there is still the law and the claims against you, and your ISP’s customer service rep is in no position to be giving you legal advice. Better to deal with or resolve the CEG-TEK claim against you first (if you were going to settle) before wiping the hard drive in fear of having other claims of copyright infringement or lawsuits filed against you (e.g., by other copyright holders such as Malibu Media, LLC, etc.) in the near future.

NOTE: Your relationship with your ISP has ABSOLUTELY NOTHING TO DO with your relationship with the copyright holder (or CEG-TEK) or the claims against you, since the copyright holder(s) still have one or more claims of copyright infringement against you.

SCENARIO 2) “A RELATIONSHIP OF PROFIT FOR BOTH SIDES” (where CEG-TEK pays, and the ISP cooperates)

In this scenario, the understanding is that CEG-TEK is actively paying the ISP for providing their DMCA infringement notices to their subscribers. While I did not initially believe this was happening in Canada (although I did have my suspicions), as of this morning, I now believe that Shaw Communications Inc. (a.k.a. Shaw Cablesystems G.P., or “sjrb.ca”) is working with CEG-TEK in a “for profit” relationship. I obviously cannot prove this, but from what I understand is about to happen with their subscribers [who will shortly be receiving multiple letters of infringement sent to them at the same time], this type of “delay, then dump a bunch of infringement claims” experience usually happens in a “for profit” relationship when the ISP is being compensated for the time they spend complying with the copyright infringement requests, and the payment is not immediately made.

Two examples demonstrating the “for profit” motive of various ISPs in the U.S. with facts (in these two cases, the “for profit” motive was forced upon CEG-TEK to their frustration) can be seen in the past behaviors of both Comcast and AT&T. A few years back, to handle the increasing number of subpoena requests (at the time, as a result of John Steele / Prenda Law Inc. lawsuits and the increasing number of bittorrent lawsuits being filed across the U.S.), Comcast opened up a “subpoena compliance” department in Morristown, NJ and staffed [at the time] twelve new hires just to handle the new subpoena demands from the lawsuits. In the lawsuit filings, when the copyright holders and their attorneys learned that Comcast was trying to profit off of the bittorrent lawsuits, they complained to the judges that Comcast was stalling on the subpoenas (Comcast was, at the time, under a duty to comply with the many subpoenas that were being requested of them).  It came out that Comcast was asking for something like $25-$50 per IP address lookup, when they were supposed to be complying with the subpoena for free.  Comcast prevailed in getting their IP address lookup fees, which I understand they continue to charge, even though other ISPs still do this for free.

Similarly, for those who know anything about Ira Siegel — the name that shows up on the bottom of every single CEG-TEK DMCA notice — there was a point where Ira absolutely refused to work with AT&T because AT&T’s subpoena department would charge $200 per subpoena request or IP address lookup, something at the time I heard that he found infuriating. Thus, you’ll notice that even today, you’ll never find a recipient of a CEG-TEK violation notice being a subscriber to AT&T, but as you can see, there *is* a profit motive of the ISPs to benefit financially from the growing influx of copyright infringement claims against their subscribers.

NOTE: I understand that the relationship between Charter, Centurylink, Suddenlink, Cox, sometimes Comcast, [and now most recently in Canada, Shaw Communications] fall under this scenario. The reason I am of this understanding is because of the advanced information CEG-TEK is able to identify about that subscriber, sometimes including the subscriber’s name (I have my own understanding as to how they get this from the geolocation), the geolocation itself of where the downloads occurred, along with other “past downloads” that allegedly happened weeks or months in the past at that same location, or by that same subscriber (based on a list of old “IP addresses” provided to CEG-TEK so they they can correlate that list against their own bittorrent records).

SCENARIO 3) “A RELATIONSHIP OF PURE MOTIVE” (both CEG-TEK and the ISP hold hands and cooperate, to “fight piracy”)

This is the “kum baya” view of piracy, where CEG-TEK approaches the ISP and tells them that they want to fight piracy. They show statistics of how when other ISPs “joined forces” with them and started sending out the DMCA violation settlement letters, piracy dropped significantly on that ISP’s network.

The ISP then sees this information and also agrees to “sign on” with CEG-TEK to help them forward their settlement demand letters to their subscribers with the hopes of diminishing the amount of “piracy” of copyrighted content that occurs on their networks.

NOTE: In this last scenario, you won’t find a profit motive by the ISP, and this is where I believe they get colleges and universities to sign on with them to fight piracy on their networks.

