United States Court of Appeals for the Ninth Circuit

Total Page:16

File Type:pdf, Size:1020Kb

United States Court of Appeals for the Ninth Circuit Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 1 of 114 Docket No. 10-55946 In the United States Court of Appeals for the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson PETITION FOR PANEL REHEARING AND REHEARING EN BANC BY APPELLANTS GARY FUNG AND ISOHUNT WEB TECHNOLOGIES, INC. IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 2 of 114 TABLE OF CONTENTS page Index of Authorities ..….....….....….....….....….....….....….....….....…....…... ii I. The Panel Decision Applies Erroneous Legal Standards to Find ..…... 1 Fung Liable on Disputed Facts and to Deny Him a Trial by Jury II. The Panel Decision and the District Court Opinion Combine to ……... 5 Punish Speech that Should Be Protected by the First Amendment III. The Panel Decision Expands the Grokster Rule in Multiple Ways ….. 7 that Threaten the Future of Technological Innovation A. The “Technological Background” set forth in the Panel ………. 8 Decision ignores the “collective BitTorrent ecosystem” and erroneously identifies BitTorrent with systems in Grokster B. The Panel Decision erroneously expands the Grokster rule …... 10 from applying to a distributor of a device to applying as a matter of law to any provider of data or online services C. The Panel Decision erroneously adopts a “loose causation …… 11 theory” that defers actual findings of fact for later proceedings D. The Panel Decision’s procedure of selective matching ………... 13 between cases is narrow and arbitrary and improperly excludes personal testimony IV. Dismissal of DMCA Defenses through Device Definitions and ……... 14 Because of “Knowledge of a Broad Range of Infringing Activity” Clashes with Legal Standards Based on Trial by Jury Conclusion ………………………………………………...………………... 15 Certificate of Compliance …………………………………………………… 16 Exhibit A: Panel Decision (Columbia Pictures Industries, Inc. v. Fung), decided 3/21/2013 Exhibit B: District Court Opinion (Columbia Pictures Industries, Inc. v. Fung), decided 12/21/2009 Certificate of Service i Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 3 of 114 INDEX OF AUTHORITIES CASES Anderson v. Liberty Lobby, Inc., 477 U.S. 242 (1986) ..................................... 1, 3, 4 Boim v. Holy Land Fdn,, 549 F.3d 685 (7th Cir. 2008), cert. den. sub nom Boim v. Salah, 130 S.Ct. 458 (2009) ..................................................... 12 Desrosiers v. Flight Int'l, 156 F.3d 952 (1998) ....................................................... 11 Feltner v. Columbia Pictures Television, Inc., 523 U.S. 340 (1998) ........................ 5 Hendrickson v. eBay, Inc., 165 F. Supp. 2d 1082 (C.D. Cal. 2001) ........................ 15 Holmes v. SIPC., 503 U.S. 258 (1992) .................................................................... 12 Humanitarian Law Project v. Mukasey, 552 F.3d 916 (9th Cir. Cal., 2009), aff’d & rev’d in parts sub. nom. Holder v. Humanitarian Law Project, 130 S. Ct. 2705 (2010). ............................................................................ 7 McCoy v. Stewart, 282 F.3d 626 (9th Cir. 2002) cert. den. 537 U.S. 993 (2002) ..... 6 MGM Studios, Inc. v. Grokster, 545 U.S. 913 (2005) ..................................... passim MGM v. Grokster, 380 F. 3d 1154 (9th Cir. 2004) ..................................................... 4 Oviatt v. Pearce, 954 F.2d 1470 (1992) .................................................................. 11 Perfect 10, Inc. v. Amazon.com, Inc., 508 F.3d 1146 (9th Cir. 2007) ..................... 10 Perfect 10, Inc. v. CCBill, 488 F. 3d 1102 (9th Cir. 2007) ................................ 10, 14 Perfect 10, Inc. v. Visa Int’l Serv. Ass’n, 494 F.3d 788 (9th Cir. 2007) .................. 10 Provenz v. Miller, 102 F. 3d 1478 (9th Cir. 1996) ..................................................... 4 TW Elec. Serv. v. Pac. Elec. Contr’s Ass’n, 809 F. 2d 626 (9th Cir. 1987) ............... 2 UMG Recordings v. Shelter Capital Partners, (9th Cir. 3/14/2013) ................ 12, 15 Viacom Int’l, Inc. v. YouTube, Inc., 676 F.3d 19 (2d Cir. 2012) ....................... 14-15 CONSTITUTION OF THE UNITED STATES First Amendment .................................................................................................... 5-7 Seventh Amendment .................................................................................................. 5 ii Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 4 of 114 STATUTES, COURT RULES AND APPROVED INSTRUCTIONS 17 U.S.C. § 512(a) ................................................................................................... 14 Digital Millennium Copyright Act (“DMCA”) ........................................... 1, 3-4, 14 FRAP Rule 35 ............................................................................................................ 1 FRAP Rule 40 ............................................................................................................ 1 Ninth Circuit Model Jury Instructions 17.20, 17.21 and 17.18 ............................... 