Strike 3 Holdings, LLC produces "award winning, critically acclaimed adult motion pictures." Compl. ¶ 2. Or, as the Miami Herald describes, it is "[t]he Steven Spielberg of porn." Adiel Kaplan, The Steven Spielberg of Porn Sues to Make Floridians Stop Pirating His Raunchy Videos , Miami Herald (July 12, 2018, 4:48 PM), https://www.miamiherald.com/news/local/article214634930.html.
Strike 3 is also a copyright troll. Its swarms of lawyers hound people who allegedly watch their content through Bittorrent, an online service enabling anonymous users to share videos despite their copyright protection. Since Bittorrent masks users' identities, Strike 3 can only *162identify an infringing Internet protocol (IP) address, using geolocation technology to trace that address to a jurisdiction. This method is famously flawed: virtual private networks and onion routing spoof IP addresses (for good and ill); routers and other devices are unsecured; malware cracks passwords and opens backdoors; multiple people (family, roommates, guests, neighbors, etc.) share the same IP address; a geolocation service might randomly assign addresses to some general location if it cannot more specifically identify another. See, e.g. , James Temple, Lawsuit Says Grandma Illegally Downloaded Porn , S.F. Chron. (July 15, 2011, 4:00 AM), https://www.sfgate.com/business/article/Lawsuit-says-grandma-illegally-downloaded-porn-2354720.php. Simply put, inferring the person who pays the cable bill illegally downloaded a specific file is even less trustworthy than inferring they watched a specific TV show. But in many cases, the method is enough to force the Internet service provider (ISP) to unmask the IP address's subscriber. And once the ISP outs the subscriber, permitting them to be served as the defendant, any future Google search of their name will turn-up associations with the websites Vixen , Blacked , Tushy , and Blacked Raw . The first two are awkward enough, but the latter two cater to even more singular tastes.
Little wonder so many defendants settle. Indeed, the copyright troll's success rate comes not from the Copyright Act, but from the law of large numbers. According to PACER, over the past thirteen months, Strike 3 has filed 1849 cases just like this one in courts across the country-forty in this district alone-closely following the copyright trolls who together consumed 58% of the federal copyright docket in 2015. These serial litigants drop cases at the first sign of resistance, preying on low-hanging fruit and staying one step ahead of any coordinated defense. They don't seem to care about whether defendant actually did the infringing, or about developing the law. If a Billy Goat Gruff moves to confront a copyright troll in court, the troll cuts and runs back under its bridge. Perhaps the trolls fear a court disrupting their rinse-wash-and-repeat approach: file a deluge of complaints; ask the court to compel disclosure of the account holders; settle as many claims as possible; abandon the rest. See Matthew Sag & Jake Haskell, Defense Against the Dark Arts of Copyright Trolling ,
Here, that approach led Strike 3 astray. Because Strike 3's need for discovery does not outweigh defendant's privacy expectation, the Court will deny Strike 3's ex parte motion to subpoena defendant's ISP to discover defendant's identity prior to the 26(f) conference. That sunders Strike 3's entire case, since a failure to identify defendant makes effectuating service impossible. So the Court will dismiss this case without prejudice.
I. Strike 3 cannot subpoena defendant's ISP because its discovery request lacks sufficient specificity and does not overcome defendant's privacy expectation.
Strike 3's request for early discovery falls short of Rule 26's requirements. A plaintiff can only discover an unknown defendant's identity through a court order under Rule 26(d)(1). But the rule cabins a district court's discretion to order discovery to circumstances where a plaintiff shows good cause. See Fed. R. Civ. P. 26(b)(1). And to show good cause, the D.C. Circuit requires establishing likely personal jurisdiction. AF Holdings, LLC v. Does 1-1058 ,
Yet the D.C. Circuit never said that was the only requirement. For one, the Court must also balance Strike 3's need for discovery with a potentially-noninfringing defendant's right to be anonymous. Only the Second Circuit has articulated this balance, looking to the plaintiff's showing of a prima facie claim of actionable harm; their discovery request's specificity; their alternative means to obtain the subpoenaed information; the need for the subpoenaed information to advance the claim; and the objecting party's privacy expectation. Arista Records, LLC v. Doe 3 ,
One can hardly blame the D.C. Circuit for its silence. Of the forty cases Strike 3 has filed in this district (including seven on a single day), none have reached the Court of Appeals. Twenty-two have been voluntarily dismissed, all but one following the same formula: Strike 3 files a complaint (identical in every case except for the infringing IP address). A few weeks later, Strike 3 files a motion to subpoena the anonymous defendant's ISP prior to the Rule 26(f) conference (identical in every case except for the particular ISP to be served-Comcast, Verizon, of RCN). Satisfied by Strike 3's showing of likely personal jurisdiction, the court grants the motion, usually providing at least twenty days for the defendant to move to quash the subpoena, and sometimes providing for defendant's continued anonymity. Nothing happens for a few weeks, and then Strike 3 voluntarily dismisses the suit.
