NU IMAGE, INC. v. DOES
Filing
5
MOTION for Order FOR LEAVE TO TAKE DISCOVERY PRIOR TO RULE 26(f) CONFERENCE by NU IMAGE, INC. (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C, # 4 Text of Proposed Order)(Kurtz, Nicholas)
UNITED STATES DISTRICT COURT FOR THE
DISTRICT OF COLUMBIA
NU IMAGE, INC.
)
)
Plaintiff,
)
)
v.
)
)
DOES 1 – 6,500
)
)
Defendants.
)
_______________________________________)
CA. 1:11-cv-00301-RLW
DECLARATION OF DANIEL ARHEIDT IN SUPPORT OF PLAINTIFF’S MOTION
FOR LEAVE TO TAKE DISCOVERY PRIOR TO RULE 26(f) CONFERENCE
I, Daniel Arheidt, declare:
1. I am Director of Data Services for Guardaley, Limited (“Guardaley”), a company
incorporated in England and Wales under company number 06576149. Guardaley is a provider
of online anti-piracy services for the motion picture industry. Before my employment with
Guardaley, I held various software developer and consultant positions at companies that
developed software technologies. I have approximately ten (10) years of experience related to
the protocols, technical architecture and operation of the Internet.
2. I submit this declaration in support of Plaintiff’s Motion for Leave to Take Discovery
Prior to Rule 26(f) Conference. This declaration is based on my personal knowledge, and if
called upon to do so, I would be prepared to testify as to its truth and accuracy.
3. At Guardaley, I am the head of the department that carries out evidence collection and
provides litigation support services. I work closely with our development team to create
credible techniques to scan for, detect, and download copies of copyrighted material on multiple
network protocols for use by copyright owners.
1
4. Guardaley has developed a technology that provides an effective means to detect the
unauthorized distribution of movies and other audiovisual content and files over online media
distribution systems, or “peer-to-peer” (“P2P”) networks. Guardaley’s technology enables it to
detect and monitor the unlawful transfer and distribution of files amongst the P2P network by
different protocols Those protocols make even small computers with low bandwidth capable of
participating in large data transfers across a P2P network. The initial file-provider intentionally
elects to share a file with P2P networks. This is called “seeding.” Other users (“peers”) on the
network connect to the seed file to download. As yet additional peers request the same file, each
additional user becomes a part of the network from where the file can be downloaded. However,
unlike a traditional P2P network, each new file downloader is receiving a different piece of the
data from each user who has already downloaded the file that together comprises the whole.
This means that every “node” or peer user who has a copy of the infringing copyrighted material
on a P2P network investigated by our software must necessarily also be a source of download for
that infringing file.
5. This distributed nature of the P2P networks typically leads to a rapid viral spreading of a
file throughout peer users. Because of the nature of a P2P, any seed peer who has downloaded a
file prior to the time a subsequent peer downloads the same file is a possible source for the
subsequent peer so long as that first seed peer is online at the time the subsequent peer
downloads a file.
6. The Plaintiff in this action is producer and distributor of motion pictures. The Plaintiff
engaged the United States Copyright Group to, among other tasks, document evidence of the
unauthorized reproduction and distribution of the copyrighted motion picture to which Plaintiff
2
holds the exclusive distribution and licensing rights, “The Expendables” (the “Motion Picture”),
within the United States of America, including the District of Columbia.
7. USCG, in turn, retained Guardaley to monitor and identify copyright infringement of
Plaintiff’s copyrighted Motion Picture on P2P networks. On behalf of Plaintiff, we engaged in a
specific process utilizing Guardaley’s specially designed software technology to identify direct
infringers of Plaintiff’s copyrights using protocols investigated by Guardley’s software on P2P
networks.
8. All of the infringers named as Doe Defendants were identified in the following way: Our
software is connected to a number of files of illegal versions of the Motion Picture. All infringers
connected to those files will be investigated through downloading a part of the file placed on
their computer. This evidence is saved on our service and could be shown to the court as
evidence if necessary.
9. Once Guardaley’s searching software program identifies an infringer in the way
described herein for the Motion Picture for which Plaintiff owns the exclusive licensing and
distribution rights, we obtain the Internet Protocol (“IP”) address of a user offering the file for
download. When available, we also obtain the user’s pseudonym or network name and examine
the user’s publicly available directory on his or her computer for other files that lexically match
Plaintiff’s motion picture. In addition to the file of the motion picture itself, we download or
otherwise collect publicly available information about the network user that is designed to help
Plaintiff identify the infringer. Among other things, we download or record for each file
downloaded: (a) the time and date at which the file or a part of the file was distributed by the
user; (b) the IP address assigned to each user at the time of infringement; and, in some cases, (c)
the video file’s metadata (digital data about the file), such as title and file size, that is not part of
3
the actual video content, but that is attached to the digital file and helps identify the content of
the file. We then create evidence logs for each user that store all this information in a database.