15 iii Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 5 of 114 Pursuant to FRAP Rules 35 and 40, Defendants-Appellants Gary Fung and isoHunt Web Technologies ("Fung") petition for rehearing or rehearing en banc with respect to the Panel Decision (Ex. A) that was entered on March 21, 2013. This proceeding involves one or more questions of exceptional importance involving the new “Grokster rule” that imposes liability for “inducement of copyright infringement.” MGM Studios v. Grokster, 545 U.S. 913, 919 (2005). The Panel Decision defines technological categories on disputed facts and ignores evidence that entitles Fung to Trial by Jury. It bases liability on a miscellany of online “messages” that lack connections to actual infringements. Free Speech is chilled when sarcastic remarks are held to induce infringement. Expansions of Grokster liability threaten technological innovation, e.g., through creation of a “loose causation standard” that imposes liability without limit as a matter of law. Blanket dismissal of defenses under the Digital Millennium Copyright Act (“DMCA”) requires a novel procedure detached from actual infringements. I. The Panel Decision Applies Erroneous Legal Standards to Find Fung Liable on Disputed Facts and to Deny Him a Trial by Jury. In Anderson v. Liberty Lobby, Inc., 477 U.S. 242, 252 (1986), the Supreme Court stated that, in ruling on a defendant’s motion for summary judgment: the judge must ask himself not whether he thinks the evidence unmistakably favors one side or the other but whether a fair-minded jury could return a verdict for the plaintiff on the evidence presented. Here, in finding Fung liable under Grokster as a matter of law and in 1 Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 6 of 114 affirming summary judgment, the District Court and the Panel Decision hold that evidence unmistakably favors moving parties “Columbia.” Without stating a Legal Standard for affirming such a summary judgment, the Panel Decision concludes: Columbia would still have such overwhelming evidence that any reasonable jury would have to conclude that the vastly predominant use of Fung’s services has been to infringe copyrights. (Ex. A at 26.) Using these Grokster III evidentiary categories and cautions as templates, we conclude that there is more than enough unrebutted evidence in the summary judgment record to prove that Fung offered his services with the object of promoting their use to infringe copyrighted material. No reasonable jury could find otherwise. (Id. at 29.) In sum, we affirm the district court’s holding that Columbia has carried its burden of proving, on the basis of undisputed facts, Fung’s liability for inducing others to infringe Columbia’s copyrights. (Id. at 37.) The Panel Decision disregards the proper Legal Standard, stated, e.g., in TW Elec. Serv. v. Pac. Elec. Contr’s Ass’n, 809 F. 2d 626, 630-631 (9th Cir. 1987): … the judge must view the evidence in the light most favorable to the nonmoving party: if direct evidence produced by the moving party conflicts with direct evidence produced by the nonmoving party, the judge must assume the truth of the evidence set forth by the nonmoving party with respect to that fact. The Panel Decision fails to note Fung’s “direct evidence” that he wants to present to a jury. Similarly, the District Court stated that defendants “offer little of their own evidence that directly addressed Plaintiffs' factual assertions.” (Ex. B at *3.) Fung testified that he dropped out of college in 2003 to start isoHunt; that his 2 Case: 10-55946 04/03/2013 ID: 8576455 DktEntry: 66 Page: 7 of 114 only “business plan” is to succeed by his own efforts; that his systems compete in the “collective BitTorrent ecosystem,”
Recommended publications
  • Iron Man 3 720P Torrent Download Pirate Bay 40
    Iron Man 3 720p Torrent Download Pirate Bay 40 Iron Man 3 720p Torrent Download Pirate Bay 40 1 / 2 Proxy and Mirror sites are 100% the same as original site, so you should be able to ... EZTV has been ranked as one of the best sites to download torrents in the year 2014 by ... The program includes three major improvement projects on the Red. ... You can use a proxy site to bypass any ISP And Access to ThePirateBay.. TorrDroid is a torrent client cum search engine that features a hassle free way of searching and downloading torrents. This torrent app has the option to .... The Dancing Diggers con Telehandler en JCB Puebla parte 3 - Duration: 3:31 ... Iron Man 3 720p Torrent Download Pirate Bay 40 >> Man 3 720p Torrent ... Quatro vidas de um cachorro baixar via torrent · Torrent propellerhead reason 9 · Season 8 ... Scruffy movie torrents tpb · Baixar novela a usurpadora completo torrent ... Download torrent my friend dahmer legendado mp4 · Uk top 40 singles ... de conserto de eletrodomesticos em dvd torrent · Magnet torrent iron man 3 hindi .... Download. Iron Man 3 720p Torrent Download Pirate Bay 40. Movie Summary Torrent Details How to download. Extras: Trailer, . Iron Man 2008 ... iron pyrite iron pyrite, iron pyrite formula, iron pirate franky shogun, iron pyrite meaning, iron pyrite crystal, iron pirate garage, iron pyrite vs gold, iron pyrite price in india, iron pyrite uses, iron pyrite healing properties ﺟﺴﺖ ﻭ ﺟﻮ NAHOM x265 Eng Ita BDRip 2160p HDR K 4 2013 Steel of Man Image ..S04 - Man Dollar Million Six The ..
