The P2P Threat From Your PC

November 16, 2004

Robert Steinberg Yury Kapgan*

* Robert Steinberg is a partner in the corporate and litigation departments, as well as a member of both the Venture & Technology and Intellectual Property and Technology practice groups in the Los Angeles office of Latham & Watkins. Bob has a J.D. from Georgetown University and B.S. degrees in Systems Science Engineering and Economics from the University of Pennsylvania. Bob has an extensive background in business, law and engineering. His practice focuses on all aspects of negotiations, transactions and litigation and rights acquisitions concerning technology and media. He has represented start-up companies, emerging and middle market companies, major international corporations, entertainment studios, venture capitalist and investment banks, including companies such as America Online, Broadcom and Disney. Yury Kapgan is an associate in the corporate and litigation departments at Latham & Watkins in Los Angeles. He has a J.D. from the University of California, Boalt Hall School of Law and a B.A. from UCLA. Special thanks to Roxanne Christ and Dan Schecter, partners in the Los Angeles office of Latham & Watkins, for their comments on this paper. The positions and opinions taken by the authors are not necessarily representative of their employers or clients. This notice also disclaims any responsibility with regard to actions taken or results obtained on the basis of this paper. © Copyright 2004 Latham & Watkins LLP. All rights reserved. Latham & Watkins operates as a limited liability partnership worldwide, with an affiliate in the United Kingdom and Italy, where the practice is conducted through an affiliated multinational partnership.

Page 1

I. INTRODUCTION

Not since the advent of the VCR over 20 years ago has copyright law had the potential to affect the behavior of so many Americans so significantly. The computer technology at the heart of the recent uproar over Internet file-sharing is used by tens of millions Americans for downloading music.1 Peer-to- peer (P2P) technology essentially permits the trading online of music, movies, videogames, and practically any other file between the hard-drives of participating home computers.2

It should not be a surprise that such file-sharing has garnered a great deal of attention from big business as well as big government. The recording and motion picture industries in particular have come to believe that P2P is to blame for their declining revenues, especially the revenue decline seen by the music industry,3 which has suffered a 31 percent drop in compact disc sales since mid-2000.4 In response to this perceived threat to their livelihood, the major recording labels, their distributors, and the Recording Industry Association of America (RIAA), as well as film studios, performers, and various other associated parties have launched scores of lawsuits. Starting with P2P service providers like Napster, Aimster, Kazaa, Grokster, and StreamCast, these suits have swelled to include individual downloaders, financial investors and traditional Internet service providers (ISPs) who refused to reveal clients’ names in the face of subpoenas.5 The Motion Picture Association of America (MPAA) and most of the large movie studios are now following the recording industry’s lead by suing individuals who download movies illegally.6

Though the infamous Napster cases7 decidedly carved out the copyright landscape for P2P technology, the law on point has become part of a dynamic process whose twists and turns have been

1 See, e.g., Carl Bialik, “Key Questions in Crackdown On File Sharing by Music Firms,” Wall Street Journal Online (June 30, 2003), available at http://www.mediadefender.com/press%20about%20MD/wsj_6_30_03.htm. 2 In a conventional Internet system, users access information from servers rather from each other. A peer-to-peer system is premised on the goal of allowing users to communicate directly with each other, such that each user becomes both a client and a server that can both receive and disseminate information. See Damien A. Riehl, Peer- to-Peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a Copyright Nirvana or Gehenna?, 27 Wm. Mitchell L. Rev. 1761, 1765 (2001). 3 By some estimates, the record industry’s profits have tumbled “about 10 percent annually for the past few years.” Rebecca Dana, Colleges Tackle Music Piracy, Washington Post (August 28, 2003), available at http://stacks.msnbc.com/news/958371.asp. 4 Jeordan Legon, 261 Music File Swappers Sued; Amnesty Program Unveiled (Jan. 23, 2004), at http://www.cnn.com/2003/TECH/internet/09/08/music.downloading/index.html. 5 Id.; Jen Rogers, Music Industry Suing 532 Song Swappers (Jan. 26, 2004), at http://www.cnn.com/2004/TECH/ internet/01/22/online.music/index.html; John Borland, RIAA Takes Hundreds More ‘John Does’ to Court (June 22, 2004), at http://news.com.com/2102-1027_3-5243587.html; Reuters, RIAA Sues 744 More Over File-Sharing (Aug. 25, 2004), available at http://msnbc.msn.com/id/5819566. 6 Jon Healey & Lorenza Munoz, “MPAA Plans Suits to Stop Film Piracy,” Los Angeles Times, Nov. 4, 2004, at C1, C10. 7 A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (N.D. Cal. 2000), aff’d, 239 F.3d 1004 (9th Cir. 2001) (“Napster”).

Page 2

reported in almost daily news headlines. Technological innovation has always pushed copyright law to adapt in due turn, forcing the law to embrace technologies and acts that were hardly, if at all, in existence when the Copyright Act of 1978 or even the Digital Millennium Copyright Act (DMCA) of 1998 came into being. Just a few years ago P2P file-sharing systems were fairly rare, such that copyright law hardly could have envisioned the range of conduct at issue. As a result, judges have been forced to try to adapt the general legal theories and defenses of copyright law to the particular oddities and nuances of the P2P environment. Plaintiffs have urged the courts to stretch contributory and vicarious infringement doctrines, in particular, to fit a new range of acts and actors. As the law has evolved and theories of liability arguably expanded, P2P services have responded by trying to design around and distance themselves from the features that felled Napster. Some such efforts may yet prove successful, as evidenced by the recent Ninth Circuit Court of Appeals victory for P2P services Grokster and StreamCast,8 while others like Aimster have failed and still others await their fates, leaving some uncertainty as to the future of P2P.

This paper discusses the cutting-edge legal issues surrounding P2P technology, including the most recent court decisions, in the hope of providing some guidance in navigating this precarious field in copyright law.

II. OVERVIEW OF P2P SYSTEMS

From a technical standpoint, all P2P networks help link individual computers together, allowing one user to search and access the hard-drives of and download files from other logged-on users. If the file in question is a music file, as is often the case, User 1 might offer one music track to User 2 in the hopes of receiving a different track off the system in return. In effect, a P2P system is a virtual cooperative in which individual users afford complete strangers access to their computer files.9 In fact, the millions of computers linked together from time to time in this sort of ad hoc relationship have been said to create a massive computer “network,” built from scores of unrelated PCs in homes and businesses across the country and around the world.10

P2P providers generally distribute their software free of charge (or for a nominal fee), permitting individual users to download the P2P providers’ software onto their personal computers. It can be said that P2P providers supply the base platform from which end users exchange digital media and create the so-called P2P transfer network. A user may choose to share files from his own computer, including, for

8 Metro-Goldwyn-Mayer Studios, Inc. v. Grokster Ltd., 259 F. Supp. 2d 1029 (C.D. Cal. 2003), aff’d, 380 F.3d 1154 (9th Cir. 2004) (“Grokster”). The plaintiffs filed a petition for a writ of certiorari to the United States Supreme Court on October 8, 2004; the defendants filed their opposition brief on November 8, 2004. 9 Profit from Peer to Peer, The Economist, June 21, 2001, available at http://www.cfo.com/article/ 1,5309,5869,00.html. 10 Id.

