1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27

Total Page:16

File Type:pdf, Size:1020Kb

1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 1 Ira P. Rothken (SBN #160029) 2 Robert L. Kovsky (SBN #61770) ROTHKEN LAW FIRM LLP 3 3 Hamilton Landing, Suite 280 4 Novato, CA 94949 Telephone: (415) 924-4250 5 Facsimile: (415) 924-2905 6 Kirk J. Retz (#170208) 7 Deann Flores Chase (#183937) 8 RETZ & HOPKINS, LLP 9 21535 Hawthorne Blvd., #200 Torrance, CA 90503 10 Telephone: (310) 540-9800 11 Facsimile: (310) 540-9881 12 Attorney for Defendants 13 Justin Bunnell, Forrest Parker, Wes 14 Parker and Valence Media, Ltd. 15 UNITED STATES DISTRICT COURT 16 CENTRAL DISTRICT OF CALIFORNIA 17 COLUMBIA PICTURES INDUSTRIES, Case No. 06-01093 FMC 18 INC., et al. 19 MEMORANDUM OF POINTS Plaintiffs, AND AUTHORITIES IN 20 SUPPORT OF DEFENDANTS' 21 vs. OBJECTIONS TO AND MOTION FOR REVIEW OF 22 JUSTIN BUNNELL, et al., ORDER RE SERVER LOG 23 DATA 24 Defendants. 25 DATE: July 16, 2007 26 TIME: 10:00 a.m. 27 CTRM: 750 Hon. Florence Marie Cooper 28 MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF DEFENDANTS’ MOTION FOR REVIEW OF ORDER RE SERVER LOG DATA Columbia Pictures, et al. v. Bunnell, et al. U.S. Dist. Ct., Central Dist Cal., No. CV 06-01093 FMC 1 TABLE OF CONTENTS 2 Page I. INTRODUCTION .................................................................................. 1 3 4 II. FACTUAL BACKGROUND ................................................................ 6 5 III. LEGAL ARGUMENT ........................................................................... 16 6 A. The Magistrate Judge Did Not Have Authority 7 or Jurisdiction to Issue the Discovery Order Because It 8 Amounts to an Injunction That Disposes of Ultimate 9 Issues in the Case. ........................................................................ 16 10 B. The Magistrate Judge’s Order Should Be Reviewed 11 Because It Infringes on Constitutional Rights and Is Contrary to Law. ...................................................................... 26 12 13 1. Because of the Constitutional Implications, an 14 Article III Court Should Exercise Independent Judgment and Review the Magistrate Judge's Order. ........ 26 15 16 2. The Magistrate Judge Failed To Perform an Appropriate Balancing Test Before Overriding the 17 First Amendment Rights of Visitors to Defendants’ 18 Website to Participate in Anonymous Speech. .................. 29 19 3. In Violation of Due Process of Law, and Despite 20 Defendants’ Continuing Protests Against the Invasions, 21 the Magistrate Judge Ruled That Defendants and Their Visitors Had “Consented” to Invasions of Privacy, Thus 22 Stripping Away Protections of the Electronic 23 Communications Privacy Act and the Pen Register Act. ... 32 24 4. In Violation of Due Process of Law, the Magistrate 25 Judge Constructed Rules That Put the Burden of 26 Proof on Defendants as to Matters Where Defendants Have Been Deprived of Discovery. ................................... 40 27 28 - i - MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF DEFENDANTS’ MOTION FOR REVIEW OF ORDER RE SERVER LOG DATA Columbia Pictures, et al. v. Bunnell, et al. U.S. Dist. Ct., Central Dist Cal., No. CV 06-01093 FMC 1 Page 2 C. The Magistrate’s Order Contains Unprecedented 3 Determinations That Are Contrary to Law and 4 That Should Be Reviewed. .......................................................... 45 5 1. In an Erroneous Determination, the Magistrate 6 Judge Ruled That “Server Log Data” — Records Defined by Plaintiffs Which Would Come Into Existence 7 Only If Created by Defendants Under Compulsion of the 8 Court’s Order — Constitutes “Electronically Stored 9 Information” Under a 2006 Amendment to Fed. Rule of Civil Proc. 34. .................................................................... 