    [Show full text]
  • How Eliminating Search and Index Functionality Reduces Secondary Liability in Peer-To-Peer File-Sharing Cases Luke M
    CORE Metadata, citation and similar papers at core.ac.uk Provided by UW Law Digital Commons (University of Washington) Washington Journal of Law, Technology & Arts Volume 7 | Issue 1 Article 4 7-1-2011 Off with the Head? How Eliminating Search and Index Functionality Reduces Secondary Liability in Peer-to-Peer File-Sharing Cases Luke M. Rona Follow this and additional works at: https://digitalcommons.law.uw.edu/wjlta Part of the Internet Law Commons Recommended Citation Luke M. Rona, Off with the Head? How Eliminating Search and Index Functionality Reduces Secondary Liability in Peer-to-Peer File-Sharing Cases, 7 Wash. J. L. Tech. & Arts 27 (2011). Available at: https://digitalcommons.law.uw.edu/wjlta/vol7/iss1/4 This Article is brought to you for free and open access by the Law Reviews and Journals at UW Law Digital Commons. It has been accepted for inclusion in Washington Journal of Law, Technology & Arts by an authorized editor of UW Law Digital Commons. For more information, please contact [email protected]. Rona: Off with the Head? How Eliminating Search and Index Functionality WASHINGTON JOURNAL OF LAW, TECHNOLOGY & ARTS VOLUME 7, ISSUE 1 SUMMER 2011 OFF WITH THE HEAD? HOW ELIMINATING SEARCH AND INDEX FUNCTIONALITY REDUCES SECONDARY LIABILITY IN PEER-TO-PEER FILE-SHARING CASES Luke M. Rona* © Luke M. Rona CITE AS: 7 Wash J.L. Tech. & Arts 27 (2011) http://digital.law.washington.edu/dspace-law/handle/1773.1/1050 ABSTRACT Peer-to-peer file-sharing service providers (P2Ps) allow Internet users to exchange electronic content, including music, movies, and other digital works.
    [Show full text]
  • Online Software Piracy of the Last Millennium.Sxw
    Online Software Piracy of the Last Millennium By Ben Garrett aka Ipggi Ever since there has been the ability to store data on a personal computer and commercial software for sale, there has been the existence of pirating. Pirating, cracking and even pirate scenes go all the way back to the late seventies, and maybe even earlier. By the early eighties some machines (such as the BBC Macro in Europe) where so riddled with pirates that the programming companies gave up. They discontinued producing and porting software for the affected computers because there was simply no money to be made. This article has been written with only the PC scene in mind. Table of Contents 1. The IBM PC Scene Beginnings Page 1 2. Bulletin Board Systems And Couriers 2 3. The Death of the Bulletin Board System and the Rise of the Internet 4 4. Software Suppliers 5 5. Text Files 5 6. Scene Art 6 7. The Emergence of Europe 6 8. The Death of the Floppy Disk 6 9. Evolution to the ISO scene 7 10.Bibliography 8 1. The IBM PC Scene Beginnings With the large amount of 8-bit computers around during the early eighties, otherwise known as the Golden Age. And then with the subsequence scenes that followed, most people will agree that the Commodore 64 scene was the greatest at the time. But the Commodore 64 1 wasn't the first computer system to have an organised international pirate scene. It was probably the Apple II users in the very late seventies 2 that can be credited with creating the first remnant of a pirate scene that would be familiar in todays internet warez world.