Page 3

example, “music files, video files, software applications, e-books and text files,”11 or merely access the files of other logged-on users. When launched, the software automatically connects the user to a P2P network “and makes any shared files available for transfer to any other user currently connected to the same peer-to-peer network.”12 A user can then search for specific files, whether audio, audiovisual or text, by using some combination of keyword, title or artist terms, as available, to retrieve the exact items desired.13

In terms of practical mechanics, P2P technologies tend to span a continuum, from systems in which individuals trade files without the intervention of servers or computers controlled by a P2P provider (a “decentralized system”), to systems in which the P2P provider’s central servers serve as a hub to help connect users and enable them to perform search functions (a “centralized system”). In a decentralized system, the P2P provider’s role is intended to be nominal, more akin to a software provider who contributes the back-end program but theoretically little else towards facilitating the swapping of files among users. In this sense, once the software has been transferred to the client, the provider’s role is complete, and it is “hands-off” from that point. In a centralized system, the P2P provider’s role is conceptualized as more ongoing, like that of a service provider, interacting with and facilitating end users’ online file-swapping in a more “hands-on” capacity. This distinction makes all the difference in copyright law.

Napster’s technology followed the “hands-on” model. Napster’s centralized system was based on servers it allegedly controlled that enabled individual users to search for and retrieve files from other users. This control meant that Napster could detect and block illegal downloading using its network and, therefore, was obligated to do so.

More recent P2P technology is of a purer P2P nature, devoid of central servers or intermediary contributions from the P2P provider. The FastTrack technology, employed originally by StreamCast and Grokster, apparently performs no indexing functions through provider-controlled computers, instead leaving such tasks to the computers of certain individual users known as “supernodes.”14 A supernode is a computer with a high bandwidth connection which sits in the home or business of an individual user

11 Grokster, 259 F. Supp. 2d at 1032. 12 Id. 13 Id. 14 In a decision finding personal jurisdiction over Sharman Networks—the entity behind Kazaa from which Grokster originally licensed FastTrack—the district court in Grokster described the technology as follows: “[o]nce a search commences, the . . . software displays a list (or partial list) of users who are currently sharing files that match the search criteria, including data such as the estimated time required to transfer each file. The user may then click on a specific listing to initiate a direct transfer from the source computer to the requesting user's computer. When the transfer is complete, the requesting user and source user have identical copies of the file, and the requesting user may also start sharing the file with others. [Kazza’s] software includes other features, such as facilities for organizing, viewing and playing media files, and for communicating with other users.” Grokster, 243 F. Supp. 2d 1073, 1081 (C.D. Cal. 2003).

Page 4

and is tapped by the P2P network (usually unbeknownst to the user) to host a directory of files available for downloading. By some accounts, once a user connects to a supernode, “local search hubs” compile an index of files offered by the user for downloading. In response to a search request, the supernode reviews its own index of files and, if it does not find what has been requested, searches the indices of other supernodes; “[h]ence the index of files available at any point in time is distributed throughout the various SuperNode computers maintained by users of the network.”15 Kazaa, Grokster and other “pure” P2P service providers maintain that the pure P2P network technology makes it impossible to exert any control over the use or conduct of client computers, such that even if all of a provider’s computers were taken off-line, its “network” would continue functioning without interruption16—indexing, searching, making connections and downloading files. The dichotomy, as framed by one court, comes down to numbers: Napster functioned on one supernode, which it controlled and owned, while FastTrack entities operate through many supernodes, spread among individual computers throughout the country, which are allegedly neither owned nor controlled by the P2P providers.17

The purest of P2P systems are those that dispense with supernodes and all other intermediary indices, instead passing search requests from user to user until a desired item is found. Though slow, these networks may stand the best chance of avoiding secondary liability. In fact, as exemplified by such second-generation P2P systems, the best chance for surviving liability for copyright infringement appears to be to invest in a strategy of doing more to appear to do less.

III. LEGAL PRINCIPLES

A. Direct Infringement in Copyright Law

An end user who uploads or downloads copyrighted music through a P2P network without the copyright owner’s authorization is liable for direct copyright infringement. The Copyright Act of 1976 provides that “anyone who violates any of the exclusive rights of the copyright owner . . . is an infringer of the copyright.”18 These exclusive rights include reproduction and distribution of copyrighted material.19 If a P2P network user downloads a copyrighted song to his hard drive, he has reproduced that song (and the musical composition in the song). If he allows other P2P network users to access the

15 See David Hayes, Copyright Liability of Online Service Providers, 19 No. 11 Computer Internet Lawyer 15, 16 (Nov. 2002) (citing to Complaint in Lieber v. Consumer Empowerment, Civ. No. 01-09923 (C.D. Cal. 2001), later consolidated into Metro-Goldwin-Mayer Studios, Inc. v. Grokster Ltd., Civ. No. 01-08541). 16 See, e.g., Kazaa BV’s Answer to MGM Complaint at ¶ 114. 17 See Grokster, 259 F. Supp. 2d at 1039-40. Questions remain, however, concerning the existence and control of certain types of supernodes called “root supernodes,” which are said to connect users to the network by directing them to then active supernodes. The FastTrack software apparently contains a list of such root supernodes, which—depending on their function—may reintroduce questions concerning provider control reminiscent of those Napster suffered with its central servers. See id. at 1040. 18 17 USC § 501. 19 Id. § 106.

Page 5

copy of that song from his hard drive, he has distributed that song. If these actions are taken without permission of the copyright owner or a valid defense,20 such reproduction and distribution constitute direct copyright infringement,21 subject to damages of between $750 to $150,000 for each such reproduction or distribution. There is no dispute that most users of P2P services such as Kazaa, Morpheus, and Grokster are downloading and uploading music without permission and are therefore direct infringers.22 In contrast, the providers of the services, who do not actually engage in the reproduction or distribution of the copyrighted material themselves, cannot therefore be direct infringers. The question then becomes whether such P2P providers are secondarily liable for the direct infringement of their network users. And this is where the challenge begins.

B. Contributory Infringement

U.S. copyright law provides for secondary liability based on contributory or vicarious infringement, extending to those who enable others to directly infringe. Cases brought against P2P providers, like Napster, Aimster and Grokster, are based on these two indirect liability theories.

A contributory infringer is “one who, with knowledge of the infringing activity, induces, causes or materially contributes to the infringing conduct of another.”23 The Supreme Court has described a contributory infringer as one who “was in a position to control the use of copyrighted works by others and had authorized the use without permission from the copyright owner.”24 To prevail on a contributory copyright infringement claim, a plaintiff must show (1) direct infringement by a third party; (2) that the defendant knew of the direct infringement; and (3) that the defendant materially contributed to the infringement.25

The first element of the claim—direct infringement by a party—has not been disputed with respect to P2P providers whose users swap music and other files. The individual file-swappers are direct infringers, as noted above. For the second element, according to the Ninth Circuit Court of Appeals,

20 For example, “fair use” is one limitation on the copyright holder’s rights. See 17 USC § 107. According to Section 107 of the Copyright Act, factors to consider in determining whether a particular use is fair include:

(1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work. 21 Napster, 239 F.3d at 1013-14. 22 See generally Fred von Lohmann, Electronic Frontier Foundation, IAAL: Peer-to-Peer File Sharing and Copyright Law after Napster (Jan. 2003), at www.eff.org. 23 Napster, 114 F. Supp. 2d at 918; Napster, 239 F.3d at 1019. 24 Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 437 (1984) (“Sony-Betamax”); see also 3 Nimmer on Copyright § 12.04[A][2][a]. 25 Grokster, 380 F.3d at 1160.