45 10 11 2. In an Erroneous Determination, The Magistrate Judge Disregarded International Law and Ordered Defendants to 12 Take Steps in The Netherlands That Might Violate the 13 Law of the Netherlands or Other Countries. ..................... 51 14 D. The Magistrate Judge’s Order is Clearly Erroneous in Finding, 15 as a Matter of Fact, that “Defendants Have the Ability to 16 Manipulate at Will How the Server Log Data is Routed” and That Finding is the Basis of the Magistrate Judge's Order That 17 Imposes Duties on Defendants Without Regard for the Losses, 18 Costs or Other Burdens That Defendants Must Bear. ................. 55 19 III. CONCLUSION ...................................................................................... 55 20 21 22 23 24 25 26 27 28 - ii - MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF DEFENDANTS’ MOTION FOR REVIEW OF ORDER RE SERVER LOG DATA Columbia Pictures, et al. v. Bunnell, et al. U.S. Dist. Ct., Central Dist Cal., No. CV 06-01093 FMC 1 TABLE OF AUTHORITIES 2 CASES 3 Adolph Coors Co. v. Wallace, 570 F. Supp. 202....................................................26, 29 4 Alexander v. FBI (D.D.C. 2000) 194 F.R.D. 305...................................................47, 48 5 Blumofe v. Pharmatrak, Inc. (In re Pharmatrak Privacy Litig.), 329 F.3d 9...............37 6 Doe v. 2theMart.com, 140 F. Supp. 2d 1088................................................................29 7 Farber v. Garber, 234 F.R.D. 186................................................................................42 8 FTC v. Netscape Communications Corp., 196 F.R.D. 559 ..............................34, 35, 36 9 Gilmore v. Ashcroft, 2004 U.S. Dist. LEXIS 4869 ......................................................40 10 Gomez v. United States, 490 U.S. 858..........................................................................16 11 In Re Application of the United States of America for an Order Authorizing The Use 12 of a Pen Register And Trap On [xxx] Internet Service Account/User Name 13 [[email protected]], 396 F. Supp. 2d 45................................................................37 14 In re Doubleclick Inc. Privacy Litigation, 154 F. Supp. 2d 497 ..................................30 15 In re United States, 416 F. Supp. 2d 13........................................................................39 16 In re United States, 460 F. Supp. 2d 448......................................................................39 17 MAI Sys. Corp. v. Peak Computer, 991 F.2d 511.........................................................50 18 National Union Elect. Corp. v. Matsushita Elec. Indust. Co., 494 F.Supp. 1257........48 19 New.Net, Inc. v. Lavasoft, 356 F. Supp. 2d 1090 .........................................................29 20 O’Grady v. Superior Court, 139 Cal. App. 4th 1423 ...................................................35 21 Paramount Pictures Corp. v. ReplayTV (C. D. Cal. 2002) CV 01-9358 FMC (Ex) 22 (filed May 30, 2002) 2002 WL 32151632........................................................2, 5, 47 23 Parkes v. County of San Diego, 345 F. Supp. 2d 1071 ................................................40 24 Reynaga v. Cammisa, 971 F.2d 414 .............................................................................17 25 Richmark Corp. v. Timber Falling Consultants, 959 F.2d 1468,.................................52 26 Sell v. United States, 539 U.S. 166...............................................................................18 27 Societe Internationale Pour Participations Industrielles et Commerciales v. Rogers, 28 - iii - MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF DEFENDANTS’ MOTION FOR REVIEW OF ORDER RE SERVER LOG DATA Columbia Pictures, et al. v. Bunnell, et al. U.S. Dist. Ct., Central Dist Cal., No. CV 06-01093 FMC 1 357 U.S. 197 211 ......................................................................................................52 2 Societe Nationale Industrielle Aerospatiale v. United States District Court, 482 U.S. 3 522.............................................................................................................................53 4 Subafilms, Ltd. v. MGM-Pathe Communications Co., 24 F.3d....................................32 5 Theofel v. Farey-Jones, 359 F. 3d 1066 .......................................................................36 6 United States v. Councilman, 418 F.3d 67 ...................................................................37 7 United States v. Rivera-Guerrero, 377 F.3d 1064............................................17, 20, 26 8 United States v. Vetco, 691 F.2d 1281..........................................................................54 9 Vogel v. United States Office Prods. Co., 258 F.3d 509 ..............................................19 10 Wolpin v. Philip Morris, Inc., 189 F.R.D. 418 .............................................................51 11 STATUTES 12 18 U.S.C. § 2702.................................................................................................4, 33, 34 13 18 U.S.C. § 2703(c)(1)(C) ............................................................................................34 14 28 U.S.C. § 636(b)(1) .............................................................................................28, 46 15 28 U.S.C. § 636(b)(1)(A)....................................................................................9, 16, 18 16 Electronic Communications Privacy Act and 18 U.S.C. § 2701..................................32 17 Pen Register Statute, 18 U.S.C. §§ 3121-27...........................................................36, 37 18 The Wiretap Act, 18 U.S.C. §§ 2510-2522 ......................................................36, 37, 39 19 20 21 22 23 24 25 26 27 28 - iv - MEMORANDUM OF POINTS AND AUTHORITIES IN SUPPORT OF DEFENDANTS’ MOTION FOR REVIEW OF ORDER RE SERVER LOG DATA Columbia Pictures, et al. v. Bunnell, et al.
Recommended publications
  • "Ephemeral Data" and the Duty to Preserve Discoverable Electronically Stored Information Kenneth J
    University of Baltimore Law Review Volume 37 Article 4 Issue 3 Spring 2008 2008 "Ephemeral Data" and the Duty to Preserve Discoverable Electronically Stored Information Kenneth J. Withers The Sedona Conference Follow this and additional works at: http://scholarworks.law.ubalt.edu/ublr Part of the Law Commons Recommended Citation Withers, Kenneth J. (2008) ""Ephemeral Data" and the Duty to Preserve Discoverable Electronically Stored Information," University of Baltimore Law Review: Vol. 37: Iss. 3, Article 4. Available at: http://scholarworks.law.ubalt.edu/ublr/vol37/iss3/4 This Article is brought to you for free and open access by ScholarWorks@University of Baltimore School of Law. It has been accepted for inclusion in University of Baltimore Law Review by an authorized administrator of ScholarWorks@University of Baltimore School of Law. For more information, please contact [email protected]. "EPHEMERAL DATA" AND THE DUTY TO PRESERVE DISCOVERABLE ELECTRONICALLY STORED INFORMATION Kenneth J. Witherst I. ELECTRONIC ALL Y STORED INFORMATION AND THE DUTY OF PRESERVATION UNDER THE RULES OF CIVIL PROCEDURE The duty to take reasonable steps to preserve evidence discoverable in pending or anticivated civil litigation is well established in U.S. civil jurisprudence. Courts differ about when the duty of preservation is triggered, the particular scope of that duty, and what steps of preservation are considered reasonable on a case-by-case basis,2 but the general rule is clear: parties have a duty to preserve t Kenneth J. Withers is Director of Judicial Education and Content for The Sedona Conference®, a non-profit law and policy think-tank based in Arizona.