    [Show full text]
  • From Sony to SOPA: the Technology-Content Divide
    From Sony to SOPA: The Technology-Content Divide The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem, From Sony to SOPA: The Technology-Content Divide, Harvard Law School Case Studies (2013). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11029496 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP http://casestudies.law.harvard.edu By John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem February 23, 2013 From Sony to SOPA: The Technology-Content Divide Background Note Copyright © 2013 Harvard University. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means – electronic, mechanical, photocopying, recording, or otherwise – without permission. "There was a time when lawyers were on one side or the other of the technology content divide. Now, the issues are increasingly less black-and-white and more shades of gray. You have competing issues for which good lawyers provide insights on either side." — Laurence Pulgram, partner, Fenwick & Westi Since the invention of the printing press, there has been tension between copyright holders, who seek control over and monetary gain from their creations, and technology builders, who want to invent without worrying how others might use that invention to infringe copyrights.
    [Show full text]
  • Copyright, Technology & the Boston Strangler
    SEVENTH CIRCUIT REVIEW Volume 1, Issue 1 Spring 2006 COPYRIGHT, TECHNOLOGY & THE BOSTON STRANGLER: THE SEVENTH CIRCUIT AND THE FUTURE OF ONLINE MUSIC ACCESS * JEFFREY J. ESCHER Cite as: Jeffrey J. Escher, Copyright, Technology & The Boston Strangler: The Seventh Circuit and the Future of Online Music Access, 1 SEVENTH CIRCUIT REV. 74 (2006), at http://www.kentlaw.edu/7cr/v1-1/escher.pdf. INTRODUCTION Recent technological advancements in media have spurned unprecedented growth in the ever-changing industries of music, television and motion pictures. Over 22 million Americans ages 18— 39 own portable MP3 players or iPods®.1 In fact, 19% of all Americans under the age of 30 own these relatively new devices.2 Millions of Americans watch digitally recorded television programs or movies thanks to “On-Demand” services such as TiVo®, Digital Video Recorders or VHS tapes.3 In fact, countless numbers of people have recorded their favorite movie or television program on a VHS or * J.D. candidate, May 2006, Chicago-Kent College of Law, Illinois Institute of Technology. 1 Lee Rainie, PIP Comments: iPods and MPS Players Storm the Market, PEW INTERNET AND AMERICAN LIFE PROJECT, February 14, 2005, http://www.pewinternet.org/PPF/p/1047/pipcomments.asp (last visited April 15, 2006). 2Id. 3 BILL ROSE & JOE LENSKI, ARBITRON/EDISON MEDIA RESEARCH, INTERNET AND MULTIMEDIA 2005: THE ON-DEMAND MEDIA CONSUMER (2005), available at http://www.edisonresearch.com/home/archives/Internet%202005%20Summary%20 Final.pdf (last visited June 25, 2006). 74 SEVENTH CIRCUIT REVIEW Volume 1, Issue 1 Spring 2006 Betamax video tape daily since the United States Supreme Court’s landmark decision in Sony Corp.
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • An Exploration of Social Practices and Ad Hoc Labeling Standards in Online Movie Piracy
    A Service of Leibniz-Informationszentrum econstor Wirtschaft Leibniz Information Centre Make Your Publications Visible. zbw for Economics Tietzmann, Roberto; Gross Furini, Liana Article Sharing without laws: an exploration of social practices and ad hoc labeling standards in online movie piracy Internet Policy Review Provided in Cooperation with: Alexander von Humboldt Institute for Internet and Society (HIIG), Berlin Suggested Citation: Tietzmann, Roberto; Gross Furini, Liana (2016) : Sharing without laws: an exploration of social practices and ad hoc labeling standards in online movie piracy, Internet Policy Review, ISSN 2197-6775, Alexander von Humboldt Institute for Internet and Society, Berlin, Vol. 5, Iss. 2, pp. 1-15, http://dx.doi.org/10.14763/2016.2.416 This Version is available at: http://hdl.handle.net/10419/214015 Standard-Nutzungsbedingungen: Terms of use: Die Dokumente auf EconStor dürfen zu eigenen wissenschaftlichen Documents in EconStor may be saved and copied for your Zwecken und zum Privatgebrauch gespeichert und kopiert werden. personal and scholarly purposes. Sie dürfen die Dokumente nicht für öffentliche oder kommerzielle You are not to copy documents for public or commercial Zwecke vervielfältigen, öffentlich ausstellen, öffentlich zugänglich purposes, to exhibit the documents publicly, to make them machen, vertreiben oder anderweitig nutzen. publicly available on the internet, or to distribute or otherwise use the documents in public. Sofern die Verfasser die Dokumente unter Open-Content-Lizenzen (insbesondere CC-Lizenzen) zur Verfügung gestellt haben sollten, If the documents have been made available under an Open gelten abweichend von diesen Nutzungsbedingungen die in der dort Content Licence (especially Creative Commons Licences), you genannten Lizenz gewährten Nutzungsrechte.
