MEMORANDUM OPINION
Presently pending and ready for resolution in this copyright infringement action are motions to dismiss counterclaim and for sanctions filed by Plaintiff Metro Media Entertainment, LLC. (ECF No. 29). The issues are fully briefed and the court now rules pursuant to Local Rule 105.6, no hearing being deemed necessary. For the reasons that follow, the motion to dismiss will be granted and the motion for sanctions will be denied.
I. Background
Plaintiff Metro Media Entertainment, LLC, commenced this action on February 6, 2012, by filing a complaint against forty-seven Doe defendants alleged to have infringed Plaintiffs copyright in a porno
BitTorrent facilitates the sharing of large amounts of data across “Peer-to-Peer” networks on the [Ijnternet. To begin, an initial user decides to share a file (known as a “seed”) with a torrent network. Other users (known as “peers”) within the network then connect to the seed file for downloading. Each peer downloads oné piece of the seed file at a time. As a piece of the seed file is downloaded, it is typically made available to other peers to download. In other words, every downloader is also an uploader. Thus, as the process continues, peers may receive pieces of the seed file from those who have already downloaded that piece and not necessarily from the initial seeder. This system of multiple pieces of data coming from various peers is called a “swarm.” With respect to any particular swarm, an alphanumeric representation (known as a “hash”) of the shared file remains the same. A hash is essentially a “forensic digital fingerprint” that identifies a particular copy of a shared file.
Third Degree Films, Inc. v. Does 1-108, No. DKC 11-3007,
Through this process, each of the “peers” participating in a given “swarm” exposes his or her Internet Protocol address -(“IP address”) to the outside world. The owners of copyrights in films such as My Baby Got Back! # hi — the subject of the instant case — retain the services-of law firms or investigators, such as the Copyright Enforcement Group, LLC — the firm retained by the instant plaintiff — to monitor and record the information revealed by the infringers. Typically, a lawsuit is then filed against all swarm participants believed to be located within the jurisdiction of a given court, along with a request for early discovery in which the plaintiff seeks to serve subpoenas on Internet Service Providers (“ISPs”) associated with the. alleged infringers in order to learn the identity of subscribers.
Recognizing the practical difficulties presented by joining so many defendants in a single lawsuit, as well as “the risk of extortionate settlement, especially when joinder is being used to that end,” Third Degree Films,
So it was, in the instant case, that the court issued a sua sponte order on May 7, 2012, severing the forty-seven defendants named in the complaint and dismissing all except Doe 1, further directing that “all documents filed in this action that contain Doe l’s identifying information shall be filed under seal.” (ECF No. 17, at 2). Days later, Plaintiffs counsel transmitted a settlement offer to the sole remaining defendant, advising, in part:
Discovery was authorized by the United States federal district court in the above-identified case relating to the identities of the subscribers whose [I]nternet accounts were allegedly used to download from and/or make available on the Internet unauthorized copies of [My Baby Got Back! # ] in violation of the U.S. Copyright Act (17 U.S.C. §§ 101 et seq.) You were identified as one of those subscribers.
(ECF No. 23-3). After observing that 17 U.S.C. § 504(c) authorizes statutory damages of up to $150,000 for a willful violation, Plaintiffs counsel stated, “[o]n behalf of Plaintiff, we will formally name you as a defendant (i.e., as an alleged infringer of Plaintiffs copyright in [My Baby Got Back! #JJ]),” unless a proposed “settlement offer” of $3,500.00 was promptly remitted. (Id).