MY PERSONAL OPINION AND BIAS: Whatever the relationship or the scenario between CEG-TEK and the ISP, in the end, the subscriber is the one who suffers because it is THEY who receive the “settle or else my client will sue you as a John Doe Defendant in a U.S. federal court lawsuit for copyright infringement” letter.  Call it “speculative invoicing,” call it “Intellectual Property Monetization,” call it “fighting piracy,” when it is the individual downloader the copyright holder goes after, it is still WRONG.

To CEG-TEK’s merit, I have personally been in conversations with CEG-TEK where they were excited that piracy was actually going down on a particular ISP’s network — so apparently they do believe in what they do — but then again, whatever I feel about piracy and how the copyright laws should be changed to match today’s internet generation, in the end, it is the college students, their parents and landlords, the young graduates who are trying to find jobs, and those who are lured in by the adult content which is so addicting, widely available, and prevalent on the internet who fall prey to the tactics of the copyright holders.  For this reason, I still believe that the copyright holders should focus their efforts on pursuing those SELLING FOR PROFIT, DISPLAYING PUBLICLY WITHOUT A LICENSE, POSTING OR INITIALLY SHARING copyrighted content, but leaving alone those internet users who have no profit motive, who click on a link to view the copyrighted content.  

Back to my policy letter, I believe that it is the job of the copyright holders to police their own copyrighted materials, and not to attack, sue, extort, threaten, or pressure those who view or download content already aired on TV or in a public forum and posted on the internet.  The internet today has become like the TV and the Betamax of yesteryear.  Media becomes available, and people watch that media, whether the source is legitimate or not (think, Youtube).  TV shows are recorded, and are posted on many websites, some of them are licensed to share that content (e.g., Netflix, Hulu, ABC.com, etc.), some unlawfully do so without a license.  However, it is not the job of the internet user to inquire as to whether a source for a video is legitimate, especially when watching a show that was publicly aired just a few days beforehand.

The last thing that I want to do is to think twice when clicking on a YouTube video.  Taken to extremes, this is where the copyright holder’s activities go.


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.

Read Full Post »

2/8 UPDATE: This post was written as a “rant” against volume-based “settlement factory” attorneys because of the damage they cause to other accused defendants (by feeding them false information, causing increased settlement prices, etc.).  This afternoon, Ernesto from Torrentfreak wrote an article entitled, “BEWARE: PIRACY DEFENSE LAWYERS CAN BE “TROLLS” TOO.”  Because my article (below) was a “stream of thought” article (and because I am still emotional about the problem), as chock full of information this posting might be, his article better describes the issue.  -Rob

I started writing this article because there is too much conflicting information floating around the web (likely from attorneys who are trying to use fear tactics to scare you into settling with their firm), and my point was that there are credible websites, such as “Fight Copyright Trolls,” “Die Troll Die,” and a few others who have been helping individuals understand that IGNORING A COPYRIGHT INFRINGEMENT CLAIM AGAINST YOU CAN OFTEN BE A VIABLE OPTION TO RESOLVE THE PROBLEM (WITHOUT SPENDING $$$$ ON A LAWYER), so beware of the attorneys who tell you that you will lose your home, your life savings, or any other fear-of-embarrassment-and-exposure-or-financial-ruin-based argument as to “why you should settle anonymously through them for cheap, or else you might lose everything.”

I circled back to this topic in the end, but this article ended up being a “buyer beware of attorney settlement factories” article, where an attorney or his team of lawyers is trying to lure you into being part of their high-volume settlement business.  In this article, I give you the red flags to look for to spot these attorneys, and I hope this helps clarify some of the conflicting information you get from speaking to different attorneys where one attorney pushes you to settle and where another (e.g., I) suggest that you just ignore it.

“SETTLEMENT FACTORIES” are what I call these law firms. These law firms hire multiple attorneys to track down, solicit, and lure accused defendants into hiring them “for a cheap and anonymous settlement.” From a business perspective, more attorneys for the business owner means the ability to make more phone calls to solicit more accused defendants [to process more settlements], and the ability to “capture” more clients for their law firm means more profits. And, rather than actually negotiate a good settlement for their client, they run what I refer to as a “volume business” where they pre-arrange a price with the copyright holder which is above the market (copyright troll profits). Then, instead of actually negotiating a settlement, they’ll hand over the names to the plaintiff attorney and get the high-priced mediocre settlement for their client.  In return, the copyright troll allows that so-called attorney to not have to negotiate the settlement for each client, since they have a “fixed settlement amount.”  As far as I am concerned, this means that the so-called defense attorneys are part of the copyright troll problem, in a “cottage industry” sort of fashion.