    [Show full text]
  • Rambo 2 Torrent
    Rambo 2 torrent Continue Click to download: rambo-first.blood.part.ii 1985 dvdrip-axxo torrent Download the songs of the computer memory card , always 0.8 u/horton-hears-a-who-r5-line-xvid-inqontrol-avi-2.php.ru/warlock-3-el-fin-de-la-inocencia-dvdripspanishww-portorrent-com-9.php.ru/the-twilight-saga-dawn-part-1-2011 ts-xvid-v2-readnfo-mistere-27.php 0.7 u/alice-in-wonderland-2010-dvdrip-axxo-54 .php First Blood Part II 1985 DVDrip Eng H 264 AAC 2ch Atlas47 No 1/2 movies h 264 x264 14 years1252 MB 11. Rambo First Blood Part II 1985 Eng Mp4 H 264 rambo-first.blood.part.ii 1985 dvdrip-axxo torrent. Set 2008 DvDrip-aXXo. Demonoid.com.txt -. 42 bytes. First.Blood 1982 DvDrip-aXXo.avi -. 700.99 MB. Rambo-First.Blood.Part.II 1985 DvDrip-aXXo.avi -. Civil Action 1998 Swesub DVDrip Xvid Sweden Tin Star Ida March 2011 DVDRip axxo Passion of Christ (1978) 720p BrRip mkv - 700mb -YIFY torrent TorrentR.eu Deer Hunter . Nowhere in Africa 2001 480 8q1wv Rambo First Blood Part II 1985 720p BRRiP DT. Torrent Rambo 1982-2008 Final Uncut Edition quadrilogy 720p BRRip XviD MA.7.1-FGT, 2, 5, 34.58 GB Install 2008 DvDrip- aXXo, 0, 0, 2.74GB Rambo.First.Blood.Part.II.1985.Ultimate.Uncut.Edition.720p.BRRip.Torrent verified. Rambo-First.Blood.Part.II 1985 DvDrip-aXXo.avi, 701.1 MB. Rambo. torrent name, size, files, age, seeds, leech. Samurai-Resurrection 2009 DvDrip-aXXo (1) Against.the.Dark (2009)DvdScr MiNdSkiN (1) Air Buddies (2006) (1) Airheads (1994) DVDRiP XViD (1) Alien I checked all the torrent links one by one and they work.
    [Show full text]
  • Warez All That Pirated Software Coming From?
    Articles http://www.informit.com/articles/printerfriendly.asp?p=29894 Warez All that Pirated Software Coming From? Date: Nov 1, 2002 By Seth Fogie. Article is provided courtesy of Prentice Hall PTR. In this world of casual piracy, many people have forgotten or just never realized where many software releases originate. Seth Fogie looks at the past, present, and future of the warez industry; and illustrates the simple fact that "free" software is here to stay. NOTE The purpose of this article is to provide an educational overview of warez. The author is not taking a stance on the legality, morality, or any other *.ality on the issues surrounding the subject of warez and pirated software. In addition, no software was pirated, cracked, or otherwise illegally obtained during the writing of this article. Software piracy is one of the hottest subjects in today's computerized culture. With the upheaval of Napster and the subsequent spread of peer-to-peer programs, the casual sharing of software has become a world-wide pastime. All it takes is a few minutes on a DSL connection, and KazaA (or KazaA-Lite for those people who don't want adware) and any 10-year-old kid can have the latest pop song hit in their possession. As if deeply offending the music industry isn't enough, the same avenues taken to obtain cheap music also holds a vast number of software games and applications—some worth over $10,000. While it may be common knowledge that these items are available online, what isn't commonly known is the complexity of the process that many of these "releases" go through before they hit the file-sharing mainstream.