Page 6

constructive knowledge of infringement may be imputed to a P2P provider if its software is not “capable of substantial” or “commercially significant” non-infringing uses.26 Going beyond the Ninth Circuit’s articulation of this element, the Seventh Circuit Court of Appeals has held that “[e]ven where there are noninfringing uses of an Internet file-sharing service, . . . if the infringing uses are substantial then to avoid liability as a contributory infringer the provider of the service must show that it would have been disproportionately costly for him to eliminate or at least reduce substantially the infringing uses.”27 Otherwise, if constructive knowledge of infringement cannot be imputed, a copyright owner must show that the P2P provider has knowledge of specific infringement.28 Finally, the third element requires a copyright owner to show that the P2P provider materially contributed to the infringement by, for example, providing the “site and facilities” for the infringement (such as a central server for hosting an index of available files) and failing to take steps to prevent the infringement, or inducing infringing uses through advertisement.29

In Napster, the district court concluded, and the Ninth Circuit affirmed, that the P2P service provided by Napster materially contributed to the direct infringement by end users: “Napster, Inc., supplies the proprietary software, search engine, servers, and means of establishing a connection between users’ computers. Without the support services defendant provides, Napster users could not find and download the music they want with the ease of which defendant boasts.”30 As explained by the district court in Grokster, Napster’s “material contribution” was more than just its software; its network constituted the “site and facilities” for infringement to take place because it hosted the central list of available files, so “each and every search request passed through Napster’s servers,”31 thereby enabling Napster to block access by infringing users. Napster “served as the axis of the file-sharing network’s wheel. When Napster closed down, the Napster file-sharing network disappeared with it.”32 On the other hand, if “users search for and initiate transfers of files using [the P2P provider] . . . without any information being transmitted to or through any computers owned or controlled by [the P2P provider],” those acts alone do not constitute material contribution by the P2P provider.33 In sum, the “critical

26 Id. at 1162. 27 In re Aimster Copyright Litigation, 334 F.3d 643, 653 (7th Cir. 2003). 28 Id. at 650 (requiring “knowledge of infringing uses”); Grokster, 380 F.3d at 1162 (requiring “reasonable knowledge of specific infringement”). 29 Id. at 1163; Sony-Betamax, 464 U.S. at 435-38 (discussing advertising as a factor in contributory infringement). 30 Napster, 114 F. Supp. 2d at 919-20. 31 Grokster, 259 F. Supp. 2d at 1039. 32 Id. 33 Id. at 1040.

Page 7

question is whether [the P2P providers] do anything, aside from distributing software, to actively facilitate—or whether they could do anything to stop—their users’ infringing activity.”34

1. The Staple Article of Commerce Doctrine and Substantial Noninfringing Uses

The decision in the Napster case, as well as Grokster and Aimster (discussed further below), are rooted fundamentally in the Supreme Court’s twenty year-old Sony-Betamax decision. In deciding Sony- Betamax, the Supreme Court borrowed from the “staple article of commerce” doctrine of patent law. The Court held that the manufacturer of a VCR could not be held contributory liable for the infringing activities of purchasers who used the VCRs to make unauthorized copies of copyrighted works, since the VCR—a “staple article of commerce”—was capable of substantial noninfringing uses, such as recording one television program while viewing another or simply recording a program for later viewing. In the words of the Court, “the sale of copying equipment, like the sale of other articles of commerce, does not constitute contributory infringement if the product is widely used for legitimate, unobjectionable purposes. Indeed, it need merely be capable of substantial noninfringing uses.”35

The Court in Sony-Betamax recognized that a different decision would have allowed copyright owners to unduly extend the reach of their copyright monopolies to articles of commerce that had little to do with the copyrights themselves. Analogizing to patent law, the Court noted:

When a charge of contributory infringement is predicated entirely on the sale of an article of commerce that is used by the purchaser to infringe a patent, the public interest in access to that article of commerce is necessarily implicated. A finding of contributory infringement does not, of course, remove the article from the market altogether; it does, however, give the patentee effective control over the sale of that item. Indeed, a finding of contributory infringement is normally the functional equivalent of holding that the disputed article is within the monopoly granted to the patentee.

For that reason, in contributory infringement cases arising under the patent laws the Court has always recognized the critical importance of not allowing the patentee to extend his monopoly beyond the limits of his specific grant. These cases deny the patentee any right to control the distribution of unpatented articles unless they are “unsuited for any commercial noninfringing use.” Unless a commodity “has no use except through practice of the patented method,” the patentee has no right to claim that its distribution constitutes contributory infringement. “To form the basis for contributory infringement the item must almost be uniquely suited as a component of the patented invention.” “[A] sale of an article which though adapted to an infringing use is also adapted to other and lawful uses, is not enough to make the seller a contributory infringer. Such a rule would block the wheels of commerce.”36

Recognizing that “there are substantial differences between the patent and copyright laws,” the Court nonetheless concluded that the “staple article of commerce doctrine must strike a balance between a

34 Id. at 1039. 35 Sony-Betamax, 464 U.S. at 442. 36 Id. at 440-41 (footnote and citations omitted).

Page 8

copyright holder’s legitimate demand for effective—not merely symbolic—protection of the statutory monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce.”37 That balance fell in favor of Sony. Unlike “cases involving an ongoing relationship between the direct infringer and the contributory infringer at the time the infringing conduct occurred,” the Court was particularly mindful that “[t]he only contact between Sony and the users of the Betamax . . . occurred at the moment of sale.” 38

By contrast, the Ninth Circuit in Napster emphasized that, unlike in Sony-Betamax, where Sony simply manufactured and distributed VCRs but lacked control over what buyers did with them subsequently, Napster actually retained ongoing control over its service.39 Napster’s refusal to exercise its retained power, after having acquired actual knowledge of end user infringement, destroyed its substantial noninfringing use defense.40 Thus, in the context of an ongoing service relationship, rather than a one-time sale of a product, where the provider is arguably in a position to supervise the use of its service, once the service provider is notified of the specific infringing activity of its end users, its failure to use its power to prevent further infringing activity can give rise to liability for contributory copyright infringement.

C. Vicarious Liability

The other indirect liability theory—vicarious copyright infringement—arises when a defendant “has the right and ability to supervise the infringing activity and also has a direct financial interest in such activity.”41 In the P2P context, failure to police the system over which a party has control, coupled with a showing of financial benefit from the continued availability of infringing files on a system, leads to the imposition of vicarious liability.42 Neither an intent to infringe nor knowledge of direct infringement

37 Id. at 442. 38 Id. at 437-38. 39 The district court in Napster noted that “[i]n Sony, the defendant’s participation did not extend past manufacturing and selling the VCRs: ‘the only contact between Sony and the users of the Betamax . . . occurred at the moment of sale.’ Here in contrast, Napster, Inc. maintains and supervises an integrated system that users must access to upload or download files. Courts have distinguished the protection Sony offers to the manufacture and sale of a device from scenarios in which the defendant continues to exercise control over the device’s use. Napster, Inc.’s facilitation of unauthorized file-sharing smacks of [] contributory infringement . . . rather than the legitimate conduct of the VCR manufacturers. Given defendant’s control over the service, as opposed to mere manufacturing or selling, the existence of a potentially unobjectionable use like space-shifting does not defeat plaintiffs’ claims.” Napster, 114 F. Supp. 2d. at 917 (citations omitted). 40 Napster, 239 F.3d at 1021. 41 Id. at 1022 (citation and internal quotations omitted). 42 Id. at 1024.

Page 9

is an element of this tort.43 In addition, the Ninth Circuit has held that the Sony-Betamax “substantial noninfringing use” defense does not apply to vicarious copyright infringement.44

Financial benefit exists where the availability of infringing material “acts as a draw for customers.”45 In Napster, the Ninth Circuit concluded that Napster’s revenue, though yet nonexistent, was dependent on an increase in its user base, such that Napster benefited financially from the draw of copyright-protected works on its system.46 More recently, P2P entities more clearly derive a financial benefit from the draw of consumers by generating substantial revenue from advertising dollars.

