Strike 3 Holdings, LLC v. John Doe ( 2024 )


Menu:
  • 1 2 3 4 5 6 7 8 UNITED STATES DISTRICT COURT 9 SOUTHERN DISTRICT OF CALIFORNIA 10 11 STRIKE 3 HOLDINGS, LLC, Case No.: 3:24-cv-00736-H-AHG 12 Plaintiff, ORDER GRANTING EX PARTE 13 v. APPLICATION FOR LEAVE TO SERVE A THIRD-PARTY 14 JOHN DOE subscriber assigned IP SUBPOENA PRIOR TO A RULE address 76.172.71.23, 15 26(f) CONFERENCE Defendant. 16 [ECF No. 4] 17 18 19 Before the Court is Plaintiff Strike 3 Holdings, LLC’s (“Plaintiff”) Ex Parte 20 Application for Leave to Serve a Third-Party Subpoena Prior to a Rule 26(f) Conference. 21 ECF No. 4. No defendant has been named or served, and so no opposition or reply briefs 22 have been filed. For the reasons discussed below, the Court GRANTS Plaintiff’s ex parte 23 application. 24 I. BACKGROUND 25 On April 23, 2024, Plaintiff filed a Complaint against Defendant “John Doe,” who 26 is a subscriber of the Internet Service Provider (“ISP”) Spectrum, with assigned Internet 27 Protocol (“IP”) address 76.172.71.23. ECF No. 1 ¶ 5. Plaintiff Strike 3 Holdings, LLC, is 28 the owner of numerous adult motion pictures, which Plaintiff distributes through adult 1 websites and DVDs. Id. ¶¶ 2–3. Plaintiff asserts that Defendant is committing “rampant 2 and wholesale copyright infringement” by downloading, recording, and distributing copies 3 of Plaintiff’s copyrighted motion pictures without authorization through the use of the 4 BitTorrent file distribution network. Id. at ¶¶ 4, 18–44. 5 In the instant motion, Plaintiff seeks leave to conduct early discovery prior to the 6 mandated Rule 26(f) conference to learn Defendant’s identity. ECF No. 4. Specifically, 7 Plaintiff seeks an order permitting it to serve a third-party subpoena under Federal Rule of 8 Civil Procedure 45 on Defendant’s ISP, Spectrum, which would require Spectrum to 9 supply the name and address of Defendant John Doe to Plaintiff, so that Plaintiff “may 10 learn Defendant’s identity, further investigate Defendant’s role in the infringement, and 11 effectuate service.” ECF No. 4-1 at 7–8. Through service of the third-party subpoena, 12 Plaintiff seeks only “the true name and address of Defendant.” Id. at 8. Additionally, 13 Plaintiff represents to the Court that it will only use this information to prosecute the claims 14 made in its Complaint. Id. 15 II. LEGAL STANDARD 16 A party is generally not permitted to obtain discovery without a court order before 17 the parties have conferred pursuant to Federal Rule of Civil Procedure 26(f). Fed. R. Civ. 18 P. 26(d)(1). However, courts make exceptions to allow limited discovery after a complaint 19 is filed to permit the plaintiff to learn the identifying information necessary to serve the 20 defendant. Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. 573, 577 (N.D. Cal. 1999); 21 see, e.g., UMG Recordings, Inc. v. Doe, No. C-08-3999-RMW, 2008 WL 4104207, at *2 22 (N.D. Cal. Aug. 29, 2008) (noting, in an infringement case, that “a plaintiff cannot have a 23 discovery planning conference with an anonymous defendant[,]” and limited expedited 24 discovery would thus “permit the [plaintiff] to identify John Doe and serve the defendant, 25 permitting this case to go forward.”). 26 Consistent with this generally recognized exception to Rule 26(f), the Ninth Circuit 27 has held that “‘where the identity of the alleged defendant[] [is] not [] known prior to the 28 filing of a complaint[,] the plaintiff should be given an opportunity through discovery to 1 identify the unknown defendants, unless it is clear that discovery would not uncover the 2 identities, or that the complaint would be dismissed on other grounds.’” Wakefield v. 3 Thompson, 177 F.3d 1160, 1163 (9th Cir. 1999) (quoting Gillespie v. Civiletti, 629 F.2d 4 637, 642 (9th Cir. 1980)). 