What compounds the problem is that negotiating the settlement is only HALF of the solution. The SETTLEMENT AGREEMENT itself must also be negotiated, particularly because the “boilerplate” settlement agreements contain ADMISSIONS OF GUILT and UNFRIENDLY LANGUAGE which does not properly release the client from liability, nor does it properly protect the client’s rights.

For me, where writing this article will become infuriating is that suddenly these attorneys and their “beefed up” staff of hired attorneys will now start advertising 1) that they spend the time to actively negotiate the best settlement for their client, and 2) that they take the careful time to negotiate the terms of the settlement agreement so that the accused John Doe Defendant will be released from liability and the negotiated terms will properly protect the client’s rights.

If I see this, all I could say is “caveat emptor,” do your own research on:

1) How long that attorney has been in practice [REMEMBER: “Copyright Troll” mass bittorrent lawsuits targeting multiple “John Doe” defendants have only been in existence only since 2010, so any attorney who claims he has been fighting copyright trolls for 20 years is obviously lying.],

2) Check the attorney’s blog to see the HISTORY of his articles — was he one of the first attorneys who fought these cases, or is he a new “me too” copycat attorney who is standing on the shoulders of giants? (after reading this, no doubt these attorney will now add “older” articles to make their website look older), and

3) Check the blog article itself for “SEO OPTIMIZED” content, or “KEYWORDS” placed into the article.  Ask yourself, “was the purpose of this article to provide me valuable information? or was the purpose of the article to bulk it up with keywords so that search engine spiders will reward the author with first page rankings on the search engines?

4) Last, but not least, check the EARLY ARTICLES of the blog to see whether the attorney actually tried to fight these cases and hash out the legal arguments, or whether they were merely reporting on the lawsuits already in existence to attract new business.  I call these attorneys “me too” attorneys, and you can usually spot them because all they do is report the cases.

NOTE: I write this article cringing a bit because I myself just added an e-mail form at the bottom of my articles so that people can contact me if they had a question. I also dislike trashing another attorney or law firm because that simply makes me look bad. I also have a secret, and that is that I was one of the first group of attorneys contacted by EFF to figure out the “John Doe” mass bittorrent lawsuits, and so I have an advantage over the “me too attorney” both legally and information-wise as to the history of these cases, who is who, and which copyright “troll” uses which strategy in fighting a case, and under what conditions will a copyright holder accept a settlement, and how far they will bend in their settlement price. I also spend a lot of time on what I call “situational awareness,” knowing not only the law, and not only the personality of the copyright holder AND the mannerisms of the local copyright attorney hired to sue defendants in a particular set of federal courts, but I also know when a judge is going to dismiss a case (based on his past rulings), and I know when the copyright holder’s local counsel is pressured because of activities that happened in other cases, or whether they are under pressure to resolve a case because they have already have asked for two extensions from the court and I know they will likely not receive a third extension because the judge has expressed an intent for the plaintiff to begin naming and serving defendants.  This is the difference between a copycat and an original.

I also say with no shame that in 2010, I and a small handful of attorneys were contacted by the Electronic Frontier Foundation (better known as EFF) to help understand and resolve the developing copyright troll problem back when ISPs began sending letters out to their subscribers informing them that their ISP would be handing out their contact information and their identity to the plaintiff attorney / copyright holders unless they filed objections (or, “motions to quash”) with the courts. Thus, I credit the EFF for even noticing the copyright troll problem and contacting us to figure out what to do about it.

Unfortunately (or, fortunately, however you see it), that initial list of 20 attorneys has grown to over 100+ names, and some attorneys have negotiated with EFF to list them as representing clients in multiple states, hence increasing their visibility in an ever-growing list of lawyers. These are usually the “settlement factories” I referenced above, and again, caveat emptor.

Let’s pretend, for a moment, that you did not like me or my use of pretrial strategies (often making use of federal procedure) to defend a client. Or, let’s pretend for a moment that I could not take you as a client (e.g., because my case load was full, or because I did not have time to speak to you about your matter). Because there were only a handful of us attorneys on the original EFF list who knew anything about these copyright infringement lawsuits, over the years, we have become friends and have helped each other out on many of the lawsuits in which we represented both John Doe Defendants and “named and served” defendants. Some of these attorneys are still around today, and some have moved on to other areas of law, or they have stopped taking clients because fighting mass bittorrent cases has become more burdensome than the effort was worth (especially when some copyright holders do not play fairly in discovery [think, Malibu Media, LLC]).

