MEMORANDUM OF DECISION AND ORDER
The Plaintiff, Patrick Collins, Inc. (“Collins”) commenced this action against John Does 1 through 9, pursuant to 17 U.S.C. § 106 and § 501, alleging direct and indirect copyright infringement of the Plaintiff’s film “Gangbanged.” Presently before the Court are objections to a Report and Recommendation of United States Magistrate Judge Gary R. Brown dated May 1, 2012, addressing an application by the Plaintiff in the above-captioned litigation for immediate discovery, pursuant to Federal Rules of Civil Procedure (“Fed. R. Civ.P.”) 45 for a subpoena directed at specific non-party Internet Service Providers (“ISPs”) to obtain identifying information about subscribers to the named Internet Protocol (“IP”) addresses in order to identify the anonymous John Doe Defendants. For the reasons set forth below, this Court adopts the Report and Recommendation in its entirety.
I. BACKGROUND
A. The BitTorrent Protocol
Prior to delving into the specific facts and circumstances surrounding the instant ease, a
The Court’s explanation of the BitTorrent protocol is primarily drawn from Judge Brown’s explanation as well as that in Next Phase Distribution, Inc. v. John Does 1-27,
An IP address is a “numeric label[ ] specific to a computer network that serve[s] to identify and locate that network on the Internet, but not to further identify the defendant. In fact, a single IP address may host one or more devices operated or owned by multiple users (for example, a computer or handheld tablet), each communicating on the same network, such as with a wireless router or a business intranet.” Media Prods., Inc. v. John Does 1-26, No. 12-CV-31719,
B. The Present Action
The Plaintiff claims to be the owner of a copyright registered for the pornographic film “Gangbanged.” The Defendants are internet users who allegedly each downloaded some or all of the Plaintiffs work using the BitTorrent Peer-to-Peer sharing protocol between November 17, 2011 and January 26, 2012. On March 8, 2012, the Plaintiff commenced the present suit, alleging direct and indirect copyright infringement against each of the anonymous John Doe Defendants. In its complaint, the Plaintiff identified each of the Defendants only by their IP addresses.
Over the past year, the Plaintiff has filed a number of similar lawsuits, in this district and others, involving dozens, if not hundreds, of defendants. In re BitTorrent Adult Film Copyright Infringement Cases, No. 12-CV-1154,
On May 1, 2012, Judge Brown issued an Order & Report and Recommendation regarding the instant matter and three related matters pending before other courts in this district. Judge Brown granted the Plaintiffs motion in part and allowed the Plaintiff to serve subpoenas pursuant to Fed.R.Civ.P. 45 on the ISPs to obtain the name, address, and Media Access Control address for only the Defendant John Doe 1 in each case. The Plaintiff was explicitly forbidden from seeking the telephone numbers and email addresses of these individuals. Furthermore, Judge Brown instructed the ISPs to produce the information directly to the Court, not to the Plaintiff, and directed that the submission be made ex parte and under seal.
On, May 10, 2012, the Plaintiff voluntarily dismissed the Defendants John Does 2 through 9. On May 16, 2012, the Plaintiff filed objections to Judge Brown’s Report and Recommendation on the following grounds: (1) that the Plaintiff did not and will not engage in improper litigation tactics; (2) an IP address is likely to identify the actual infringer; and (3) joinder is appropriate in this action as well as similar future actions.
After reviewing the Plaintiffs objections, this Court adopts the Report and Recommendation in its entirety.