A defendant’s ability to supervise the infringing conduct establishes the final element of a vicarious liability claim, reinforcing the importance of control over the P2P system. A capacity to block infringers from access to a particular environment, for any reason whatsoever, is evidence of the right and ability to supervise.47 In Napster, because the company had the right to control access to its system and terminate accounts, it had a duty to police to the fullest extent, such that “[t]urning a blind eye to detectable acts of infringement for the sake of profit gives rise to liability.”48 Napster’s ability to locate infringing material on search indices, along with its right to disconnect user access to the system, was indicative of such supervisory capacity.49 Accordingly, in the Ninth Circuit’s subsequent decision in Grokster, as discussed below, the court found two other P2P providers lacked the ability to exercise such control, and therefore escaped vicarious liability despite being able to benefit financially therefrom.50 By contrast, the Seventh Circuit’s decision in Aimster suggested that when a P2P provider’s software architecture is arguably designed with the intention of depriving the provider of otherwise available supervisory control, the supervisory control element can be found to exist.51

43 Id. at 1022-24 (failure to police system combined with financial interest in ongoing infringement was sufficient to justify preliminary injunction given likelihood of success on vicarious liability claim). 44 Id. at 1022; see generally 3 Nimmer on Copyright § 12.04[A][2][b]. 45 Napster, 239 F.3d at 1023 (citing Fonovisa v. Cherry Auction, Inc., 76 F.3d 259, 263-64 (9th Cir. 1996), for proposition that financial benefit may be shown where infringing performances enhance the attractiveness of a venue). 46 Id. 47 Id.; see also Fonovisa, 76 F.3d at 259 (swap meet operator had right to supervise because it could terminate vendors, including those that were violating copyright law). 48 Napster, 239 F.3d at 1023. 49 The Ninth Circuit departed from the district court when it noted that “the right and ability to police is cabined by the system’s current architecture” but nevertheless went on to hold Napster vicariously liable because “Napster . . . has the ability to locate infringing material listed on its search indices, and the right to terminate users’ access to the system.” Id. at 1024. 50 Grokster, 380 F.3d at 1164-66. 51 In re Aimster Copyright Litigation, 334 F.3d 643, 654-55 (7th Cir. 2003). The Seventh Circuit, in the context of a preliminary injunction against P2P provider Aimster, did not squarely decide whether the recording industry would likely prevail against Aimster on the issue of vicarious infringement, noting that whether Aimster’s failure to

Page 10

IV. POST-NAPSTER LAW ON P2P

The legal demise of Napster appeared to signal a major undoing for P2P networks. However, more recent Ninth Circuit case law suggests there may be a safe haven for certain types of P2P technology, much to the dismay of the music, videogame and motion picture industries. By all accounts, the recent decision by the Ninth Circuit Court of Appeals in Grokster (in which a petition for a writ of certiorari to the Supreme Court is pending) is one of the most significant in the P2P field to date. Initiated in October 2001 in the Central District of California by plaintiffs comprised of virtually every major motion picture and music studio, including MGM, Columbia Pictures, Disney, New Line Cinema, Time Warner, Twentieth Century Fox, Universal, Arista Records, Atlantic, Capital Records and Sony,52 the case was predicted to ensure another plaintiff’s victory. Targeting the second-generation of P2P systems—Kazaa, Grokster, and StreamCast—plaintiffs sought to replicate their Napster successes by bringing claims of contributory and vicarious infringement against P2P service providers whose end users were indisputably widely infringing the studios’ copyrights. Instead, the district court granted summary judgment in favor of Grokster and StreamCast, which the Ninth Circuit recently affirmed.53

The decisions in favor of Grokster and StreamCast highlight the central significance of the technological distinctions upon which this area of copyright law turns. Yet the Ninth Circuit’s decision may conflict with the Seventh Circuit’s decision a year earlier upholding a preliminary injunction against P2P provider Aimster. Consequently, the following sections of this paper focus on how technological distinctions in software can affect secondary liability of P2P providers for infringing uses of their P2P systems by consumers, in the context of analyzing the commonalities and conflicts between Ninth and Seventh Circuit case law.

A. Grokster

If there is one factor that most significantly determines secondary liability for infringement in P2P systems, it is this: control. Relying on Sony-Betamax and Napster, the Ninth Circuit affirmed summary judgment in favor of Grokster and Streamcast, holding that neither could be secondarily liable for the infringing activity of end users.

eliminate its software’s encryption feature and monitor use of its system was “academic,” because “its ostrich-like refusal to discover the extent to which its system was being used to infringe copyright is merely another piece of evidence that it was a contributory infringer.” Id. For unrelated reasons having to do with the theory of agency, however, the Seventh Circuit cast doubt on the district court’s finding in favor of the recording industry on Aimster’s vicarious infringement. See id. at 654 (“we are less confident than the district judge was that the recording industry would also be likely to prevail on the issue of vicarious infringement should the case be tried”). 52 The Grokster case was consolidated in the district court with Lieber v. Consumer Empowerment, in which music composition copyright holders advanced the same copyright claims against the same defendants. 53 Grokster, 259 F. Supp. 2d 1029 (C.D. Cal. 2003), aff’d, 380 F.3d 1154 (9th Cir. 2004). During the pendency of the litigation at the district court level, Kazaa ceased defending the action, and default judgment was entered against it. See Grokster, 380 F.3d at 1159 n.4. Sharman Networks, the successor-in-interest to Kazaa, remains a defendant in the district court.

Page 11

The Grokster court adopted wholesale what it called the district court’s “well reasoned analysis”54 and succinctly framed the important lesson to be learned: “the software design is of great import.”55 Like the district court, the Ninth Circuit contrasted Napster’s “centralized set of servers that maintained an index of available files” to “StreamCast’s decentralized, Gnutella-type network and Grokster’s quasi-decentralized, supernode, KaZaa-type network [where] no central index is maintained.”56 That made the difference. Grokster and StreamCast appeared to reap the rewards of the decentralized model adopted by second-generation P2Ps struggling to distance themselves from the Napster model. As the district court put it:

Neither StreamCast nor Grokster facilitates the exchange of files between users in the way Napster did. Users connect to the respective networks, select which files to share, send and receive searches, and download files, all with no material involvement of Defendants. If either Defendant closed their doors and deactivated all computers within their control, users of their products could continue sharing files with little or no interruption. [¶] In contrast, Napster indexed the files contained on each user’s computer, and each and every search request passed through Napster’s servers. Napster provided the “site and facilities” for the alleged infringement, affording it perfect knowledge and complete control over the infringing activity of its users. If Napster deactivated its computers, users would no longer be able to share files through the Napster network. 57

With respect to contributory infringement, the Ninth Circuit held that constructive knowledge of infringement could not be imputed to Grokster or StreamCast because their systems were capable of substantial or commercially significant noninfringing uses. In support, the court cited “numerous declarations by persons who permit their work to be distributed via the software, or who use the software to distribute public domain works.”58 Though it held that constructive knowledge could not be imputed, the Ninth Circuit did not go so far as to hold that “actual knowledge” was therefore required. Instead, the court held that “the copyright owner would be required to show that the defendant had reasonable knowledge of specific infringing files,”59 with the added caveat that such knowledge must have been acquired “at a time at which [defendants] contributed to the infringement, and failed to act upon that information.”60 Contribution to the infringement required, moreover, that Grokster and StreamCast have

54 Grokster, 380 F.3d at 1160. 55 Id. at 1163. 56 Id. 57 Grokster, 259 F. Supp. 2d at 1041 (emphases added; citations omitted). 58 Grokster, 380 F.3d at 1161. “Indeed, the record indicates that thousands of . . . musical groups have authorized free distribution of their music through the internet. In addition to music, the software has been used to share thousands of public domain literary works . . . as well as historic public domain films[.]” Id. 59 Id. 60 Id. at 1162 (alterations and internal quotations omitted).