Finding “that special client who will pay my fees to fight this case to trial” for many attorneys has become an unrealized pipe dream, and is something us attorneys often discuss.  If you truly want to fight your case, I have nothing wrong with either me, or anyone else I trust representing you in your lawsuit (I will happily tout another attorney’s merits and advanced skillsets when speaking to clients). AND, I will happily refer you to someone if I find that one of my peers would better assist you.  I *DO NOT* believe in referral fees, nor do I “share the workload” with other attorneys (this is code word for “I referred you this client, so pay me a piece of the legal fees you receive and call it paying me for my “proportional efforts.”), something that is often done in my field which, in my opinion, needs to stop. This is also why I have upset a handful of non-copyright attorneys who know nothing about these cases who have called me with a client they would like to refer to me (coincidentally, asking to share in the fees, but not in the work).

So in hindsight, while I thought I’d be reintroducing “copyright troll” subpoenas and basic copyright infringement concepts to clear up some conflicting information found on the web, instead I am providing a clear warning to those who are being actively solicited by law firms. A law firm simply should not be calling you or contacting you to solicit your business.

There is a lot of conflicting information on the web about copyright trolls, and what to do when you receive a subpoena from your ISP, what to do when you receive what is often known as a “DMCA notice” (usually signed at the bottom by Ira M. Siegel) that you have violated a copyright holder’s rights [by what is often the download of a “B-rated” film or more shockingly, that you have been accused or caught downloading pornography through the use of bittorrent (and you thought you were private), and now you want to settle the claims against you anonymously, or you want to make this go away as quickly as possible].

All I could say is STOP AND CONSIDER YOUR OPTIONS, BECAUSE IGNORING A CLAIM OF COPYRIGHT INFRINGEMENT CAN OFTEN BE A GOOD IDEA (and, when I speak to clients, I do ask them questions about the claims against them, and IF THEY CAN IGNORE, I do suggest that they DO NOTHING.) Even in a lawsuit — DOING NOTHING MAY OFTEN BE YOUR BEST STRATEGIC MOVE, as counterintuitive as that might sound.

But when you are bombarded with attorneys and law firms who actively market their fear-based services by using “Google AdWords” (ethically or unethically “buying” more well known attorney’s names as keywords so that THEY show up at the top of a search when you search for another attorney after doing your own research on who to trust, yes, you know who you are), and those attorneys then have their “assistant” attorneys calling you and pushing you to anonymously settle the claims against you, think twice. Is this person trying to get you to be yet one more client in their “volume” business??

In every one of my calls, I discuss what I call the “ignore” option which in many people’s scenario is a viable option. In many cases, I even push a client towards the “ignore” side of things.

[NOTE: There are many political reasons I have for this, such as “not feeding the troll,” or “not funding their extortion-based scheme,” or simply because I have been trying to change the copyright laws to limit or hinder a copyright holder’s ability to accuse or sue an internet user for the violation of that copyright holder’s copyrights, but NONE OF THOSE REASONS ARE REASON WHY I SUGGEST SOMEONE I SPEAK TO IGNORES THE CLAIMS AGAINST THEM.]

Sometimes an individual’s circumstances allow them to ignore the lawsuit filed against them (or the copyright violation claimed against them in the DMCA notice) simply because of 1) the individual’s financial situation, 2) the location of their home, 3) the location of the plaintiff attorney, 4) whether that copyright holder authorizes his attorneys [and pays their fee] to “name and serve” defendants and move forward with trial, 5) for strategy purposes, e.g., the psychological impact of having one or more John Doe Defendants ignore the claims against them (while other defendants rush to settle in fear of being named and served), or 6) simply because ignoring is the better option in that person’s situation.

But my point, MY POINT, ***MY POINT*** IS CAVEAT EMPTOR. If the attorney you are speaking to is running your case as a volume business, or he is pushing you towards a “quick anonymous settlement” without showing you the merits of either 1) IGNORING, or 2) if in a lawsuit, defending the claims against you, beware, beware, beware.