10. An IP address is, in combination with the date, a unique numerical identifier that is
automatically assigned to a user by its Internet Service Provider (“ISP”) each time a user logs on
to the network. Each time a subscriber logs on, he or she may be assigned a different IP address
unless the user obtains from his/her ISP a static IP address. ISPs are assigned certain blocks or
ranges of IP addresses. ISPs keep track of the IP addresses assigned to its subscribers at any
given moment and retain such “user logs” for a very limited amount of time. These user logs
provide the most accurate means to connect an infringer’s identity to its infringing activity.
11. Although users’ IP addresses are not automatically displayed on the P2P networks, any
user’s IP address is readily identifiable from the packets of publicly available data being
exchanged. The exact manner in which we determine a user’s IP address varies by P2P network.
12. An infringer’s IP address is significant because it is becomes a unique identifier that,
along with the date and time of infringement, specifically identifies a particular computer using
the Internet. However, the IP address does not enable us to ascertain with certainty the exact
physical location of the computer or to determine the infringer’s identity. It only enables us to
trace the infringer’s access to the Internet to a particular ISP. Subscribing to and setting up an
account with an ISP is the most common and legitimate way for someone to gain access to the
Internet. An ISP can be a telecommunications service provider such as Verizon, an Internet
service provider such as America Online, a cable Internet service provider such as Comcast, or
even an entity such as a university that is large enough to establish its own network and link
directly to the Internet.
4
13. Here, the IP addresses Guardaley identified for Plaintiff enable us to determine which ISP
was used by each infringer to gain access to the Internet. Publicly available databases located on
the Internet list the IP address ranges assigned to various ISPs. However, some ISPs lease or
otherwise allocate certain of their IP addresses to other unrelated, intermediary ISPs. Since these
ISPs consequently have no direct relationship -- customer, contractual, or otherwise -- with the
end-user, they are unable to identify the Doe Defendants through reference to their user logs.
The intermediary ISPs’ own user logs, however, should permit identification of the Doe
Defendants. We determined that the Doe Defendants here were using those ISPs listed in
Exhibit C to Plaintiff’s Motion for Leave to Take Discovery Prior to Rule 26(f) Conference
together with various other ISPs operating both within and outside the District of Columbia, to
gain access to the Internet and distribute and make available for distribution and copying
Plaintiff’s copyrighted motion picture.
14. We downloaded the motion picture file, or a substantial part of it, and other identifying
information described above and created evidence logs for each Doe Defendant. Once we
identified the ISP used by the Doe Defendants to gain access to the Internet from the IP address,
USCG sent an e-mail to the relevant contact at each ISP informing them of the Doe Defendant’s
IP address and the date and time of the infringing activity. That e-mail message requested that
each ISP retain the records necessary to identify its subscriber who was assigned that IP address
at that date and time. Once provided with the IP address, plus the date and time of the infringing
activity, the Doe Defendant’s ISPs quickly and easily can use their respective subscriber logs to
identify the name and address of the ISP subscriber who was assigned that IP address at that date
and time.
5
Confirmation of Downloaded Material
15. I am also responsible for identifying on-line piracy of motion pictures for Guardaley,
including gathering evidence of on-line piracy to support counsel’s copyright protection
enforcement efforts.
16. As part of my responsibilities at Guardaley, I have been designated to confirm that the
digital audiovisual files downloaded by Guardaley are actual copies of Plaintiff’s Motion Picture.
It is possible for digital files to be mislabeled or corrupted; therefore, Guardaley (and
accordingly, Plaintiff) does not rely solely on the labels and metadata attached to the files
themselves to determine which motion picture is copied in the downloaded file, but also to
confirm through a visual comparison between the downloaded file and the Motion Picture
themselves.
17. As to Plaintiff’s copyrighted Motion Picture, as identified in the Complaint, I or one of
my assistants have watched a DVD copy of the Motion Picture provided by Plaintiff. After
Guardaley identified the Doe Defendants and downloaded the motion pictures they were
distributing, we opened the downloaded files, watched them and confirmed that they contain a
substantial portion of the motion picture identified in the Complaint.
18. Plaintiff’s Motion Picture continues to be made available for unlawful transfer and
distribution using P2P protocols, in violation of Plaintiff’s exclusive licensing and distribution
rights, and rights in the copyright. USCG and Guardaley continue to monitor such unlawful
distribution and transfer of Plaintiff’s Motion Picture and to identify infringers.
6
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?