*164How many of those cases reached the Court of Appeals? Zero.
Although the D.C. Circuit has never had the chance to elaborate on its test, the undersigned considers the Second Circuit's test very persuasive. And not for nothing, it comports with the D.C. Circuit's more general observation that, when evaluating good cause under Rule 26, "interests in privacy may call for a measure of extra protection." In re Sealed Case (Medical Records) ,
Applying the Second Circuit's test, and placing great weight on defendant's privacy expectation, the Court will deny Strike 3's motion for early discovery. To be sure, Strike 3's alleged ownership of an infringed copyright sets forth a prima facie claim. So too is the requested information necessary to advance Strike 3's claim, just as subpoenaing the ISP is necessary to get the information.
But Strike 3's request lacks the type of specificity the Second Circuit's test requires: that the request will identify a copyright infringer who can be sued. See Sony Music ,
Similarly, even though "defendants have little expectation of privacy in downloading and distributing copyrighted [content] without permission," Sony Music ,
Though Strike 3 admits a protective order could allow defendant to anonymously challenge the subpoena, Br. at 8, that hardly seems fair. That drags defendant into court and foists on them the unenviable burden of hiring a lawyer or defending their reputation pro se, all before they've even been served. That's not how our system of litigation is supposed to work. Moreover, the inconsistency with which courts permit defendants to proceed anonymously illustrates the ineffectiveness of this shield more generally. See supra notes 1-2 and accompanying text.
An honest copyright holder might balk at this result, misunderstanding it to slash congressionally endowed defenses against increasingly creative and covert cyberpirates. But the typical case does not involve pornography,
II. Because Strike 3 cannot effectuate service without subpoenaing defendant's ISP, its case must be dismissed.
Denying Strike 3's discovery motion dooms its claim. Simply put, Strike 3's inability to identify defendant makes effectuating service or prosecuting the case impossible. So because Strike 3 cannot proceed with its claim, the Court dismisses it.
Strike 3 does not dispute this logic. It concedes "[d]efendant must be identified before this suit can progress." See Br. at 5-6 (internal quotation marks omitted) (quoting Malibu Media, LLC v. Doe ,
Strike 3's lone rebuttal points out that "courts have rejected the dismissal of suits against unnamed defendants ... until the plaintiff has had some opportunity for discovery to learn [the defendants'] identities." Br. at 6 (alterations in original) (internal *166quotation marks omitted) (quoting Davis v. Kelly ,
III. Conclusion
Armed with hundreds of cut-and-pasted complaints and boilerplate discovery motions, Strike 3 floods this courthouse (and others around the country) with lawsuits smacking of extortion. It treats this Court not as a citadel of justice, but as an ATM. Its feigned desire for legal process masks what it really seeks: for the Court to oversee a high-tech shakedown. This Court declines.
The Court denies Strike 3's ex parte motion [3] for discovery prior to the Rule 26(f) conference. Since this makes serving the defendant impossible, the Court denies as moot Strike 3's motion [4] extending time to effectuate service and dismisses the case without prejudice. An accompanying order will issue.
Civil Case Nos. 17-2338, 17-2342, 17-2344, 17-2345, 17-2346, 17-2347, 18-536, 18-537 (allowing defendant to anonymously move to quash), 18-804, 18-805 (allowing defendant to move to proceed anonymously), 18-806, 18-807 (requiring the defendant's anonymity until further court order), 18-808, 18-1193, 18-1197 (prohibiting Strike 3 or the ISP from publicly revealing the defendant's identity), 18-1199 (allowing defendant to move to proceed anonymously), 18-1424, 18-1426, 18-1430, 18-1432, 18-1894.
Civil Case Nos. 18-1192 (allowing defendant to move to proceed anonymously), 18-1198 (allowing defendant to move to proceed anonymously), 18-1427, 18-1429, 18-1431, 18-1898 (requiring the defendant's anonymity until further court order), 18-1899, 18-1902, 18-1903 (allowing defendant to move to proceed anonymously), 18-1904 (requiring the defendant's anonymity until further court order), 18-2205, 18-2206.
Civil Case Nos. 18-1425 (this case), 18-2204, 18-2210, 18-2211, 18-2212.
Civil Case No. 18-1896.
The Court notes "it is unsettled in many circuits"-including this one-"whether pornography is in fact entitled to protection against copyright infringement." Liberty Media Holdings, LLC v. Swarm Sharing Hash File ,