The EFF list of attorneys who handle “mass bittorrent John Doe lawsuits for copyright infringement violations” has grown to over 100+ attorneys, and I have never even heard of some of these attorneys (which means that they are not defending cases, but rather, are running a volume-based settlement factory). I also see a number of names where I know for a fact that some of the attorneys listed in various states are NOT LICENSED to practice law in that state (neither on the state level, nor on the federal level) — this is a clear sign of being a volume-based settlement factory. I also know from my own experience defending clients that some of the attorney names on this list have switched sides and are now suing defendants.

…Just do your research, ok? And when a lawyer calls you, and then calls you again (and again), please ask yourself why they are following up with you.

Read Full Post »

I am not licensed to practice law in Canada, and my knowledge (as far as I am able to share) is limited to U.S. Copyright Law, and the states in which I am licensed.

That being said, I have received more than just a few inquiries from those of you who have received “DMCA Copyright Infringement Notices” from your ISPs in Canada and Australia, and I thought it was time to clarify which ISPs appear to be “working” with Ira Siegel (CEG-TEK), and what their capabilities appear to be.

HOW CAN CEG-TEK SEND OUT LETTERS TO CANADIAN CITIZENS, AND WHICH CANADIAN ISPs APPEAR TO BE WORKING WITH CEG-TEK?

So far, infringement notices began to be sent out to Canadians under a loophole which allowed U.S. copyright holders to send infringement notices to Canadian subscribers.  While many have received these notices, it appears to me that CEG-TEK is focusing on the following ISPs:

Bell Canada
Rogers Communications (a.k.a. Rogers Cable)

Shaw Communications Inc. (a.k.a. Shaw Cablesystems G.P., or “sjrb.ca”)
ACN Canada
Electronic Box Inc.
TELUS Communications Company
Start Communications (a.k.a. “start.ca”)
TekSavvy Solutions Inc.

Now obviously there are others out there, but these seem to be where the focus of the letters seem to be going out.  Also, remember that CEG-TEK spends a large amount of time recruiting ISPs to sign on to their “cause” to eliminate piracy.  I remember how happy they were when in the U.S., they got COX Communications to start working with them.  No doubt, they are working to recruit more and more ISPs every day, and these few ISPs seem to be the Canadian ISPs that CEG-TEK appears to be regularly using to send out the DMCA settlement demand letters.

WHAT DO THE CANADIAN ISPs [WHO WORK WITH CEG-TEK] APPEAR TO BE PROVIDING THEM?

Originally, I expected that because of the Canadian loophole, that CEG-TEK was sending these “blind,” meaning, not knowing who the downloader is.  But, because of recent trends (where CEG-TEK is now picking up “additional cases” which were downloaded by that same user sometimes weeks or months ago), I am now understanding that certain Canadian ISPs (my best guess, Bell Canada, Rogers, Shaw, and possibly the others) are working with CEG-TEK to provide them 1) geolocation data as to where the downloads are taking place, and/or 2) lists of past IP addresses which have been leased to that internet user / subscriber over the past twelve months (or, whatever that ISPs “IP Retention Policy” before they purge the IP address data for older records).

Thus, Canadian CEG-TEK cases are starting to look and act more like U.S. CEG-TEK cases as far as them having the ability to identify who the subscriber is, and CEG-TEK being able to “look back in time” to see what other bittorrent downloads belonging to their many clients [that their bots tracked on the bittorrent networks realtime weeks or even months ago] these subscribers participated in.

WHAT ARE YOUR CONSIDERATIONS AS TO WHETHER TO IGNORE OR SETTLE WHEN YOU LIVE OUTSIDE OF THE U.S.:

If the Canadian accused of downloading copyrighted materials via bittorrent is concerned that maybe they will be named and served as a defendant in a U.S. federal court, and they have a reputation that they must preserve (meaning, they have little-to-no risk tolerance of having their name become associated with being part of a pornography or piracy lawsuit), AND THE COPYRIGHT HOLDER IS A “COPYRIGHT TROLL,” (meaning, they have sued John Doe Defendants in the U.S. courts, or they have made known that they intend to sue defendants who ignore the DMCA copyright infringement letters that are sent to accused internet users), ONLY THEN does it make sense to settle a CEG-TEK claim against you.