    [Show full text]
  • Exinda Applications List
    Application List Exinda ExOS Version 6.4 © 2014 Exinda Networks, Inc. 2 Copyright © 2014 Exinda Networks, Inc. All rights reserved. No parts of this work may be reproduced in any form or by any means - graphic, electronic, or mechanical, including photocopying, recording, taping, or information storage and retrieval systems - without the written permission of the publisher. Products that are referred to in this document may be either trademarks and/or registered trademarks of the respective owners. The publisher and the author make no claim to these trademarks. While every precaution has been taken in the preparation of this document, the publisher and the author assume no responsibility for errors or omissions, or for damages resulting from the use of information contained in this document or from the use of programs and source code that may accompany it. In no event shall the publisher and the author be liable for any loss of profit or any other commercial damage caused or alleged to have been caused directly or indirectly by this document. Document Built on Tuesday, October 14, 2014 at 5:10 PM Documentation conventions n bold - Interface element such as buttons or menus. For example: Select the Enable checkbox. n italics - Reference to other documents. For example: Refer to the Exinda Application List. n > - Separates navigation elements. For example: Select File > Save. n monospace text - Command line text. n <variable> - Command line arguments. n [x] - An optional CLI keyword or argument. n {x} - A required CLI element. n | - Separates choices within an optional or required element. © 2014 Exinda Networks, Inc.
    [Show full text]
  • P2P and Bittorrent
    inf5040 - Presentation by group 1 nghial, baardehe, chricar 30.10.08 Goals of today After this lecture you should have a general understanding of what P2P and bittorrent is be able to recognize the main differences of bitTorrent and other P2P networks A way of organizing resource sharing in computer networks What is P2P? Server/client model Peer-to-peer model Characteristics of P2P networks Peers act as equals Peers function as both client and server No central server managing the network No central router Examples of ”pure” P2P networks Gnutella, Freenet (filesharing) In short Decentralization and multirole BUT! Most networks and applications described as P2P actually contain or rely on some non-peer elements History 1970 – SMTP, NNTP (Usenet) One process both server and client IBM, 1984 ”Advanced Peer to Peer Networking” Software for filesharing in a LAN 1990 – IRC (DCC), MBONE One client can both send and receive 1997 – Napster Created a lot of controversy Convicted because of the centralized file indexing Advantages of P2P networks Better performance and reliability compared to server/client scheme Popular resources will be available at several locations Principle of locality -> less delay and faster transmission Overlay routing Application layer routing (middleware) Two ways of searching for files Flooding DHT (Distributed Hash Table) Area of application Mostly used in ad hoc networks Often categorized by what it’s used for Filesharing Media streaming Telephony (skype) Discussion forums Used to distribute
    [Show full text]
  • The Application Layer: Overview
    The Application Layer: Overview ▪ P2P applications ▪ Principles of network ▪ video streaming and applications content distribution ▪ Web and HTTP networks ▪ E-mail, SMTP, IMAP ▪ socket programming with ▪ The Domain Name System UDP and TCP DNS 1 Peer-to-peer (P2P) Architecture ▪no always-on server ▪arbitrary end systems directly mobile network communicate national or global ISP ▪peers request service from other peers, provide service in return to other peers • self scalability – new peers bring new local or service capacity, and new service regional ISP demands home network content ▪peers are intermittently provider network datacenter connected and change IP network addresses • complex management enterprise ▪examples: P2P file sharing network (BitTorrent), streaming (KanKan), VoIP (Skype) 2 File distribution: client-server vs P2P Q: how much time to distribute file (size F) from one server to N peers? • peer upload/download capacity is limited resource us: server upload capacity di: peer i file, size F u1 d us 1 u2 d download capacity server 2 di uN network (with abundant bandwidth) ui dN ui: peer i upload capacity 3 File distribution time: client-server ▪server transmission: must sequentially send (upload) N file copies: F us • time to send one copy: F/us di • time to send N copies: NF/us network u ▪ client: each client must i download file copy • dmin = min client download rate • min client download time: F/dmin time to distribute F to N clients using Dc-s > max{NF/us,,F/dmin} client-server approach increases linearly in N 4 File distribution time: P2P ▪server transmission: must upload at least one copy: • time to send one copy: F/u F s us d ▪ client: each client must i network download file copy ui • min client download time: F/dmin ▪ clients: as aggregate must download NF bits • max upload rate (limiting max download rate) is us + Σui time to distribute F to N clients using DP2P > max{F/us,,F/dmin,,NF/(us + Σui)} P2P approach increases linearly in N … … but so does this, as each peer brings service capacity 5 Client-server vs.
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
    hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future.