Page 12

provided the “site and facilities” for infringement or materially contributed in some other way.61 The court held they had not. “Infringing messages or file indices do not reside on defendants’ computers, nor do defendants have the ability to suspend user accounts,” and the recording industry did not provide “evidence that defendants materially contribute in any other manner.”62 The court noted that while StreamCast “maintains an XML file from which user software periodically retrieves parameters,” such as “addresses of websites [containing] lists of active users,” and while “[t]he owner of the FastTrack software [licensed by Grokster], Sharman, maintains root nodes containing lists of currently active supernodes to which users can connect,” these activities were “too incidental to any direct copyright infringement to constitute material contribution.”63 Therefore, Grokster and StreamCast could not be held liable for contributory infringement.

With respect to vicarious infringement, although Grokster and StreamCast benefited financially from advertising revenue, the Ninth Circuit again held that because they lacked the right and ability to supervise the infringing conduct of end users, no vicarious infringement could be found. In contrast to the control Napster exerted through its “integrated service,” “Grokster and StreamCast are more truly decentralized, peer-to-peer file-sharing networks.”64 The Grokster network was based on the FastTrack technology licensed from and controlled by a separate entity, Sharman. Similarly, StreamCast’s technology was based on the Gnutella platform, which is open-source and outside the control of any single entity.65 In the words of the court:

It does not appear from any of the evidence in the record that either of the defendants has the ability to block access to individual users. Grokster nominally reserves the right to terminate access, while StreamCast does not maintain a licensing agreement with persons who download Morpheus. However, given the lack of a registration and log-in process, even Grokster has no ability to actually terminate access to filesharing functions, absent a mandatory software upgrade to all users that the particular user

61 Id. at 1163. 62 Id. at 1163, 1164. 63 Id. at 1164. The district court described the supernode system in more detail: One of the central features distinguishing FastTrack-based software from other peer-to-peer technology is the dynamic, or variable use of “supernodes.” A “node” is an end-point on the Internet, typically a user’s computer. A “supernode” is a node that has a heightened function, accumulating information from numerous other nodes. An individual node using FastTrack-based software automatically self-selects its own supernode status; a user’s node may be a supernode one day and not on the following day, depending on resource needs and availability of the network . . . . It is unclear whether or to what extent entities other than Grokster can control this process or other aspects of the FastTrack network, but there is no evidence—and Plaintiffs do not argue—that Defendants have any such role. Grokster, 259 F. Supp. 2d at 1040 & n.5 (citations omitted). 64 Grokster, 380 F.3d at 1165. 65 Id. at 1159.

Page 13

refuses, or IP address-blocking attempts. It is also clear that none of the communication between defendants and users provides a point of access for filtering or searching for infringing files, since infringing material and index information do not pass through defendants’ computers.66

Thus, what the Ninth Circuit viewed as a lack of control by Grokster and StreamCast over users of their P2P networks was the most significant factor for the court in rejecting the imposition of both contributory and vicarious liability.

B. Aimster

In Aimster, the Seventh Circuit affirmed a preliminary injunction which effectively shut down a P2P provider in a case brought by various record companies, songwriters and music publishers.67 Aimster was a P2P service that used AOL’s Instant Messenger service (“IM”) to allow members to exchange files and messages, but “greatly expand[ed] the file transferring capability of AOL IM . . . by designating every Aimster user as the ‘buddy’ of every other Aimster user. In this way, every Aimster user [had] the ability to search for and download files contained on the hard drives of any other Aimster user (provided that the user [had] previously designated those files to be available for searching).”68 Aimster users could also identify “buddies” who had interests in the same subject matter. Aimster also provided a service called “Club Aimster”—“a repackaged version of the basic Aimster service that greatly enhance[d] the ability of its members to locate and download copyrighted music” for a monthly fee. Using a unique member name and password, and paying the monthly fee to Aimster, users could download 40 “hot new releases”—virtually all of which were copyrighted and owned by the plaintiffs. Moreover, a tutorial explained how to use the Aimster software and provided “as its only examples of file sharing the sharing of copyrighted music, including copyrighted music that the recording industry had notified Aimster was being infringed by Aimster’s users.”69

In upholding the preliminary injunction, the Seventh Circuit held that while there was the possibility of substantial noninfringing uses of Aimster, in the face of evidence put forth by the recording industry that the vast majority of files exchanged between Aimster users were infringing, the burden of proof shifted to Aimster, which Aimster failed to meet by not “produc[ing] any evidence that its service has ever been used for a noninfringing use, let alone evidence concerning the frequency of such uses.”70 Writing for the court, Judge Posner employed a balancing test for contributory infringement: “when a supplier is offering a product or service that has noninfringing as well as infringing uses, some estimate

66 Id. at 1165. 67 In re Aimster Copyright Litigation, 252 F. Supp. 2d 634 (N.D. Ill. 2002), aff’d, 334 F.3d 643 (7th Cir. 2003), cert. denied, 124 S. Ct. 1069 (2004) (“Aimster”). 68 Aimster, 334 F.3d at 642. 69 Id. at 651. 70 Id. at 652, 653.

Page 14

of the respective magnitudes of these uses is necessary for a finding of contributory infringement.”71 Based on the evidence introduced by the recording industry and Aimster’s failure to produce any credible evidence to the contrary, Aimster fell on the wrong side of this balance.

In contrast to the Ninth Circuit’s discussion in Napster and Grokster concerning the degree of control exerted by the defendants over their respective networks, the Seventh Circuit made hardly any mention of the control exerted by Aimster over its own network. There was good reason for this omission. In the district court, Aimster had attempted to distance itself from Napster by arguing that it did not maintain a central index of files available on its system, which the recording industry vigorously disputed. However, no evidentiary hearing was ever held on the matter because the proprietors of Aimster filed for bankruptcy protection and a hearing was precluded by an order of the bankruptcy court.

Although evidence of Aimster’s control remained undeveloped, the evidentiary development of other facts absent in Grokster proved to be Aimster’s undoing.72 The Seventh Circuit found the material contribution that was lacking in Grokster (and Sony-Betamax) in the form of the “Club Aimster” service and the tutorial that the court called “the invitation to infringement.”73 Whether or not Aimster provided the “site and facilities” for infringement was irrelevant in the face of such damning conduct.

The one aspect of Aimster’s control over its system that was apparent from the record was the presence—like in Napster but unlike in Grokster—of a registration and log-in process for end users of the software, indicating that Aimster could block access to its system by particular users. Although the Seventh Circuit rejected the recording industry’s argument that the substantial noninfringing use defense set forth in Sony-Betamax was inapplicable to services such as Aimster, it agreed with the industry that “the ability of a service provider to prevent its customers from infringing is a factor to be considered in determining whether the provider is a contributory infringer.”74 However, Aimster’s degree of control over individual users and ability to prevent them from infringing copyrights became important for the court only in rejecting Aimster’s argument that it lacked knowledge of infringing activity because of encryption built into the software. Although encryption technology within the Aimster software assured users of their anonymity, Aimster could not thereby avoid contributory liability by contending it was powerless to control infringing uses. The Seventh Circuit held that Aimster had willfully blinded itself by selectively applying that encryption technology when it was not shown that the

71 Id. at 649. 72 The district court in Aimster noted that its reasoning “would hold regardless of whether or not Aimster maintains a central database of files available for transfer.” Aimster, 252 F. Supp. 2d at 641 n.6. 73 Aimster, 334 F.3d at 651-52. 74 Id. at 648.

