Malibu Media, LLC v. John Does 1-31

297 F.R.D. 323, 2012 WL 9257350, 2012 U.S. Dist. LEXIS 187559
CourtDistrict Court, W.D. Michigan
DecidedAugust 13, 2012
DocketNo. 1:12-CV-616
StatusPublished
Cited by3 cases

This text of 297 F.R.D. 323 (Malibu Media, LLC v. John Does 1-31) is published on Counsel Stack Legal Research, covering District Court, W.D. Michigan primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
Malibu Media, LLC v. John Does 1-31, 297 F.R.D. 323, 2012 WL 9257350, 2012 U.S. Dist. LEXIS 187559 (W.D. Mich. 2012).

Opinion

ORDER

ROBERT J. JONKER, District Judge.

On June 14, 2012, Plaintiff filed five complaints in this District alleging that a number of unnamed, “John Doe” defendants infringed its copyrights. The five cases have been re-assigned under the Court’s cognate cases rule to a single Judge — the Judge randomly selected for the first-filed case. Each “John Doe” Defendant corresponds to an internet protocol (“IP”) address that allegedly used a BitTorrent file-sharing protocol to illegally download and distribute Plaintiffs copyrighted movies. Plaintiff subsequently filed a Motion for Leave to Serve Third Party Subpoenas (docket # 4) on the “John Doe” Defendants’ internet service providers (“ISPs”) to ascertain the true identities of the individual or entity assigned to each IP address, comprising “the true name, address, telephone number, email address, and Media Access Control (“MAC”) address of any such individual or entity.” (docket # 4-3.)

On June 25, 2012, the Court entered an Order to Show Cause “as to why all but the first “John Doe” in each action should not be dismissed from the case without prejudice to Plaintiffs ability to re-file complaints against the remaining defendants in separate actions.” (docket #5.) Specifically, the Court expressed concerns as to whether the “John Doe” defendants were part of “a common transaction or occurrence” that would support joinder under FED. R. CIV. P. 20(a). (Id.) On July 13, 2012, Plaintiff filed a Response in support of joinder in this ease, (docket # 6.) After reviewing all matters of record, including Plaintiffs Complaint and Response, the Court concludes that joinder is improper and therefore DROPS all John Doe Defendants except for John Doe 1 under Fed.R.Civ.P. 21 without prejudice to Plaintiffs ability to re-file independent lawsuits against each dropped John Doe Defendant. The Court also GRANTS Plaintiff Motion for leave to serve third-party subpoenas on the ISP of John Doe 1 Defendant, and DENIES the Motion in all other respects.

BACKGROUND

According to Plaintiff, each of the 16 copyrighted works (collectively, “Works”) that are the basis of this dispute were infringed through the “John Doe” Defendants’ use of a BitTorrent file-sharing protocol, (docket #1.) BitTorrent allows a user, commonly known as the “initial seeder,” to create a “torrent” descriptor file using a software program that the user installed on his or her computer. (Id. at ¶22.) The user then breaks the torrent file into several component parts known as “pieces.” (Id. at ¶ 23.) Each piece is assigned “a random and unique alphanumeric identifier known as a ‘hash,’ ” with the hash being recorded within the torrent file. (Id. at ¶ 24.)

After a torrent file is created, the initial seeder uploads it onto a torrent site. Once uploaded, the BitTorrent protocol causes the initial seeder’s computer to send different pieces of the torrent file to other peers seeking to download the file. (Id. at ¶ 32.) To verify the peer receives a portion of the desired torrent file, the BitTorrent protocol compares the piece’s hash number to the unique hash number associated with the file. (Id. at ¶ 25.) If the hash numbers match, the piece is conclusively determined to be a portion of the desired file. (Id. (“In this way, the hash identifier works like an electronic fingerprint to identify the source and origin of the piece and that the piece is authentic and uncorrupted.”).) Once a peer receives a piece of the file, the BitTorrent protocol enables transmission of this piece to other peers. (Id. at ¶ 34.) In this way, all of the peers and initial seeder form what is called a “swarm” to upload and download portions of the desired file. (Id. at ¶¶ 18, 36.) Each of these “nodes” in the swarm, however, operate independently and without necessarily having any knowledge or even awareness of the other nodes. “Swarms” can include thousands of individual nodes, each operating independently.

[325]*325This independence has some advantages. In particular, traditional peer-to-peer filing sharing necessitates an end user downloading the entire uploaded file from a single source user. In contrast, BitTorrent protocol allows users to upload and download pieces of the file from any number of users. This distributes a large file over multiple, independent nodes, thus avoiding a heavy load on a single source computer and network.1 “One initial seeder can create a torrent [file] that breaks a movie into hundreds or thousands of pieces saved in the form of a computer file,” which can be distributed amongst hundreds or thousands of different users to reduce the data load on a particular peer. (Id. ¶ 37.) After a peer downloads all of the pieces comprising the full torrent file, the pieces are reassembled and the peer is able to view the movie in its entirety. (Id. ¶ 38.) Because of the decentralized and independent BitTorrent protocol, download speeds can be significantly improved.

In this ease, Plaintiff alleges that the Works were combined into a single torrent file by a user (the Initial Seeder) and assigned the unique hash number of 121AC0B46088E7C235-A23D4379BE65A1840E9B77. (Id. ¶ 41.) According to Plaintiff, through the use of forensic software, it was able to isolate the IP addresses that downloaded any part of the file containing Plaintiffs Works based on this unique hash number and, presumably through the use of reverse-lookup technology, was able to determine which of the IP addresses at issue were located in this District.2 Each “John Doe” is associated with one of these IP addresses. (Id. at ¶¶ 41, 42.) Plaintiff alleges that it will be able to demonstrate that “through each of the transactions, each of the [John Doe] Defendant’s computers used their identified IP addresses____in this District in order to transmit a full copy, or portion thereof, of a digital media file identified by the unique hash number.” (Id. at ¶ 45.) Plaintiffs Complaint alleges that the infringement occurred from March 26, 2012 through May 22, 2012. (docket # 1-3.)

ANALYSIS

I. Joinder

Fed.R.Civ.P. 20(a)(2) allows the joinder of defendants if:

(A) any right to relief is asserted against them jointly, severally, or in the alternative with respect to or arising out of the same transaction, occurrence or series of transactions or occurrences; and
(B) any question of law or fact common to all defendants will arise in the action.

“The purpose of [Rule 20] is to promote trial convenience and expedite the final determination of disputes, thereby preventing multiple lawsuits. Single trials generally tend to lessen the delay, expense and inconvenience to all concerned.” Patrick Collins, Inc. v. John Does 1-21, 282 F.R.D. 161, 166 (E.D.Mich.2012) (quoting Mosley v. Gen. Motors Co., 497 F.2d 1330, 1332 (8th Cir. 1974)); see also Pasha v. Jones, 82 F.3d 418

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Strike 3 Holdings, LLC v. Doe
W.D. Tennessee, 2025
LHF Prods., Inc. v. Boughton
299 F. Supp. 3d 1104 (D. Nevada, 2017)

Cite This Page — Counsel Stack

Bluebook (online)
297 F.R.D. 323, 2012 WL 9257350, 2012 U.S. Dist. LEXIS 187559, Counsel Stack Legal Research, https://law.counselstack.com/opinion/malibu-media-llc-v-john-does-1-31-miwd-2012.