II. DISCUSSION
A. Legal Standard
A court is required to make a de novo determination as to those portions of the report and recommendation as to which objections were made. 28 U.S.C. § 636(b)(1)(C); Grassia v. Scully,
In a case where a party “makes only con-clusory or general objections, or simply reiterates his original arguments, the Court reviews the Report and Recommendation only for clear error.” Pall Corp. v. Entegris, Inc.,
B. Improper Litigation Tactics
The Plaintiff first objects to Judge Brown’s statement that “counsel for K-Beech has already engaged in improper litigation tactics in this matter, and [I] find it highly probable that Patrick Collins Inc. and Malibu will likely engage in similar tactics if permitted to proceed with these mass litigations.” In re BitTorrent,
The Court adopts Judge Brown’s factual findings, and finds his reasoning to be persuasive. Judge Brown’s concerns seem particularly perceptive in light of the fact that, despite his explicit instruction that the subpoenaed information be sent directly to the Court, ex parte and under seal, the Plaintiff subsequently served subpoenas that instead requested that the identifying information be sent to the Plaintiff’s counsel. The Court also agrees with Judge Brown’s conclusion that “[o]ur federal court system provides litigants with some of the finest tools available to assist in resolving disputes; the courts
Other courts, both in this Circuit and around the country, have come to the same conclusion as Judge Brown when faced with similar circumstances. See Media Prods., Inc. v. John Does 1-26, No. 12-CV-31719,
Accordingly, the Court affirms Judge Brown’s finding that the Plaintiff may use improper litigation tactics if permitted to engage in mass litigation or if provided with the Defendants’ email addresses and phone numbers.
C. As to the Use of an IP Address to Identify Infringers
The Plaintiff also objects to Judge Brown’s finding that an IP address alone is insufficient to establish “a reasonable likelihood [that] it will lead to the identity of defendants who could be sued.” In re BitTorrent,
The Plaintiff objects to this conclusion on three grounds. First, the Plaintiff contends that Judge Brown’s conclusion is inconsistent with the decision in Arista Records LLC v. Does 1-16, No. 08-CV-765,
Second, the Plaintiff argues that wireless routers are much more likely to be secured today than even a few short years ago, making it much more likely that the infringing activity was performed by the account owner rather than someone else. The Court notes that, even if this is true, a secured network does not reduce the likelihood, noted by Judge Brown, that the infringing activity was conducted by a guest, family member, or
Furthermore, a “secured” wireless network by no means ensures that the infringing activity was not performed by an interloper making unauthorized use of the account holder’s network. Many modern wireless routers include a feature called WiFi Protected Setup (“WPS”), which is often turned on by default, and is intended to allow users to more easily and securely add devices to their network. However, the United States Computer Emergency Readiness Team, a division of the Department of Homeland Security, warns that this feature has a design flaw that renders any network that uses it vulnerable to attack. U.S. Computer Emergency Readiness Team, Vulnerability Note VU # 723755: WiFi Protected Setup (WPS) PIN Brute Force Vulnerability (Dec. 27, 2011) available at http://www.kb.cert.org/vuls/id/723755.
The Court is hesitant to cite directly to information designed to compromise a computer network, but a simple internet search reveals that detailed instructions are widely available that would allow anyone with only a moderate degree of computer knowledge to “hack” any wireless network that uses this feature, using almost any modern laptop. Furthermore, at least one website offers a $99 kit that gives the same capability to any user with even the most basic knowledge of computers. Many routers also use a security method known as Wired Equivalent Privacy (“WEP”), which the FBI warns has its own share of exploitable vulnerabilities. Federal Bureau of Investigation, Got a Wireless Network? It’s Time to Shore Up Security (May 4, 2007) available at http://www.fbi.gov/news/ stories/2007/may/wireless_050407.
If the Court were to hold internet account holders responsible for any interlopers and guests who might infringe on the Plaintiffs work, the Court would essentially be imposing a duty that every home internet user vigilantly guard their wireless network. The Court declines to impose such a duty. See AF Holdings, LLC v. Doe, No. 12-CV-2049, 2012 W L 3835102, at *3 (N.D.Cal. Sep. 5, 2012) (“AF Holdings has not articulated any basis for imposing on Hatfield a legal duty to prevent the infringement of AF Holdings’ copyrighted works [by securing his wireless network], and the court is aware of none.”).
Lastly, the Plaintiff insists that if this Court adopts Judge Brown’s finding, federal law enforcement will be unable to prosecute cyber-crimes, particularly those that involve the sexual exploitation of minors. As Judge Brown notes, “[i]t is difficult to accord the plaintiff, which features “Teen” pornography on its website, the moral high-ground in this regard.” In re BitTorrent,
Many Courts have shared Judge Brown’s skepticism of the use of IP addresses to identify file sharing defendants in eases involving pornographic films. Patrick Collins, Inc. v. Does 1-4 No. 12-CV-2962,
Ultimately, this Court agrees with the above-cited Courts, and adopts Judge Brown’s finding that the Plaintiff failed to establish a reasonable likelihood that the discovery requested would lead to the identity of the Defendants who could be sued.