Page 15

technology added value to the service or saved Aimster significant cost.75 Aimster’s resulting inability to produce evidence of noninfringing uses was, therefore, a “self-inflicted wound.”76

C. A Conflict?

Although Grokster and StreamCast’s apparent technological decentralization was undoubtedly the most important factor contributing to their victory in the Ninth Circuit, that court left open the possibility that other factors could have been more important given other circumstances. Even though Grokster and StreamCast had not provided the “site and facilities” for infringement, they still could have been held liable had they “otherwise materially contribute[d] to direct infringement.”77 The Ninth Circuit did not suggest what other factors might constitute material contribution, and the recording industry pointed to none, as they could in Aimster (such as the “Club Aimster” service and Aimster’s tutorial).

Interestingly, in affirming summary judgment in favor of Grokster and Streamcast, the Ninth Circuit noted in passing a potential conflict with the Seventh Circuit in its interpretation of the “substantial noninfringing use” standard.78 Indeed, the courts had reached different conclusions with respect to two seemingly similar P2P systems: Grokster and Streamcast were absolved from liability because their services were capable of substantial noninfringing uses (and they did not otherwise materially contribute to infringement), but Aimster was enjoined from proceeding because although its service may have been capable of substantial noninfringing uses, the defendants failed to put forth evidence that it in fact was used in substantial noninfringing ways. The Ninth Circuit characterized the difference as a legal one: “Aimster is premised specifically on a fundamental disagreement with [Napster’s] reading of Sony-Betamax”79 and “determined that an important additional factor is how ‘probable’ the noninfringing uses of a product are.”80 In other words, the Ninth Circuit read Sony- Betamax to preclude finding that a P2P provider has constructive knowledge of infringement by its users where it demonstrates its system is capable of substantial current and future nonfringing uses.81 The Ninth Circuit characterized Aimster’s reading of Sony-Betamax to impose the additional requirement

75 Id. at 650-51, 653-54. 76 Id. at 654. The Seventh Circuit did not decide the likelihood of Aimster’s liability for vicarious infringement, noting that the issue was “academic” because Aimster’s “ostrich-like refusal to discover the extent to which its system was being used to infringe copyright is merely another piece of evidence that it was a contributory infringer.” Id. at 655. However, the Seventh Circuit did note that it was “less confident than the district judge was that the recording industry would prevail on the issue of vicarious infringement should the case be tried.” Id. at 654. 77 Grokster, 380 F.3d at 1163. See also id. at 1164 (“The Copyright Owners have not provided evidence that defendants materially contribute in any other manner.”). 78 Id. at 1162 n.9 79 Id. 80 Id. 81 Napster, 239 F.3d at 1020-21.

Page 16

that such uses must be shown to be probable before precluding the imposition of constructive knowledge.82 But does requiring a showing that a system is capable of substantial current and future noninfringing uses not inherently require a showing that those uses are probable? Put differently, could substantial nonfringing current and future uses be shown, yet also be improbable?

It is not clear that the “important additional factor” that the Ninth Circuit claimed Aimster imposed was really that—an additional factor at all—or that it was anything different from what the Ninth Circuit in Grokster implicitly took into account. In determining whether Aimster was capable of substantial noninfringing uses, the Seventh Circuit had the occasion to question how “probable” were the purported uses of the service because the only evidence submitted by the defendants was a declaration by Aimster’s founder containing a list of potential noninfringing uses of the software, but “no evidence whatsoever . . . that Aimster is actually used for any of the stated noninfringing purposes.”83 In contrast, the Grokster defendants “submitted numerous declarations by persons who permit their work to be distributed via the software, or who use the software to distribute public domain works”84—i.e., actual evidence (not just a probability) of substantial noninfringing use. The court in Grokster might have reached a different result had there been no actual evidence submitted of current, noninfringing uses.

Indeed, both courts relied on Sony-Betamax to reach different results. In concluding that the Betamax VCR was capable of substantial noninfringing uses, the Supreme Court in Sony-Betamax relied on actual evidence of the product’s noninfringing uses, such as recording a copyrighted program without objection from the copyright owners or for later viewing at home. The Court pointed to evidence that included the “considerable testimony” of copyright owners who did not object to the practice of consumers who recorded their programming for private home use, and noted this “was sufficient to establish a significant quantity of broadcasting whose copying is now authorized, and a significant potential for future authorized copying.”85 The Court also relied on evidence that unauthorized but noncommercial home recording caused no actual harm to the copyright owners and no demonstrated likelihood of future harm.86 While it mentioned that a product “need merely be capable of substantial noninfringing uses” for its manufacturer to avoid contributory infringement, the Court did not purport to rest its decision simply on the theoretical capabilities of VCRs without examining actual evidence of

82 Grokster, 380 F.3d at 1162 n.9. 83 Aimster, 334 F.3d at 653 (quoting district court opinion; emphasis in original). 84 Grokster, 380 F.3d at 1161. 85 Sony-Betamax, 464 U.S. at 444. 86 See id. at 447-54.

Page 17

current as well as potential future uses, among other factors. Such other factors included, incidentally, the fact that Sony apparently did not encourage through advertising any infringing uses of its VCRs.87

Moreover, both Grokster and Aimster support the notion that the liability of P2P providers for contributory infringement depends upon the balancing of factors that Sony-Betamax considered. Is there an “ongoing relationship between the direct infringer and the contributory infringer at the time the infringing conduct occurred”?88 Can the P2P provider stop infringing uses of its software? What is the absolute number and proportion of the software’s consumers who use the software in noninfringing ways? What is the likelihood that future consumers will use the software in noninfringing ways? Does the P2P provider encourage illegal copying and distribution by consumers? Because the answers to these questions depend upon intensely factual determinations, the differing results in Grokster and Aimster may not be surprising. Generalizations about what features, factually, a P2P system must have in order to be held liable for contributory infringement can therefore be difficult as well as misleading. Undoubtedly the future of the Kazaa P2P service—the remaining defendant in the district court in Grokster—will turn on the particulars of its software and behavior.89

While the divergent conclusions reached in Grokster and Aimster might have resulted merely from differing facts and procedural postures, the court in Aimster did diverge in legal principle from Grokster by suggesting that to avoid contributory infringement P2P providers could be obligated to modify their software if infringing uses were substantial: “Even where there are noninfringing uses of an Internet file-sharing service, moreover, if the infringing uses are substantial then to avoid liability as a contributory infringer the provider of the service must show that it would have been disproportionately costly for him to eliminate or at least reduce substantially the infringing uses.”90 In Grokster the recording industry presented evidence that the vast majority of consumers who used the defendants’ software were infringing copyrights. This evidence, according to the reasoning of the Aimster court, should have shifted to the defendants the burden of showing that “it would have been disproportionately costly for [them] to eliminate or at least reduce substantially the infringing uses.” The Grokster court imposed no such burden on the defendants.

87 Id. at 438. 88 Id. at 437-38. 89 As might be expected, the plaintiffs in Grokster allege that Kazaa/Sharman indeed retains control over its service, with its central servers registering, identifying and logging-in users, then connecting them to supernodes. The various complaints also detail other alleged control-related activities, such as Kazaa monitoring transactions and controlling the entire system through encryption. MGM Complaint at ¶ 46. The plaintiffs have, at times, further alleged that Kazaa’s servers actually create a connection between the user who selects an unlawful file for copying and the user who offers the unlawful file for copying, making the entire infringing transaction possible. Lieber Complaint at ¶ 37. 90 Aimster, 334 F.3d at 653.