5 A party who requests early or expedited discovery must make a showing of good 6 cause. See Semitool, Inc. v. Tokyo Electron Am., Inc., 208 F.R.D. 273, 275–76 (N.D. Cal. 7 2002) (applying “the conventional standard of good cause in evaluating Plaintiff’s request 8 for expedited discovery”). Good cause is established through a balancing test “where the 9 need for expedited discovery, in consideration of the administration of justice, outweighs 10 the prejudice to the responding party.” Id. at 276. To determine whether “good cause” 11 exists to permit expedited discovery to identify John Doe defendants, district courts in the 12 Ninth Circuit consider whether the plaintiff (1) “identif[ies] the missing party with 13 sufficient specificity such that the Court can determine that the defendant is a real person 14 or entity who could be sued in federal court”; (2) “identif[ies] all previous steps taken to 15 locate the elusive defendant” to ensure that plaintiff has made a good faith effort to identify 16 the defendant; and (3) “establish[es] to the Court’s satisfaction that plaintiff’s suit against 17 defendant could withstand a motion to dismiss.” Columbia Ins., 185 F.R.D. at 578–80. 18 Additionally, the plaintiff should demonstrate the discovery will likely lead to identifying 19 information that will permit service of process. Id. at 580. These factors are considered to 20 ensure the expedited discovery procedure “will only be employed in cases where the 21 plaintiff has in good faith exhausted traditional avenues for identifying a civil defendant 22 pre-service, and will prevent use of this method to harass or intimidate.” Id. 23 III. DISCUSSION 24 Plaintiff contends that there is good cause for this Court to allow expedited 25 discovery. ECF No. 4-1 at 11–18. For the reasons stated below, the Court agrees. 26 a. Identification of Missing Party with Sufficient Specificity 27 To satisfy the first prong, Plaintiff must identify Defendant with enough specificity 28 to enable the Court to determine that Defendant is a real person or entity who would be 1 subject to the jurisdiction of this Court. Columbia Ins., 185 F.R.D. at 578. District courts 2 in this circuit have determined “a plaintiff identifies Doe defendants with sufficient 3 specificity by providing the unique IP addresses assigned to an individual defendant on the 4 day of the allegedly infringing conduct, and by using ‘geolocation technology’ to trace the 5 IP addresses to a physical point of origin.” 808 Holdings, LLC v. Collective of December 6 29, 2011 Sharing Hash, No. 12cv186 MMA-RBB, 2012 WL 12884688, at *4 (S.D. Cal. 7 May 4, 2012); see Openmind Solutions, Inc. v. Does 1-39, No. C-11-3311-MEJ, 2011 WL 8 4715200, at *2 (N.D. Cal. Oct. 7, 2011) (concluding that plaintiff satisfied the first factor 9 by identifying the defendants’ IP addresses and by tracing the IP addresses to a point of 10 origin within the State of California); Pink Lotus Entm’t, LLC v. Does 1-46, No. C-11- 11 02263, 2011 WL 2470986, at *3 (N.D. Cal. June 21, 2011) (same). Other courts have 12 concluded that merely identifying the IP addresses on the day of the alleged infringement 13 satisfies this factor. 808 Holdings, 2012 WL 12884688, at *4 (collecting cases). 14 Here, Plaintiff has identified the Doe Defendant with sufficient specificity. First, in 15 support of the present motion, Plaintiff provided an 82-paragraph Declaration of David 16 Williamson, an independent contractor hired by Plaintiff as an Information Systems and 17 Management Consultant. ECF No. 4-2 at 2–15 (“Ex. A”). In that role, Mr. Williamson 18 testifies he “oversaw the design, development, and overall creation of the infringement 19 detection system called VXN Scan[,] which [Plaintiff] both owns and uses to identify the 20 IP addresses used by individuals infringing Plaintiff’s movies via the BitTorrent protocol.” 21 Ex. A, ¶ 40. Mr. Williamson’s Declaration explains the VXN Scan system in detail, which 22 involves, in part, the development of a proprietary BitTorrent client that emulates the 23 behavior of a standard BitTorrent client by repeatedly downloading data pieces from peers 24 within the BitTorrent network that are distributing Plaintiff’s movies. Id. ¶¶ 52–56. 