Doe 1, by counsel, responded by filing an answer and counterclaim in which he publicly revealed his identity as Defendant Richard Steinruck: ■ (ECF No. 23). After emphatically denying any involvement with the downloading or uploading of Plaintiffs film, Defendant alleges in his counterclaim that Plaintiff is taking advantage of “an opportunity to reap undeserved and illegal rewards and to convert [its] copyrighted materials into a cash generating resource ... by extorting money from those who have done no illegal act, but who cannot risk the opprobrium of being falsely accused of illegally downloading pornography.” (Id at ¶ 37). According to Defendant, “[t]he key allegations [contained in the complaint and request for early discovery] used to convince the [c]ourt to authorize the issuance of the subpoena [to Defendant’s ISP] were false and Plaintiff misled the [c]ourt in order to further its scheme.” (Id at ¶ 41). Defendant characterizes Plaintiffs subsequent settlement offer as an “extortive shakedown letter,” which “effectively threatened that unless Mr. Stein-ruck paid Plaintiff the money demanded ... [Plaintiff] would make public the identity of John Doe 1 — Mr. Steinruck — as a downloader, copier, and distributor of pornography by litigating the [c]omplaint.” (Id at ¶ 45). In Defendant’s view, these “actions ... constitute[ ] abuse of process under Maryland state law, as well as abuse of process under federal law[,] ... [and] may also constitute contempt of this [e]ourt, for using [ ] [c]ourt process to attempt to accomplish an illegal purpose.” (Id at ¶48 (internal citation omitted)).
Plaintiff responded to the counterclaim by filing the pending motion to dismiss, pursuant to Fed.R.Civ.P. 12(b)(6), and seeking sanctions related to the filing of a frivolous complaint, pursuant to 28 U.S.C. § 1927. (ECF No. 29). Defendant has opposed both motions (ECF No. 31), and Plaintiff has filed papers in reply (ECF No. 32).
II. Motion to Dismiss
A. Standard of Review
A motion pursuant to Federal Rule of Civil Procedure 12(b)(6) tests the sufficiency of the complaint. Presley v. City of Charlottesville,
At this stage, the court must consider all well-pleaded allegations in a complaint as true, Albright v. Oliver,
B. Analysis
Under Maryland law, an action for abuse of process provides a remedy “for those cases ‘in which legal procedure has been set in motion in proper form, with probable cause, and even with ultimate success, but nevertheless has been perverted to accomplish an ulterior purpose for which it was not designed.’ ” One Thousand Fleet Limited Partnership v. Guerriero,
[Fjirst, that the defendant willfully used process after it has issued in a manner not contemplated by law, Keys [v. Chrysler Credit Corp.,303 Md. 397 , 411,494 A.2d 200 (1985) ]; second, that the defendant acted to satisfy an ulterior motive; and third, that damages resulted from the defendant’s perverted use of process, Berman [v. Karvounis,308 Md. 259 , 262,518 A.2d 726 (1987) ].
Id.
The key distinction between abuse of process, on the one hand, and malicious use of process and/or malicious prosecution, on the other, is that “the gist of the tort is not commencing an action or causing process to issue without justification, but misusing, or misapplying process justified in itself for an end other than that which it was designed to accomplish.” Wood v. Palmer Ford, Inc.,
The proper analysis of an abuse of process claim, therefore, involves a comparison between the lawful purpose for which the process in question was intended and the improper purpose for which it was actually employed. “The improper purpose usually takes the form of coercion to obtain a collateral advantage, not properly involved in the proceeding itself, such as the surrender of property or the payment of money, by the use of the process as a threat or club.” Wood,
Given these parameters, Defendant’s abuse of process claim cannot be sustained. Initially, insofar as Defendant complains about the untoward purposes and methods employed by Plaintiff in bringing this suit, his counterclaim sounds as one for malicious use of process, rather than abuse of process. As the court explained in One Thousand Fleet,
The case of Keys v. Chrysler Credit Corporation,303 Md. 397 ,494 A.2d 200 (1985), illustrates the differences between malicious use of process and abuse of process. In Keys, Anna Keys’s wages were attached by a writ of garnishment issued to enforce' a judgment that Keys had fully satisfied more than four years earlier. Id. at 400,494 A.2d at 201 .... Keys sued Chrysler Credit for, inter alia, malicious use of process and abuse of process. Id. at 402,494 A.2d at 202 . Judge McAuliffe, writing for the Court, concluded that the trial court improperly dismissed Keys’s malicious use of process claim because a prior civil proceeding had been instituted by Chrysler Credit against Keys, that the proceeding was instituted without probable cause inasmuch as Chrysler admitted that Keys had fully paid the judgment, that malice may be inferred from a want of probable cause, that the proceeding was terminated in Keys’s favor, and that Keys suffered a seizure of her property, i.e., the garnished wages. Id. at 408-10,494 A.2d at 205-07 . The Court held, however,' that Keys could not maintain an action for abuse of process because there was no . evidence of any improper use or perversion of the process after it issued. The Court noted that Keys’s “proper complaint in this case is with the issuance of the process, ... and she has no proper proof of an abuse of process.” Id. at 412,494 A.2d at 207 (emphasis added). Thus, an action for abuse of process could not survive.