    [Show full text]
  • Download Vaulin KAT Complaint & Affidavit
    AO 91 (Rev. 11/11) Criminal Complaint AlJSAs William E. Ridgway and Devlin K Su Senior Coun 1 R an K. Dicke (CCIPS) UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS FILED EASTERN DIVISION JUL - 8 2016 UNITED STATES OF AMERICA THOMAS G. BRUTON CASE NUMBER: CLERK, U.S. DISTRICT COURT V. UNDER SEAL ARTEM VAULIN, 16CR 43,8 also known as "tirm" MAGISTRATE JUDGE GILBER1 CRIMINAL COMPLAINT I, the complainant in this case, state that the following is true to the best of my knowledge and belief. Count One From at least as early as in or about November 2008, to on or about July 8, 2016, in the Northern District of Illinois, Eastern Division, and elsewhere, Artem Vaulin, also known as "tirm," defendant herein, conspired with others to: (1) willfully infringe, for purposes of commercial advantage and private financial gain, at least ten copies and phonorecords of one or more copyrighted works with a total retail value of more than $2,500 during a 180-day period, in violation of Title 17, United States Code, Section 506(a)(l)(A) and Title 18, United States Code, Section 2319(b)(l); and (2) willfully infringe, for purposes of commercial advantage and private financial gain, a copyright by distribution of a work being prepared for commercial distribution, by making it available on a computer network accessible to members of the public, when defendant knew and should have known that that work was intended for commercial distribution, in violation of Title 17, United States Code, Section 506(a)(l)(C) and Title 18, United States Code, Section 2319(d)(2), all in violation of Title 18, United States Code, Section 371.
    [Show full text]
  • The Copyright Crusade
    The Copyright Crusade Abstract During the winter and spring of 2001, the author, chief technology officer in Viant's media and entertainment practice, led an extensive inqUiry to assess the potential impact of extant Internet file-sharing capabilities on the business models of copyright owners and holders. During the course of this project he and his associates explored the tensions that exist or may soon exist among peer-to-peer start-ups, "pirates" and "hackers," intellectual property companies, established media channels, and unwitting consumers caught in the middle. This research report gives the context for the battleground that has emerged, and calls upon the players to consider new, productive solutions and business models that support profitable, legal access to intellectual property via digital media. by Andrew C Frank. eTO [email protected] Viant Media and Entertainment Reinhold Bel/tIer [email protected] Aaron Markham [email protected] assisted by Bmre Forest ~ VI ANT 1 Call to Arms Well before the Internet. it was known that PCs connected to two-way public networks posed a problem for copyright holders. The problem first came to light when the Software Publishers Association (now the Software & Information Industry Association), with the backing of Microsoft and others, took on computer Bulletin Board System (BBS) operators in the late 1980s for facilitating trade in copyrighted computer software, making examples of "sysops" (as system operators were then known) by assisting the FBI in orchestrat­ ing raids on their homes. and taking similar legal action against institutional piracy in high profile U.S. businesses and universities.' At the same time.
    [Show full text]
  • Damages for Indirect Patent Infringement
    Washington University Law Review Volume 91 Issue 4 2014 Damages for Indirect Patent Infringement Dmitry Karshtedt Stanford Law School Follow this and additional works at: https://openscholarship.wustl.edu/law_lawreview Part of the Intellectual Property Law Commons, and the Torts Commons Recommended Citation Dmitry Karshtedt, Damages for Indirect Patent Infringement, 91 WASH. U. L. REV. 911 (2014). Available at: https://openscholarship.wustl.edu/law_lawreview/vol91/iss4/3 This Article is brought to you for free and open access by the Law School at Washington University Open Scholarship. It has been accepted for inclusion in Washington University Law Review by an authorized administrator of Washington University Open Scholarship. For more information, please contact [email protected]. DAMAGES FOR INDIRECT PATENT INFRINGEMENT DMITRY KARSHTEDT ABSTRACT In many patent infringement cases, the only practical way that the plaintiff can obtain relief is on a theory of secondary liability, which is generally referred to as indirect infringement. The remedy in patent cases frequently includes damages for past infringement. Because jury verdicts in patent cases can amount to hundreds of millions of dollars, patent damages have become a hotly litigated issue. Nevertheless, much to the frustration of the litigants in these high-stakes lawsuits, the courts continue to struggle to clarify how damages for indirect infringement should be determined. The Court of Appeals for the Federal Circuit, which has exclusive appellate jurisdiction over patent cases, has deepened the confusion over calculating damages. Two opinions from the Federal Circuit have made contradictory pronouncements on the issue of accounting for proven acts of primary (i.e., direct) infringement in determining damages for indirect infringement.
    [Show full text]