D. Joinder
The Plaintiffs final objection is to Judge Brown’s recommendation that the Court instruct the Plaintiff that “any future actions of a similar nature in this district be filed as separate actions as against each John Doe defendant, so as to avoid unfair outcomes, improper joinder and waste of judicial resources, and to ensure the proper payment of filing fees.” In re BitTorrent,
1. Relevant Law
Under Rule 20(a) of the Federal Rules of Civil Procedure (“Rule 20(a)”), “[a]ll persons may join in one action as plaintiff if they assert any right to relief ... arising out of the same transaction, occurrence, or series of transactions or occurrences and if any question of law or fact common to all these persons will arise in the action.” Rule 20(a) should be liberally interpreted to “enable the court to promote judicial economy by permitting all reasonably related claims for relief by or against different parties to be tried in a single proceeding.” A.I.A. Holdings, S.A. v. Lehman Brothers, Inc., No. 97-CV-4978,
The Court has broad discretion to sever claims under Rules 20(b), 21, and 42(b). See, e.g., Amato v. City of Saratoga Springs,
2. As to Joinder in the Instant Case
As an initial matter, the Court notes that, subsequent to Judge Brown’s ruling but pri- or to its filing of objections, the Plaintiff voluntarily dismissed all of the Defendants besides John Doe 1. As such, as the case presently stands the issue of joiner is moot. However, the Plaintiff spent a significant portion of its objections discussing this issue, and has informed the Court that “Plaintiff does intend to proceed against a number of defendants and will do so.” (PI. Objections 2). Furthermore, there is a substantial volume of similar eases pending in this Circuit, many filed by the same Plaintiff as in the instant case. As such, the Court will briefly address the Plaintiffs objections.
In this regard, the Plaintiff takes issue with Judge Brown’s rejection of its “swarm joinder” theory. The “swarm joinder” theory posits that “every user who participates in the ‘swarm’ is acting in concert to violate plaintiffs’ copyrights.” In re BitTorrent,
Judge Brown articulated several factors that weigh against allowing such joinder in the instant case: (1) the BitTorrent protocol operates invisibly to the user and the user plays no active role in any interactions with other Defendants; (2) the dates of the alleged infringing action are often weeks or months apart; (3) individualized questions of fact far outweigh the common questions of fact; and (4) allowing the Plaintiff to pursue mass actions permits the Plaintiff to avoid filing fees. Judge Brown’s explanation of these points is detailed and persuasive, and the Court sees no reason to reproduce them at length in this opinion.
The Court notes one additional factor that weighs against the adoption of the “swarm joinder” theory. The Plaintiff extensively quotes from Patrick Collins, Inc. v. John Does 1-21 in its articulation of “swarm joinder” theory.
However, the chain of sharing transactions might easily be broken if a Seeder joins the swarm who obtained a copy of the same file through a different source (such as a different swarm or through other file sharing methods). Therefore, it is possible that any Defendant could have received the file from an intervening sharer, and would have no connection to either the Initial Seeder or the other Defendants. AF Holdings, LLC v. Does 1-97, No. 11-CV-3067,
A number of Courts in this Circuit have specifically adopted some or all of Judge Brown’s reasoning on this issue. Digital Sins,
Accordingly, this Court joins the courts referred to above in adopting Judge Brown’s findings on this issue. The Plaintiff and their counsel are directed that any future actions of a similar nature in this district be filed as separate actions against each John Doe defendant, so as to avoid unfair outcomes, improper joinder and waste of judicial resources, and to ensure the proper payment of filing fees.
III. CONCLUSION
For the foregoing reasons, it is hereby
ORDERED that the objections by the Plaintiff to the Report and Recommendation of United States Magistrate Judge Gary R. Brown dated May 1, 2012, are denied; and it is further
ORDERED that Judge Brown’s Report and Recommendation is adopted in its entirety.
SO ORDERED.