25 Mr. Williamson testifies that another component of the VXN Scan system is the PCAP1 26 27 28 1 Recorder / Capture Card, which is able to record the IP addresses connecting to the 2 Proprietary Client and sending the infringed copies of Plaintiff’s works to the Proprietary 3 Client through the BitTorrent network. Id. ¶¶ 57–59. Not only does a PCAP contain the IP 4 addresses used in the network transaction, it also records the port number and BitTorrent 5 client used to accomplish each transaction, the “BitField” value, which reflects the 6 percentage of the file the infringer possesses and is able to distribute to another peer upon 7 request, and the “Info Hash” associated with the infringing computer file, which reflects 8 the metadata of the particular underlying .torrent file being shared without authorization. 9 Id. ¶¶ 61–62. VXN uses a PCAP Capture Card called Link™ NT40A01 SmartNIC, which 10 records PCAPs in real time, and is able to record perfect copies of every network packet 11 received by the Proprietary Client via a passive network tap. Id. ¶¶ 63–65. Although this 12 Order touches only on two of the components of the VXN Scan system, Mr. Williamson’s 13 82-paragraph Declaration sets forth additional in-depth details of all six components of the 14 system, providing the Court a thorough understanding of how the system reliably pinpoints 15 the IP addresses used by individuals infringing Plaintiff’s movies and verifies the 16 infringement. 17 Second, Plaintiff also provided a declaration by Patrick Paige, a computer forensics 18 expert retained by Plaintiff to analyze and retain forensic evidence captured by the VXN 19 Scan system. ECF No. 4-2 at 17–22 (“Ex. B”). Mr. Paige explains that VXN Scan recorded 20 numerous BitTorrent computer transactions with IP address 76.172.71.23 in the form of 21 PCAPs, and that he reviewed the PCAP to confirm that it evidences a recorded transaction 22 with that IP address on April 6, 2024 at 01:52:52 UTC involving the IP address uploading 23 a piece or pieces of a file corresponding to the hash value that is unique to one of Plaintiff’s 24 movies. Ex. B, ¶¶ 13–26. 25 Third, Plaintiff provided a declaration by Susan Stalzer, one of Plaintiff’s employees 26 who verified that each digital media file obtained using the VXN Scan’s Torrent Collector 27 and Downloader components was a copy of one of Plaintiff’s copyrighted works, by 28 viewing the unauthorized motion pictures corresponding with the file hashes side-by-side 1 with Plaintiff’s original movies. ECF No. 4-2 at 24-32 (“Ex. C”); see also ECF No. 1-2 2 (Exhibit A to the Complaint, listing the hash values of the 28 torrent files received by the 3 Proprietary Client from the IP address 76.172.71.23). 4 Finally, Plaintiff explains that it used Maxmind, a geolocation technology, to trace 5 Defendant’s IP address to a geographic area within this Court’s personal jurisdiction. ECF 6 No. 4-1 at 12-13. To elaborate on this point, Plaintiff provides a declaration by Emilie 7 Kennedy, Plaintiff’s in-house General Counsel. ECF No. 4-2 at 28–30 (“Ex. D”). Ms. 8 Kennedy explains that after Plaintiff received infringement data from VXN Scan 9 identifying IP address 76.172.71.23 as infringing its works, the IP address was 10 automatically input into Maxmind’s Geolocation Database on September 26, 2022 at 11 16:57:46 UTC, which traced the IP address location to San Diego, California, within this 12 Court’s jurisdiction. Ex. D, ¶¶ 4–5. Plaintiff has since repeated the trace through the 13 Maxmind Geolocation Database twice more, prior to filing the Complaint and prior to 14 filing the present Motion, confirming the IP address continues to trace to San Diego and 15 this District. Id. ¶¶ 6–7. The Court is satisfied that these multiple geolocation traces 16 indicating that the Defendant is located in this District are reliably accurate. 