Page 18

The Ninth Circuit accepted the fact that Grokster and StreamCast’s architecture and software design did not enable the P2P providers to supervise their users, and seemed untroubled by the fact that the systems were deliberately engineered in such a way as to avoid control over their networks. After all, “the software design is of great import.”91 That software design included no central servers and no log-in or registration process, such that the networks would continue functioning without Grokster or StreamCast’s further participation. While a software upgrade could have been, as a technical matter, pushed down to end users to change this, the Ninth Circuit observed: “‘Failure’ to alter software located on another’s computer is simply not akin to the failure to delete a filename from one’s own computer, to the failure to cancel the registration name and password of a particular user from one’s user list, or to the failure to make modifications to software on one’s own computer.”92 With respect to software design or architecture, the Ninth Circuit simply does not require that any affirmative steps be taken by a P2P provider to avoid liability. Accordingly, the court concluded, the Grokster defendants did not materially contribute to their users’ infringement.

In contrast, the Seventh Circuit did not simply accept Aimster’s architecture and software design. Although, as noted above, no evidence was presented with respect to the control Aimster’s software allowed the company over individual files and file indices, Aimster argued that it had no knowledge of infringement because of encryption technology that was built into its software. In rejecting this argument, the Seventh Circuit concluded that even if there were noninfringing uses of Aimster’s software, in the face of substantial infringing uses Aimster failed to meet its burden that it would have been disproportionately costly to eliminate or substantially reduce the infringing uses by “failing to present evidence that the provision of an encryption capability effective against the service provider itself added important value to the service or saved significant cost.”93

In the end, liability for contributory and vicarious copyright infringement by P2P file-networks may largely depend upon the distinction between products and services that the Supreme Court articulated in Sony-Betamax. The VCR was a product that could be used in a variety of legitimate ways without requiring or, more to the point, enabling Sony’s continued contact with customers once sold. In contrast, Napster’s software required ongoing service and customer contact. Somewhere between those two ends of the continuum fall Aimster, Grokster and StreamCast, whose systems clearly do not require ongoing customer contact but could be designed or used to facilitate supervision for supervision’s sake. Whether such systems can avail themselves of the Sony-Betamax “substantial noninfringing use” defense remains to be seen.

91 Grokster, 380 F.3d at 1163 92 Id. at 1163-64. 93 Aimster, 334. F3d at 653 (emphasis in original).

Page 19

The Grokster plaintiffs have petitioned the Supreme Court for review, urging it “to resolve the conflict between the Ninth and Seventh Circuits” and “to clarify the standards for secondary liability applicable to Internet-based services that facilitate copyright infringement.”94 The plaintiffs’ petition has been joined by the amicus briefs of forty state attorney general offices, among others.95 Indeed, the case may provide a unique opportunity for the Court to clarify the reach of its two-decades-old Sony-Betamax “substantial noninfringing use” defense for P2P providers. In their opposition to the plaintiffs’ petition, Grokster and StreamCast contend that Congress is better suited to and already in the process of determining secondary liability rules for digital technologies, and that no circuit split is presented by the case.96 Whether or not the Supreme Court grants review, the entertainment industry has already begun its war on other fronts, discussed below.

V. THE NEWEST CHAPTERS IN P2P SUITS

A. Individual Users of P2P services

Lawsuits over copyright infringement of P2P systems have not been limited to the gatekeepers of such file-sharing. Notwithstanding prevailing wisdom and the court’s recognition in Aimster that lawsuits against direct infringers can be impractical and futile,97 the music industry has sued individuals for their uses of file-sharing services.

The RIAA first announced in June 2003 that it would be launching a major offensive against individual offenders.98 Notwithstanding what users might have believed, the RIAA could and did locate and identify the online music collections of individual users. As a prelude to its actions against individuals, the RIAA subpoenaed99 Verizon, a major Internet service provider, demanding that it provide the names of subscribers whose Internet addresses the recording industry had identified as rampant copiers and distributors of copyrighted music.100 Verizon resisted the subpoena but in the end was forced to provide the names to the RIAA. Indeed, the RIAA won approval for more than 1,300

94 Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., Petition for a Writ of Certiorari at 2 (Oct. 8, 2004). 95 John Borland, States, Artists Urge Top Court to Hear P2P Case (Nov. 8, 2004), at http://news.com.com/2102- 1027_3-5443812.html. 96 Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., Brief in Opposition at 15-16 (Nov. 8, 2004). 97 Aimster, 334. F3d at 645. The court noted that “chasing individual consumers is time consuming and is a teaspoon solution to an ocean problem.” Id. (quoting Randal C. Picker, Copyright as Entry Policy: The Case of Digital Distribution, 47 Antitrust Bull. 423, 442 (2002)). 98 Recording Industry to Begin Collecting Evidence and Preparing Lawsuits Against File “Sharers” Who Illegally Offer Music Online, RIAA press release (June 25, 2003), at http://www.riaa.com/news/newsletter/062503.asp. 99 The subpoena power was granted per the DMCA, 17 U.S.C. § 512(h). 100 In re Verizon Internet Services, Inc., 257 F. Supp. 2d 244 (D.D.C. 2003).

Page 20

subpoenas compelling Internet service providers to identify computer users suspected of illegally sharing music files on the Internet.101

On September 9, 2003, armed with the names it had subpoenaed, the RIAA proceeded to file 261 federal lawsuits in courts across the country, targeting those it claimed had distributed an average of more than 1,000 copyrighted music files each and warning that thousands more such suits would follow. The suits targeted a grandfather in Texas, whose grandchildren had downloaded music on his home computer during visits, a Yale University professor, a 12-year-old honor student living in a housing project, and assorted other individuals from New York to Boston to San Francisco.102 The RIAA also announced an amnesty program aimed at forcing admissions of liability from users in return for a promise not to sue. With its most recent campaign, as the total number of defendants has risen to over 6,000, the RIAA promises to expose more and more people to copyright liability in the digital age.

But the RIAA is not the only entertainment trade organization flexing its muscle. The MPAA recently announced that it is launching a flurry of lawsuits against individuals who offer copyrighted movies on file-sharing networks.103 Joining the effort are at least five of the MPAA’s seven large movie studio members. While movie-swapping is not nearly as widespread as music-swapping, largely due to still-limited broadband access, the movie studios have undoubtedly taken a cue from the recent victories for Grokster and StreamCast and the record industry’s years-long reluctance in suing individual infringers, perhaps in the hope that a preemptive strike will deter would-be movie pirates. Whether such lawsuits make a meaningful dent in illegal file-sharing of music as well as film remains to be seen.

B. Investors in P2P Companies

In addition to P2P providers and individual file swappers, recent suits have also targeted the financial backers of P2P services, hoping to sever their financial pipelines. In April 2003, two record labels filed suit for contributory and vicarious infringement against Hummer Winblad Venture Partners (HW) and two of its partners over HW’s $13.5 million investment in Napster.104 Relying on the favorable outcome in Napster, the plaintiffs allege that the investors controlled Napster during that period of time when the Napster system enabled billions of acts of infringement and that they knew copyrighted works were being illegally copied and distributed through the Napster system when it made its decision to

101 The RIAA’s tactics raised concerns among many, including the chairman of the Senate Governmental Affairs’ Permanent Subcommittee on Investigations, who called for hearings on the industry’s use of copyright subpoenas to track downloaders. Associated Press, Revealed: How RIAA Tracks Downloaders (Aug. 28, 2003). 102 See Associated Press, Elderly Man, Schoolgirl, Professor Among File-Swapping Defendants (Sept 9, 2003), available at http://www.usatoday.com/tech/news/techpolicy/2003-09-09-riaa-defendants_x.htm. 103 Jon Healey & Lorenza Munoz, “MPAA Plans Suits to Stop Film Piracy,” Los Angeles Times, Nov. 4, 2004, at C1, C10. 104 UMG Recordings, Inc. v. Hummer Winblad Venture Partners, No. C-04-1166 MHP (N.D. Cal.); see Stefanie Olsen, Record Labels Sue Napster Investor (Apr. 22, 2003), at http://news.com.com/2100-1027-997860.html.