    [Show full text]
  • Web 2.0 Enabled Classroom
    7/16/2010 Agenda Market Evolution and Trends Where to Begin Web Questions?2.0 Enabled Introduction to Unified Performance Management Case Studies Classroom © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 1 7/16/2010 Exinda at a Glance Founded in 2002 Melbourne based Leading provider of WAN optimization solutions Privately held with venture capital financing Market Evolution Over 3,000 customers Questions? Several thousand appliances deployed in 40+ countries & Trends Worldwide distribution © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 2 7/16/2010 Market Evolution & Trends Market Evolution & Trends Top five bandwidth heavy websites were: 1. YouTube – 10% of all bandwidth used 2. Facebook – 4.5% 3. Windows Update – 3.3% “On average, 37% of network capacity has 4. Yimg (Yahoo!'s image server) – 2.7% been occupied by traffic that is not business- 5. Google – 2.5% critical.” - Aberdeen Group, “Application Performance Management: When 250 IT managers were asked about their biggest Getting IT on the C-Level Agenda”, March 2009 security concerns, the top answer was "employees using applications on social networks" while at work. Source: Network Box, 20th April, 2010 © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential © 2002 – 2010, Exinda Networks Inc. Proprietary & Confidential Performance You Can See Performance You Can See 3 7/16/2010 Market Evolution & Trends Market Evolution & Trends The Council of Australian University Directors Australia Is Social Networking Capital Of The World of Information Technology (CAUDIT) have TELEGRAPH.CO.UK - Mar 3 - According to Nielsen, indicated that traffic is typically doubling Australia's web users are at the forefront of the social networking craze, posting, poking and every nine months (250 per cent a year).
    [Show full text]
  • Bittorrent (Protocol) 1 Bittorrent (Protocol)
    BitTorrent (protocol) 1 BitTorrent (protocol) BitTorrent is a peer-to-peer file sharing protocol used for distributing large amounts of data over the Internet. BitTorrent is one of the most common protocols for transferring large files and it has been estimated that peer-to-peer networks collectively have accounted for roughly 43% to 70% of all Internet traffic (depending on geographical location) as of February 2009.[1] Programmer Bram Cohen designed the protocol in April 2001 and released a first implementation on July 2, 2001.[2] It is now maintained by Cohen's company BitTorrent, Inc. There are numerous BitTorrent clients available for a variety of computing platforms. As of January 2012 BitTorrent has 150 million active users according to BitTorrent Inc.. Based on this the total number of monthly BitTorrent users can be estimated at more than a quarter billion.[3] At any given instant of time BitTorrent has, on average, more active users than YouTube and Facebook combined. (This refers to the number of active users at any instant and not to the total number of unique users.)[4][5] Description The BitTorrent protocol can be used to reduce the server and network impact of distributing large files. Rather than downloading a file from a single source server, the BitTorrent protocol allows users to join a "swarm" of hosts to download and upload from each other simultaneously. The protocol is an alternative to the older single source, multiple mirror sources technique for distributing data, and can work over networks with lower bandwidth so many small computers, like mobile phones, are able to efficiently distribute files to many recipients.
    [Show full text]
  • Intellectual Property Update
    INTELLECTUAL PROPERTY UPDATE FALA WINTER MEETING 2008 By Gregory A. Piccionelli Piccionelli & Sarno Introduction I. Copyrights Destruction Of Evidence Is A Significant Factor In MPAA Victory In Torrentspy.Com Copyright Infringement Action Columbia Pictures Industries, et al v. Justin Bunneli, et al, U.S. District Court for the Central District of California, Case No. CV 06-1093 FMC (JCx) The Motion Picture Association of America (MPAA) has prevailed in a significant ruling against the operators of the website “TorrentSpy.com”, largely based upon the judge’s determination the defendants tampered with evidence. In a ruling that could have implications for the privacy of website users, Judge Florence- Marie Cooper of the U.S. District Court for the Central District of California, ruled that that TorrentSpy.com infringed plaintiff’s copyrights in a default judgment against the operators of the bit torrent site. The judge agreed with the plaintiff that the defendants had destroyed important evidence after another judge had ordered them to preserve server logs, user IP (Internet Protocol) addresses and other information. Defendants have described the TorrentSpy technology as a means to find files distributed on BitTorrent peer-to-peer networks. According to the Judge Cooper, the defendants' conduct was “obstreperous”. In her opinion, she wrote that the defendants “engaged in widespread and systematic efforts to destroy evidence and have provided false testimony under oath in a effort to hide evidence of such destruction.” The judge also noted that “[d]efendants were on notice that this information would be of importance in this case.” TorrentSpy had located its servers in the Netherlands and argued that Dutch law protected them from having to turn over server logs and other information.