17 Based on all of the information above, the Court concludes that Plaintiff has 18 provided a sufficient showing that it seeks to sue a real person subject to the Court’s 19 jurisdiction. Likewise, if Plaintiff obtains the identifying information from the ISP for the 20 subscriber assigned the IP address at issue, the information sought in the subpoena would 21 likely enable Plaintiff to serve Defendant. Therefore, the Court finds Plaintiff satisfied the 22 “sufficient specificity” threshold. 23 b. Previous Attempts to Locate Defendant 24 Next, Plaintiff is required to describe all steps taken to identify the Doe defendant in 25 a good-faith effort to locate and serve them. Plaintiff states that it attempted to locate 26 Defendant by searching for Defendant’s IP address using online search engines and other 27 web search tools. ECF No. 4-1 at 14. Plaintiff also reviewed numerous sources of authority 28 such as legislative reports, agency websites, and informational technology guides, 1 regarding whether it is possible to identify such a defendant by other means, and 2 extensively discussed this issue with its computer investigators and cyber security 3 consultants. Id. Despite these diligent efforts, Plaintiff was unable to identify any means of 4 obtaining the identities of an accused infringer such as Defendant other than through 5 subpoenaing the information from Defendant’s ISP. Id. In his Declaration, Mr. Paige 6 testified that based on his experience in similar cases, Defendant’s ISP, Spectrum, is the 7 only entity that can correlate the IP address 76.172.71.23 to its subscriber to identify 8 Defendant. Ex. B ¶ 28. Thus, the Court finds Plaintiff has shown it has made a good-faith 9 effort to identify and locate Defendant through other means before resorting to filing the 10 instant motion. 11 c. Whether Plaintiff Can Withstand a Motion to Dismiss 12 Lastly, Plaintiff must establish it could survive a motion to dismiss. See Fed. R. Civ. 13 P. 12(b); Columbia Ins., 185 F.R.D. at 579. To survive a motion to dismiss for failure to 14 state a claim upon which relief can be granted, “a complaint must contain sufficient factual 15 matter, accepted as true, to ‘state a claim to relief that is plausible on its face.’” Ashcroft v. 16 Iqbal, 556 U.S. 662, 678 (2009) (quoting Bell Atl. Corp. v. Twombly, 550 U.S. 544, 570 17 (2007)). To present a prima facie case of copyright infringement, Plaintiff must show: (1) 18 ownership of a valid copyright; and (2) that Defendant violated the copyright owner’s 19 exclusive rights under the Copyright Act. Range Road Music, Inc. v. East Coast Foods, 20 Inc., 668 F.3d 1148, 1153 (9th Cir. 2012). In addition, for direct infringement Plaintiff is 21 required to show causation by Defendant. Perfect 10, Inc. v. Giganews, Inc., 847 F.3d 657, 22 666 (9th Cir. 2017). 23 Here, Plaintiff’s Complaint clearly alleges that Plaintiff owns a valid copyright in 24 the works at issue, which are registered with the United States Copyright Office. See ECF 25 No. 1 ¶¶ 43, 46, 49.2 And again, Ms. Stalzer attests that she reviewed the files correlating 26 27 2 Exhibit A to the Complaint, which shows the hash values of the purportedly infringing 28 1 to the hashes identified in Exhibit A to the Complaint and confirmed that they are 2 “identical, strikingly similar or substantially similar” to Strike 3’s original copyrighted 3 works. Ex. C ¶¶ 7–11; ECF No. 1 ¶¶ 34–35. Plaintiff’s Complaint also alleges Defendant 4 used BitTorrent to copy and distribute the copyrighted works without authorization, and 5 that the infringement was continuous and ongoing. ECF No. 1 ¶¶ 4, 19–30, 33, 33–36, 44– 6 46. Thus, Plaintiff’s Complaint has stated a claim for copyright infringement against the 7 Doe Defendant sufficient to survive a motion to dismiss. Additionally, Plaintiff has alleged 8 sufficient facts to show it could withstand a motion to dismiss for lack of personal 9 jurisdiction or a motion for improper venue, because Defendant’s IP address was traced to 10 a location in this District. Accordingly, the Court concludes Plaintiff has met the third 11 prong necessary to establish good cause for granting early discovery. 