Bicycle Peddler, LLC v. Does 1-12

295 F.R.D. 274, 2013 WL 3455849, 2013 U.S. Dist. LEXIS 95184
CourtDistrict Court, N.D. Illinois
DecidedJuly 9, 2013
DocketNo. 13 C 2372
StatusPublished
Cited by2 cases

This text of 295 F.R.D. 274 (Bicycle Peddler, LLC v. Does 1-12) is published on Counsel Stack Legal Research, covering District Court, N.D. Illinois primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Bicycle Peddler, LLC v. Does 1-12, 295 F.R.D. 274, 2013 WL 3455849, 2013 U.S. Dist. LEXIS 95184 (N.D. Ill. 2013).

Opinion

MEMORANDUM OPINION AND ORDER

JOHN J. THARP, JR., District Judge.

Plaintiff The Bicycle Peddler, LLC, brings a complaint for copyright infringement against twelve unnamed “John Doe” defendants who, it alleges, unlawfully acquired and transferred Plaintiffs copyrighted motion picture “Trade of Innocents” (the “Movie”). Plaintiff alleges that it observed the defendants accessing the Movie using BitTorrent protocol, but it has thus far been able to identify the defendants only by their Internet Protocol (“IP”) addresses and the dates and times when they accessed the movie. Plaintiff now moves for leave to subpoena the non-party Internet Service Providers (the “ISPs”) from which the Doe defendants obtain internet access in order to discover the Doe defendants’ true identities. For the reasons explained below, the Court grants Plaintiffs motion for leave to take early discovery. However, the Plaintiff may not publish the identities of the Doe defendants in any way without further leave of court.

BACKGROUND

BitTorrent is a software protocol that facilitates the practice of peer-to-peer file sharing used to distribute large amounts of data over the internet. To share information using BitTorrent, an initial file-provider (the “seeder”) elects to share an initial file, called a “seed,” with a torrent network. The file to be distributed is divided into segments called “pieces.” Other users (“peers”) intentionally connect to the seed file to download it. As each peer receives a new piece of the file, the [276]*276peer also immediately becomes a source of that piece for other peers, relieving the original seeder from having to send that piece to every peer requesting a copy. This is the key difference between BitTorrent and earlier peer-to-peer file sharing systems: “Bit-Torrent makes file sharing a cooperative endeavor.” Sean B. Karunaratne, The Case Against Combating BitTorrent Piracy through Mass John Doe Copyright Infringement Lawsuits, 111 Mich. L.Rev. 283, 290 (2012) (hereafter, The Case Against Mass Joinder). It is “architecturally impossible for any peer on the network to take without giving.” Id. at 288.

After a peer completely downloads the file, it continues to transmit pieces of the file to other users until it disconnects from BitTorrent. As additional peers request and receive pieces of the same file, each user becomes a part of the network from which the file can be downloaded. As more users join the network, the speed and efficiency of downloads increases. The group of seeders and peers uploading and downloading the identical file are called a “swarm.” While connected to the swarm, users continuously download pieces of the file until they have obtained a complete file and continuously upload pieces of the file to other users in the swarm. Even after a user exits the swarm, the identical file pieces that the user downloaded from other users and then shared with peers continue to circulate throughout the swarm. BitTorrent swarms can survive continuously for months or even years.

Plaintiff alleges that the Doe defendants each joined the same BitTorrent swarm to download and upload the Movie. The Plaintiff retained Crystal Bay Corporation (the “Investigator”) to identify the IP addresses of those BitTorrent users who were copying and distributing the Movie. The Investigator used forensic software to isolate swarms distributing the Movie, and produced an exhibit showing the IP addresses of twelve Doe defendants who joined the same swarm and shared identical copies of the Movie. The Investigator confirmed that each of the Doe defendants was in the same swarm because each downloaded file was identified by the same “hash checksum.” A hash checksum is a string of alphanumeric characters generated by applying a mathematical algorithm to a digital file; any differences in the digital file will cause the algorithm to produce a different result. The Investigator then used geolocation functionality to confirm that each of the IP addresses it identified was located in Illinois. Although IP addresses do not reveal the names or the contact information of the subscribers, they do reveal the location of the internet line used for the transaction, and the Plaintiff confirmed that the internet lines appear to be located in cities and towns within this district. The Investigator also reported that each Doe defendant participated in the swarm between December 2, 2012, and February 12, 2013. Some of the Doe defendants participated in the swarm within minutes of one another, but others participated days or months apart from one another. For example, Doe 1 participated in the swarm more than 70 days after Doe 12 had participated.

Plaintiff seeks leave to subpoena the ISPs associated with the IP addresses it has identified as belonging to users who participated in the swarm. Plaintiff will ask the ISPs to provide information sufficient to identify each Doe defendant.

DISCUSSION

Fed.R.Civ.P. 26(d) prohibits parties from seeking discovery “from any source” before the parties have conferred in accordance with Rule 26(f), except when authorized by the Federal Rules of Civil Procedure, stipulation, or a court order. District courts have broad discretion in managing the discovery process. See James v. Hyatt Regency Chicago, 707 F.3d 775, 784 (7th Cir.2013). Courts “evaluate a motion for expedited discovery ‘on the entirety of the record to date and the reasonableness of the request in light of all the surrounding circumstances.’ ” Ibarra v. City of Chicago, 816 F.Supp.2d 541, 554 (N.D.Ill.2011) (quoting Merrill Lynch, Pierce, Fenner & Smith, Inc. v. O’Connor, 194 F.R.D. 618, 624 (N.D.Ill.2000)). Under the circumstances at hand, it is reasonable to allow the Plaintiff the opportunity to discover the Doe defendants’ true identities prior to any Rule 26(f) conference. The Plaintiff [277]*277seeks to discover only the names, mailing addresses, telephone numbers, e-mail addresses, and MAC addresses1 of the Doe defendants. The Plaintiff needs this expedited discovery because it will otherwise be unable to maintain this litigation, as it has no other way of identifying the defendants. And the defendants will not be burdened by the Plaintiffs requests, as their ISPs, rather than the defendants themselves, will be required to respond to the subpoenas.

One issue that bears further discussion is the Plaintiffs joinder of multiple Doe defendants in a single civil complaint. A plaintiff may join defendants in a suit presenting any question or law or fact common to all defendants if “any right to relief is asserted against them jointly, severally, or in the alternative with respect to or arising out of the same transaction, occurrence, or series of transactions or occurrences.” Fed.R.Civ.P. 20(a)(2)(A). There is a split of authority nationally and within this district over whether it is appropriate to join in a single lawsuit many anonymous defendants who are alleged to have participated in a single BitTorrent swarm. Compare, e.g., Malibu Media, LLC v. Does 1-6, 291 F.R.D. 191, 202-03, 2013 WL 2150679, *11 (N.D.Ill.2013) (allowing joinder); Pacific Century Int’l v. Does 1-31, No. 11 C 9064, 2012 WL 2129003, *3 (N.D.Ill.

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Cite This Page — Counsel Stack

Bluebook (online)
295 F.R.D. 274, 2013 WL 3455849, 2013 U.S. Dist. LEXIS 95184, Counsel Stack Legal Research, https://law.counselstack.com/opinion/bicycle-peddler-llc-v-does-1-12-ilnd-2013.