    [Show full text]
  • Crawling Bittorrent Dhts for Fun and Profit
    Crawling BitTorrent DHTs for Fun and Profit Scott Wolchok and J. Alex Halderman The University of Michigan {swolchok, jhalderm}@eecs.umich.edu Abstract major torrent discovery sites and the major trackers [1,29] is feasible. Though a boon to copyright enforcement, this This paper presents two kinds of attacks based on crawl- capability reduces the privacy of BitTorrent downloaders ing the DHTs used for distributed BitTorrent tracking. by making it much harder to “hide in the crowd.” First, we show how pirates can use crawling to rebuild The BitTorrent community has responded to these BitTorrent search engines just a few hours after they are trends by deploying decentralizing tracking systems based shut down (crawling for fun). Second, we show how on distributed hash tables (DHTs). So far, their impact content owners can use related techniques to monitor pi- on privacy and copyright enforcement has been unclear. rates’ behavior in preparation for legal attacks and negate Distributed tracking is harder to disrupt through legal any perceived anonymity of the decentralized BitTorrent threats, but users still rely on centralized torrent discov- architecture (crawling for profit). ery sites that remain relatively easy targets. Some might We validate these attacks and measure their perfor- expect that decentralizing the tracking architecture would mance with a crawler we developed for the Vuze DHT. enhance privacy by making monitoring more difficult, but We find that we can establish a search engine with over the question has received little research attention to date. one million torrents in under two hours using a single In this work, we demonstrate how deployed distributed desktop PC.
    [Show full text]
  • United States Court of Appeals for the Ninth Circuit
    Case: 10-55946 12/17/2010 Page: 1 of 92 ID: 7585231 DktEntry: 18 Docket No. 10-55946 In the United States Court of Appeals For the Ninth Circuit COLUMBIA PICTURES INDUSTRIES, INC., DISNEY ENTERPRISES, INC., PARAMOUNT PICTURES CORPORATION, TRISTAR PICTURES, INC., TWENTIETH CENTURY FOX FILM CORPORATION, UNIVERSAL CITY STUDIOS LLLP, UNIVERSAL CITY STUDIOS PRODUCTIONS, LLLP and WARNER BROS. ENTERTAINMENT, INC., Plaintiffs-Appellees, v. GARY FUNG and ISOHUNT WEB TECHNOLOGIES, INC., Defendants-Appellants. _______________________________________ Appeal from a Decision of the United States District Court for the Central District of California, No. 06-CV-05578 · Honorable Stephen V. Wilson BRIEF OF APPELLANTS IRA P. ROTHKEN, ESQ. ROBERT L. KOVSKY, ESQ. JARED R. SMITH, ESQ. ROTHKEN LAW FIRM 3 Hamilton Landing, Suite 280 Novato, California 94949 (415) 924-4250 Telephone (415) 924-2905 Facsimile Attorneys for Appellants, Gary Fung and isoHunt Web Technologies, Inc. COUNSEL PRESS · (800) 3-APPEAL PRINTED ON RECYCLED PAPER Case: 10-55946 12/17/2010 Page: 2 of 92 ID: 7585231 DktEntry: 18 CORPORATE DISCLOSURE STATEMENT OF ISOHUNT TECHNOLOGIES, INC. Pursuant to Federal Rule of Appellate Procedure 26.1 and Circuit Rule 26-1, appellant isoHunt Technologies, Inc. states that it has no parent corporation and that there is no publicly held corporation that owns 10% or more of its stock. APPELLANTS’ REQUEST FOR ORAL ARGUMENT The case presents important issues concerning copyright law, Internet development, free speech and international law. Appellants request oral argument. Case: 10-55946 12/17/2010 Page: 3 of 92 ID: 7585231 DktEntry: 18 TABLE OF CONTENTS Page Corporate Disclosure Statement of isoHunt Web Technologies, Inc Appellants’ Request for Oral Argument Table of Authorities ……………………………………………………….