Page 21

invest in Napster.105 The suit further asserts that the defendants knowingly and materially contributed to the infringement, controlling Napster in the period after the investment and thus facilitated the infringing acts.106 In the claim for vicarious infringement, the plaintiffs allege that the defendants had a direct financial interest in the infringing conduct and the right and ability to supervise and/or control that conduct.107 They allege that the defendants could have shut down the site and facilities, prevented Napster users from gaining access to the Napster servers or terminated the index feature with links to infringing music files.108 In July 2004, the district court denied pretrial motions filed by the defendants to dismiss the cases, noting that they mischaracterized plaintiffs’ complaints as alleging “tertiary infringement”—a questionable theory on which to pin liability.109 “Rather than alleging that defendants merely supplied Napster with necessary funding . . . or accusing defendants of contributory and vicarious infringement in conclusory fashion[,] plaintiffs have specifically accused defendants of assuming control over Napster’s operations and directing the infringing activities that gave rise to the original Napster litigation.”110 The court cautioned that the plaintiffs’ allegations “may be wholly unfounded” but were more than sufficient at the pleading stage to state claims of secondary liability for infringement.111 It expressly reserved the question of how much control was sufficient to state a claim.

If the case ever goes to trial and the defendants lose on the merits, the ramifications could be huge. Venture capital firms and other investors could be held secondarily liable for infringement, although presumably the court would establish guidelines requiring a high degree of control over their clients before the imposition of liability. Thorough intellectual property due diligence would also become more important. Disclosures to co-investors, venture capital fund investors, lenders, and the panoply of other financially-interested parties could become extensive and spun to support the merits of the plaintiffs’ contentions. And a victory for the plaintiffs would undoubtedly encourage more lawsuits and widen the search for more deep-pocket defendants, but discourage investment in the advancement of technology.

105 UMG Recordings, Inc. v. Hummer Winblad Venture Partners, Complaint for Contributory Copyright Infringement, Vicarious Infringement of Copyrights, Violation of California Civil Code Section 980 and Misappropriation, Statutory and Common Law Unfair Competition, and Conspiracy, CV-03-2785 (C.D. Cal.) at ¶ 38. 106 Id. at ¶ 46-47. 107 Id. at ¶ 54. 108 Id. 109 Memorandum & Order Re: Defendants’ Motion to Dismiss, No. C-04-1351 MHP, at 7 (N.D. Cal. July 14, 2004). 110 Id. 111 Id. at 9.

Page 22

C. The Future of P2P

Emerging P2P providers continue to learn from the hits and misses of their ancestors, innovating away from liability while continuing to cater to their user base.112 Aware that users might be frightened off by the risk of their own legal exposures, the P2Ps have already begun focusing more and more on new tools designed to shield the end user, including encryption. Freenet, an open-source project, was created to address information privacy concerns.113 Where Napster was a file-sharing service, Freenet has been characterized as a file-storage service that pushes information to other computers (nodes) for storage.114 A node does not necessarily know what files have been pushed into it since the data is encrypted. Messages in this system do not travel directly from sender to recipient, but rather wend their way through a number of nodes. Each node only knows the next node in the chain (either before or after) and does not know if its neighboring node was the originator or final recipient of the message or just one link in the chain.115 Users insert a file into the Freenet by creating a “key” (somewhat akin to a filename) and making the file available on their node. As other users request the file, it is copied onto additional nodes, distributing it across Freenet.116 Not only does Freenet’s existence as an open-source tool eliminate a central facet indicative of control, but the encryption and communication systems make it difficult for plaintiffs to monitor and document the wide-scale copyright infringement of individuals.117 In fact, not only is it difficult to identify end users who may have reproduced copyrighted material, but the fact that any given user is unaware of the information cached on his node complicates the issue of distribution of copyrighted works. Napster users knew what files they were sharing; Freenet users only know that they have made space available for shared files, but due to encryption, not what those files contain.

However, if federal circuit courts follow Aimster’s lead, or if the Supreme Court grants review in the Grokster case, commercial P2P services may not be able to shield themselves through such encryption, although end users may enjoy some protection to the extent encryption makes it more

112 From a technological standpoint, Kazaa’s supernode system is actually an advance over the Gnutella process in which a request for a file goes to every user on the system. Newer tools enhance this capability even further by creating temporary indexing responsibility for specific file categories at the level of individual computers (eDonkey), and splitting files into smaller pieces that can be distributed independently and more quickly (eDonkey and BitTorrent). The IP addresses of the information downloaders are exposed on both eDonkey and BitTorrent, which would allow antipiracy enforcers to track down these users. See John Borland, File Swapping Shifts Up a Gear (May 27, 2003), at http://zdnet.com.com/2100-1104-1009742.html. 113 See Ian Clarke et al., Protecting Free Expression Online with Freenet, IEEE Internet Computing, 6(1) (Jan./Feb. 2002) at 40, available at http://freenetproject.org/papers/freenet-ieee.pdf. 114 Id. at 42. 115 Id. at 43. 116 Ryan Roemer, The Digital Evolution: Freenet and the Future of Copyright on the Internet, 2002 UCLA J.L. & Tech. 5, at 3 (2002), available at http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php. 117 Id. at 8.

Page 23

difficult to track illicit uses. Undoubtedly the variety of architectural permutations P2P providers will employ in their software will continue to challenge secondary liability in copyright law.

VII. Conclusion

With each new court decision, P2P services have come away with a kernel of knowledge on how to adapt to their copyright environment, hoping to improve their chances of survival. Although P2P providers may continue to reap short-term benefits, their long-term survival remains in doubt. Even if P2P entities are completely vindicated, the P2P industry might still be weakened if users are frightened away on a large scale by the RIAA and MPAA’s direct infringement actions.

The relative success of services like iTunes,118 Rhapsody,119 and Movielink120 suggest that, at the right price points, legal music and movie subscription services are economically viable. Just as the Sony- Betamax case presaged a very profitable video and DVD industry at the time the movie studios thought that VCRs would completely undermine their business, online music and movie distribution could conceivably become more lucrative than capital- and labor-intensive distribution of tangible recordings.

Perhaps cooperation between the recording and movie industries on the one hand, and their once arch rival P2P networks on the other, is inevitable. Indeed, Bertelsmann had surprised industry observers by investing in Napster in 2000. In late 2003, Sony and Bertelsmann agreed to merge their respective recorded music businesses into Sony BMG. Although Sony’s music division was a plaintiff in the Grokster case prior to the Sony-Bertelsmann venture, Sony BMG recently announced that it is cooperating with Grokster in a venture to combine free music sampling with paid downloads.121 Details remain sketchy at the time of this writing, but Sony’s move may signal a capitulation by the recording industry in its legal attack on P2P services—or at least slow its momentum. What results from the cooperation between Sony BMG and Grokster, and whether other record companies will follow suit individually or in manner that pools their catalogues, remains to be seen. Making your enemies your friends—at least those to whom you have lost—may be the entertainment industry’s new tagline.

118 See www.apple.com/itunes. 119 See www.listen.com. 120 See www.movielink.com. 121 Jon Healey, “Sony BMG, Grokster Join Forces,” Los Angeles Times, at C1 (Oct. 29, 2004).