12 IV. CONCLUSION 13 For the reasons set forth above, and for good cause shown, the Court GRANTS 14 Plaintiff’s ex parte application for leave to serve a subpoena prior to a Rule 26(f) 15 conference. ECF No. 4. However, the Court is cognizant of the potential embarrassment of 16 being identified in this type of case and “shares the growing concern about unscrupulous 17 tactics used by certain plaintiffs, especially in the adult film industry, to shake down the 18 owners of IP addresses.” Malibu Media, LLC v. Does 1-5, No. 12-Civ-2950-JPO, 2012 WL 19 2001968, at *1 (S.D.N.Y. June 1, 2012). Anticipating and sharing these concerns, Plaintiff 20 invites the Court to issue a protective order establishing procedural safeguards if the Court 21 finds such procedures appropriate. ECF No. 4-1 at 18 (citing Strike 3 Holdings, LLC v. 22 Doe, No. 17CV2317-JAH (BLM), 2017 WL 6389848, at *3-*4 (S.D. Cal. Dec. 14, 2017) 23 and Strike 3 Holdings, LLC v. Doe, No. 1:18-CV-12585-NLH-JS, 2020 WL 3567282 24 (D.N.J. June 30, 2020)). Accordingly, the Court ORDERS as follows: 25 1. Plaintiff shall attach a copy of this Order to any subpoena. 26 27 Copyright Office registration information of the works that correspond with those hash 28 1 2. Plaintiff may serve the ISP, Spectrum, with a Rule 45 subpoena commanding 2 the ISP to provide Plaintiff with only the true name and address of the 3 Defendant to whom the ISP assigned an IP address as set forth on Exhibit A 4 to the Complaint. The ISP is not to release the Defendant’s telephone number 5 or email address. 6 3. Plaintiff may also serve a Rule 45 subpoena in the same manner as above on 7 any service provider that is identified in response to a subpoena as a provider 8 of Internet services to Defendant. 9 4. Within fourteen (14) calendar days after service of the subpoena, the ISP shall 10 notify the subscriber that his or her identity has been subpoenaed by Plaintiff, 11 in compliance with 47 U.S.C. § 551(c)(2)(B) (“A cable operator may disclose 12 such [personal identifying] information if the disclosure is . . . made pursuant 13 to a court order authorizing such disclosure, if the subscriber is notified of 14 such order by the person to whom the order is directed.”). The ISP must also 15 provide a copy of this Order along with the required notice to the subscriber 16 whose identity is sought pursuant to this Order. 17 5. The subscriber whose identity has been subpoenaed shall have thirty (30) 18 calendar days from the date of such notice to challenge the disclosure of his 19 or her name and contact information by filing an appropriate pleading with 20 this Court contesting the subpoena. A subscriber who moves to quash or 21 modify the subpoena may proceed anonymously as “John Doe,” and shall 22 remain anonymous until the Court orders that the identifying information may 23 be released. 24 6. If the ISP wishes to move to quash the subpoena, it shall do so before the 25 return date of the subpoena. The return date of the subpoena must allow for at 26 least forty-five (45) days from service to production. If a motion to quash or 27 other challenge is brought, the ISP shall preserve the information sought by 28 Plaintiff in the subpoena pending resolution of such motion or challenge. 1 7. Plaintiff may only use the information disclosed in response to a Rule 45 2 subpoena served on the ISP for the purpose of protecting and enforcing 3 Plaintiff's rights as set forth in its Complaint. If Defendant wishes to proceed 4 anonymously, Plaintiff may not release any identifying information without a 5 court order allowing the release of the information. 6 IT IS SO ORDERED. 7 8 Dated: May 15, 2024 Mice H. Xboiolar he Honorable Allison H. Goddard 10 United States Magistrate Judge 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 11

Document Info

Docket Number: 3:24-cv-00736

Filed Date: 5/15/2024

Precedential Status: Precedential

Modified Date: 6/20/2024