(Emphasis and second alteration in original). As noted, Defendant alleges that the “key allegations” of. Plaintiff’s eompláint “used to convince the [c]ourt to authorize the issuance of the subpoena were false” and designed to “mislead] the [c]ourt in order to further [Plaintiffs] scheme.” (ECF’ No. 23 ¶ 41). An abuse of process claim does not concern whether a eompláint was brought, or any court process was issued, in good faith or based on sufficient cause. Allegations such as these could only be actionable as malicious use of process, which requires, inter alia, that the prior proceeding was “terminated in favor of the plaintiff.” One Thousand Fleet,
The only facts set forth by Defendant that could potentially support an abuse of process claim relate to the issuance of the subpoena to Defendant’s ISP and the ensuing settlement letter transmitted by Plaintiff. The lawful purpose of the subpoena was to compel the ISP to divulge Defendant’s name and address, which, in turn, would enable Plaintiff to file an amended complaint naming the proper defendants and requesting the issuance of summonses. While the fact that Plaintiff also used that information to convey a settlement offer is clearly “outside the scope” of the subpoena, the purpose of the settlement letter was not “to attain some collateral objective.” Palmer Ford,
In sum, the facts presented in the counterclaim do not support a cause of action for abuse of process. Accordingly, Plaintiffs motion to dismiss will be granted.
III. Motion for Sanctions
Observing that Defendant’s counsel has unsuccessfully advanced virtually identical counterclaims in other courts, Plaintiff alleges that the instant counterclaim is frivolous and that attorneys’ fees and costs associated with litigating the motion to dismiss should be awarded pursuant to 28 U.S.C. § 1927. Section 1927 provides that “[a]ny attorney .... who so multiplies the proceedings in any case unreasonably and vexatiously may be required by the court
The instant record does not reflect that Defendant filed his counterclaim in bad faith. Issues with the methods and motives of plaintiffs in suits of this nature are well-documented, and several courts have suggested that, under certain circumstances, an actionable claim could be viable. See, e.g., Third Degree Films v. Does 1-47,
IV. Conclusion
For the foregoing reasons, Plaintiffs motion to dismiss counterclaim will be granted and its motion for sanctions will be denied. A separate order will follow.
Notes
. A number of courts have recognized a distinction between the subscribers of the IP addresses associated with the infringing activity and the infringers themselves. See, e.g., Discount Video Center, Inc. v. Does 1-29,
. While the counterclaim purports to raise a claim of abuse of process under federal cornmon law, the parties cite no authority for the proposition that such a cause of action is even
. As will be explained, a claim for abuse of criminal process does not require a showing of damages.
. Under Maryland law, a cause of action for malicious use of process has five elements: (1) a prior civil proceeding was instituted by the defendant; (2) that proceeding was insti-' tuted without probable cause {i.e., "a reasonable ground for belief in the existence of such
. Plaintiff attaches to its motion the transcript of a proceeding in the United States District Court for the District of Columbia in which an abuse of process counterclaim raised by Defendant’s counsel was dismissed. (ECF No. 29-3). According to Plaintiff, the transcript “speaks for itself” with regard to that court’s finding that the claim was frivolous. (ECF No. 29-1, at 6). To the contrary, the transcript reveals that the court simply found that the facts presented did not support liability in that case. While the court later found that counsel offered a "frivolous excuse” with respect to a different motion (id. at 11), he made no such finding with regard to the defendant’s counterclaim. Indeed, the plaintiff's motion for sanctions related to that filing was denied. ■
