Shirokov v. Dunlap, Grubb & Weaver PLLC et al

Filing 55

Opposition re 42 MOTION to Dismiss The Second Amended Class Action Complaint filed by Dmitriy Shirokov. (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Exhibit C, # 4 Exhibit D, # 5 Exhibit E, # 6 Exhibit F, # 7 Exhibit G, # 8 Exhibit H, # 9 Exhibit I, # 10 Exhibit J, # 11 Exhibit K, # 12 Exhibit L)(Sweet, Jason)

Download PDF
Facts on the Cease and Desist Letter “Antichrist,” BaumgartenBrandt to ipoque, 11/18/2009 CONFIDENTIAL January, 2011 January 2011, CONFIDENTIAL ipoque Page 1 ipoque received a cease and desist letter for “Antichrist,” which was in test screening Facts about the Cease and Desist Letter Recipient of Letter: ipoque GmbH, Mozartstr. 3, 04107 Leipzig Issuer: BaumgartenBrandt, Attorneys at Law, Berlin Note: “Independent Security Provider” is Guardaley. Client: Zentropa Entertainments23 ApS Work: Film “Antichrist” Date, Time: 1/18/2009, 01:03:25 CET IP Address: 79.222.120.152 Note: At the time in question, a test screening with this film was running at ipoque for a third-party order. It was our IP address. It is a file in the BitTorrent Network (this information is not in the cease and desist letter). Accusation: Offer to Download the Film by Release on the Hard Drive Total Amount: 1,200.00 Euros Deadline: 5/18/2010 January 2011, CONFIDENTIAL ipoque Page 2 The case is completely recorded and reproducible Facts about the Cease and Desist Letter The case was able to be completely reproduced. This test screening was running on the PFS (Peer-to-Peer Forensic System), that ipoque itself uses for investigations of copyright infringements in Peer-to-Peer networks. As a result, we recorded and saved the entire traffic recordings; the case can thus be completely reproduced and demonstrated at any time. We identified the other client (Guardaley) The opposing investigators had the IP address 78.43.254.8 at the time in question. According to GoIP information, it is Baden-Würtenberg Cable, Karsruhe. In the period from 21:00 on 11/17/2009 to 02:00 on 11/18/2009, there were five different client hashes behind this IP address—one per file requested. At that time, we inquired about these files for Antichrist. This information is not in the cease and desist letter. We analyzed them from our investigation data bank: ClientHash: human readable: program and version: January 2011, CONFIDENTIAL 2D5554313831302D36D33E2627698192889A38D1 -UT1810-66%3E%26%27i%81%92%88%9A8SI -UT1810- ipoque Page 3 The Guardaley client transmitted a characteristic bit field Facts about the Cease and Desist Letter We did not offer or upload. Our client neither made an offer not did it upload, since, first, our P2P client informs all other clients that it does not have anything, and, second, the client could not upload anything. We demonstrably (in the complete traffic recordings) did not make a single transfer to this client. The Guardaley client only inquired, but neither downloaded, nor sent us anything—ipoque also transferred nothing. The clients of the opposing IP always transmit a bit field 010101010101010101… (they thus claim to have every other, and thus 50%, of the files). Screen shot 1 shows this bit field. Note: The screen shot was produced using Wireshark, an available program for the manual analysis of network traffic. January 2011, CONFIDENTIAL ipoque Page 4 Screen shot 1: Bit field on the availability of pieces of the opposing client January 2011, CONFIDENTIAL ipoque Page 5 At no time and in no direction did a transfer take place Facts about the Cease and Desist Letter Screen shot 2 is a seamless presentation of the complete occurrence resulting in the cease and desist letter. 1. It commences with the Handshake (Initiation of contact by the opponent) 2. TCP exchange (confirmation of the Handshake package, has nothing to do with the BitTorrent proceeding) → no BitTorrent transfer or the like takes place here, there is only an exchange to make and terminate the TCP connection 3. Confirmation of the Handshake by us 4. Opponent transmits (apparently falsified) bit field (see note above, Screen shot 1) 5. Our response that we are interested. 6. TCP (Confirmation of the Interested package from the previous step by the opponent) 7. Opponent requests a specific piece (although it knows that we do not have anything, since we sent no bit field — see note above) 8. TCP exchange (Confirmation of the request package by us) 9. Opponent again requests a piece 10. TCP (Confirmation of the request package by us) 11. TCP (Termination by us) 12. TCP (Confirmation by the opponent of the termination) 13. TCP(Termination by the opponent) 14. TCP (Confirmation by us of the termination) Note: The screen shot was produced using Wireshark, an available program for the manual analysis of network traffic. January 2011, CONFIDENTIAL ipoque Page 6 Screen shot 2: The complete proceeding resulting in the cease and desist letter January 2011, CONFIDENTIAL ipoque Page 7

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?