    [Show full text]
  • Peer-To-Peer Protocol and Application Detection Support
    Peer-to-Peer Protocol and Application Detection Support This appendix lists all the protocols and applications currently supported by Cisco ASR 5500 ADC. • Supported Protocols and Applications, on page 1 Supported Protocols and Applications This section lists all the supported P2P protocols, sub-protocols, and the applications using these protocols. Important Please note that various client versions are supported for the protocols. The client versions listed in the table below are the latest supported version(s). Important Please note that the release version in the Supported from Release column has changed for protocols/applications that are new since the ADC plugin release in August 2015. This will now be the ADC Plugin Build number in the x.xxx.xxx format. The previous releases were versioned as 1.1 (ADC plugin release for December 2012 ), 1.2 (ADC plugin release for April 2013), and so on for consecutive releases. New in this Release This section lists the supported P2P protocols, sub-protocols and applications introduced in the ADC Plugin release for October 1, 2018. Protocol / Client Client Version Group Classification Supported from Application Release ABSCBN ABSCBN 7.1.2 Streaming Streaming-video ADC Plugin (Android) 2.28.990 Unclassified ABSCBN (iOS) 10.3.3 ABSCBN (Web) — Peer-to-Peer Protocol and Application Detection Support 1 Peer-to-Peer Protocol and Application Detection Support New in this Release Protocol / Client Client Version Group Classification Supported from Application Release Smashcast Smashcast 1.0.13 Streaming
    [Show full text]
  • Bittorrent - Wikipedia, the Free Encyclopedia 11/12/13 Create Account Log In
    BitTorrent - Wikipedia, the free encyclopedia 11/12/13 Create account Log in Article Talk Read Edit View history BitTorrent From Wikipedia, the free encyclopedia Main page Contents This article is about the file sharing protocol. For other uses, see BitTorrent (disambiguation). Featured content This article may be too technical for most readers to Current events understand. Please help improve this article to make it Random article understandable to non-experts, without removing the technical Donate to Wikipedia details. The talk page may contain suggestions. (May 2011) Wikimedia Shop BitTorrent is a protocol supporting the practice of Part of a series on Interaction peer-to-peer file sharing that is used to distribute large File sharing Help amounts of data over the Internet. BitTorrent is one of About Wikipedia the most common protocols for transferring large files, Community portal and peer-to-peer networks have been estimated to Recent changes collectively account for approximately 43% to 70% of Technologies Contact page all Internet traffic (depending on geographical location) Peer to peer · BitTorrent­ · Tools as of February 2009.[1] In November 2004, BitTorrent ­File hosting services was responsible for 35% of all Internet traffic.[2] As of Development and societal aspects Print/export February 2013, BitTorrent was responsible for 3.35% Timeline · Legal­ aspects Non-public file sharing Languages of all worldwide bandwidth, more than half of the 6% Anonymous P2P Friend-to-friend­ Darknet­ of total bandwidth dedicated to file sharing.[3] · · · Private P2P­ العربية Azərbaycanca Programmer Bram Cohen, a former University at File sharing networks and services [4] Беларуская Buffalo graduate student in Computer Science, Gnutella / Gnutella2 (G2) · FastTrack­ · Български designed the protocol in April 2001 and released the ­eDonkey · Direct­ Connect · Mininova­ · ­isoHunt The­ Pirate Bay ­Bitcoin Bosanski first available version on July 2, 2001,[5] and the final · · [6] By country or region Català version in 2008.
    [Show full text]