Why?  Because as soon as an individual is named and served as a defendant in a U.S. lawsuit, there are many “spiders” and “robots” which comb the U.S. District Court (federal) court cases, and report and index the names of the court cases on the various search engines.  The efffect of these “spiders” on a Canadian is that information on the lawsuit gets posted on the internet and remains there forever.  That way, if someone (e.g., an employer, a creditor, or someone who wants to dig up information on a particular person) does an internet search for that person’s name, then that person’s name and his involvement in the lawsuit will show up as one of the top entries on the search engine’s results, along with the case information.

And to make matters worse (which is why I would like to see some discretion on the part of the websites NOT to index the names of defendants in search engine results), even if that accused defendant did not do the download but was merely the account holder when the download allegedly occurred, or EVEN IF THAT DEFENDANT FIGHTS THE CHARGES AND WINS — FOREVER, THAT “NAMED” DEFENDANT WILL HAVE THE FACT THAT THEY WERE IMPLICATED IN A COPYRIGHT INFRINGEMENT LAWSUIT FOR PORNOGRAPHY OR PIRACY will have their reputations tarnished because the lawsuit will show up in the search engine results.

This is the most powerful leverage a copyright holder has over an accused defendant, namely, that even if he fights the case and wins, his reputation will forever be tarnished, and for this reason alone people settle the claims against them, even before there is a lawsuit.  I have spoken to hundreds (if not thousands of accused defendants) over the years, and this is the primary reason people (even those outside of the U.S.) settle.

[Personally, this is why I would like to see the laws changed to make it a crime (or more likely, very heavy civil fines, penalties, or sanctions) to name and serve a defendant without having a higher threshold of evidence (e.g., “clear and convincing” rather than “more likely than not”) that it was them who did the crime they are accused of.  Too many families have had their reputations ruined because some overzealous attorney accused them of a crime they did not commit.]

Because of the leverage a copyright holder yields over an accused defendant that they may sue, this is why I read the press releases and follow the financial lives of many of the copyright holders — so that I can properly predict what they will or will not do in the future.  This is also why I make such a large distinction on this blog and when discussing cases with potential clients of distinguishing those copyright holders who are “copyright trolls” (those who have sued in the past, or are likely to sue in the future) versus those who have not yet sued in the U.S. federal courts, and those who (in my opinion) will never sue.  That way, at least I can properly advise clients as to which copyright holders pose the greatest risks, and which copyright holders they can ignore based on who the copyright holders are, what they have done in the past, and what they have publicly stated (in court cases, motions, press releases, and on website articles) that they will do in the future.

IN SUMMARY:

So for those of you who live in Canada, or Australia, or whatever countries the U.S. copyright holders will go next to enforce their rights, please be level-headed when receiving these infringement notices from CEG-TEK and the like.  Don’t call the copyright holder or CEG-TEK and argue whether you are “guilty” or not, because their job is merely to collect a settlement from you.  Rather, contact an attorney (me, or someone else who knows the operation of CEG-TEK and the tendencies of the specific copyright holder), and determine whether you are dealing with what I refer to as a “copyright troll” or not.  Assess your risks, and proceed accordingly down the “settle” or “ignore” route we discuss on our calls.

Once again, the main consideration as to why people settle is if you have a copyright holder who is a “copyright troll,” and you are concerned that you will be named and served as a defendant in a U.S. lawsuit, and that your involvement in that lawsuit (whether or not you are found guilty) will tarnish your reputation abroad in a search engine when someone searches your name when applying for a job, etc.  Otherwise, learn who your copyright holder is and if there is a low risk of them suing, save your money.

LEGAL DISCLAIMER: I personally find it silly to see attorneys place disclaimers on website articles, but here it is actually appropriate.  In this article, I am not suggesting that any person ignore a settlement demand letter that is sent to them, nor am I suggesting that they settle the claims against them.  I am also merely stating my thoughts about the likelihood of being sued so that they can evaluate their options and the risks and rewards of each course of action.  These are not legal opinions, nor are they to be considered advice to act upon or not act upon. 

Every person’s situation is different, and every person has a slightly different set of circumstances that can affect whether the best course of action is to ignore, fight, or settle, and every copyright holder similarly makes the same financial risk-reward analysis of whether it makes financial sense to take a particular action.  Often, lawyers take actions which do not make financial sense for an alternative reason, e.g., to get a judgement in a particular location against a poor person, NOT to ever collect that judgement, but as a trophy or a weapon to show the next set of would-be defendants that he is ready, able, and willing to pursue a particular line of attack against them as just as they did to so-and-so.  The opinions stated here are my own calculations based on my own understanding of the circumstances.


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.

Read Full Post »

Older Posts »