Category Archives: Privacy

Unintended consequences of winning the war against trolls.

[2017 UPDATE: Little did I know that I accurately predicted what would happen, but I got the entities wrong.  Since the April 2016 breakup of the Lipscomb/Guardaley relationship, new Guardaley kingpin Carl Crowell has created a new entity called RIGHTS ENFORCEMENT which has reverse-engineered CEG-TEK’s proprietary DMCA copyright infringement notice system.  Many of you have visited this link thinking that RIGHTS ENFORCEMENT was somehow related to CEG-TEK (at first, I thought so too), but really it is an ‘evil twin’ competitor.  In sum, apparently my concerns about CEG-TEK becoming corrupted where one bittorrent click would result in tens/hundreds of infringement notices may have actually have happened, but I got the entity wrong.  It wasn’t CEG-TEK, it was Crowell’s reverse-engineered ‘evil twin’ copy of CEG-TEK which we now see in RIGHTS ENFORCEMENT. Still, read on so that you’ll understand the issues.]

Every pirate knows that the only way to block the copyright trolls from identifying their true IP addresses (and thus sending out DMCA copyright infringement notices, as outfits such as CEG-TEK have been known to do) is through the use of a Virtual Private Network (VPN) [, and not just any VPN, but a paid VPN provider which does not track their subscribers’ activities*].

In recent weeks, I have heard from various copyright trolls that bittorrent users are “winning the piracy war,” in that their activities have thwarted the copyright holders from learning who they are. Armed with what is becoming common knowledge of free software which can be configured to stream pirated content (e.g., Kodi, formerly XBMC), internet users who wish to “unplug” from the cable companies are able to do so in a way in which it becomes difficult if not next to impossible to be caught viewing streamed content**. Not only this, but many have even purchased Amazon Fire sticks which can be jailbroken to allow the Kodi software to be installed on it, and they are watching pirated videos from their HDTV without even needing a computer.***

But what is the effect of “winning the war” on those who are left behind and don’t realize that they need to use a VPN if they are going to bittorrent their favorite movie, software, or video game? This is the point of the article.

The unintended consequence of bittorrent users learning to use a VPN, or migrating away from bittorrent and towards free streaming services is that copyright holders [who for three years now have enjoyed easy settlement money] are realizing that there simply are not enough people to send DMCA / copyright infringement notices to in order to line their pockets with gold and dirty cash. As a result, it is my experience that they are becoming “less nice” and they are trying to make more money from fewer downloaders. Case-in-point: Girls Gone Wild DMCA notices used to ask for one $300 settlement for a whole page of 60+ videos, but now they are asking for tens of thousands of dollars for that same “click” of a bittorrent file.

I am also noticing that CEG-TEK is acting differently, perhaps in response to what has been described to me as a steep decline in numbers of “pirates” to whom they can send DMCA notices. In the past few weeks, it has been my experience that Copyright Enforcement Group (CEG-TEK) is now sending multiple notices out to the ISPs for the same download. In one case regarding their Girls Gone Wild client that I mentioned above, CEG-TEK sent literally over 1,000 notices to one ISP for the alleged download of one bittorrent file.

At first I thought this was a glitch in their computer system, but then it occurred to me that maybe CEG-TEK somehow benefits from keeping the numbers of DMCA notices sent to the ISPs artificially high. Is there any benefit to them to be doing this? I have been racking my brain on this topic and I still cannot come up with a reason.

Honestly, here is my concern. When an animal is backed against the wall, what does it do? It attacks. If indeed we are winning the bittorrent piracy war, I am concerned that CEG-TEK will begin taking on new clients who thrive on stacking their bittorrent files with hundreds of adult films. Those who are sophisticated will understand exactly who I am speaking about.

They will then trap the unsuspecting bittorrent user who “clicks on a bittorrent file” in their spider web, and that user will receive hundreds of DMCA notices which will scare the b’jeebies out of him.  Then they will give in to the urging of their less-than-ethical client, and they will agree to start charging more than the $300 per title that they currently do (remember, at one point, CEG-TEK used to charge $200 per title, and then at what I understood to be the urging of their client, they raised the settlement amount to $300 per title).  So they are pliable, as we have seen in the past.

In the end, just as we saw hints of this with the recent Girls Gone Wild debacle, CEG-TEK will morph from a $300 per title copyright enforcement outfit (lamb) into a $3,500 per title shakedown outfit (wolf) where they base their settlement amounts on the client’s ability to pay rather than what they believe is a “fair” amount to compensate the copyright holders.

Last, but not least, I learned that CEG-TEK threatened an accused downloader with criminal prosecution this week. For those of you who know me, I have spent almost every day since 2010 working on copyright infringement cases. NEVER until last week have I seen a copyright holder threaten an accused internet user with criminal charges for a copyright infringement matter.

In sum, the times they are a changin’. If we are indeed winning the war, what will CEG-TEK turn into in order to survive?  And, what will their copyright holders (who for the most part have been docile and lazy these past few years) do when their easy income stream dries up?


CONTENT CUT FROM THE ARTICLE:

*[UNRELATED PERSONAL NOTE: I am a fan of such VPN providers not because they make piracy more difficult to detect, but because I believe strongly in a person’s right to be anonymous. The amount of snooping that happens with internet trackers, cookies, and newer methods literally sickens me, and I do not believe that advertising companies and ISPs should have so much knowledge about their customers. For this reason, I have nothing wrong with sharing for privacy purposes that examples of VPNs that you can rely on can be easily found by searching “torrentfreak secure vpn” on Google, or just by going to TorrentFreak’s website where they review VPN providers which take your anonymity seriously. Just be sure to have some mechanism in place that if the VPN connection goes down, even for a second, that your real IP isn’t exposed to whatever site you happen to be visiting, or to whatever server you happen to be connected to. This is called a “DNS leak,” and there are easy ways to configure your system to lock down the connection if or when the VPN goes down, even for a second.]

** NOTE: There is a popular software called PopcornTime which I am sad to share has given our firm many clients who have been caught downloading mainstream movies (e.g., The Dallas Buyers Club cases, Voltage Pictures’ Fathers & Daughters Nevada, LLC cases, and most recently, Millennium Film’s London Has Fallen (“LHF”) movie cases, etc.). Most recently, I have been seeing new CEG-TEK notices for Millennium Film’s “Criminal” movie which the copyright holders have already started suing in “Criminal Productions, Inc. v. John Doe” copyright infringement lawsuits . The reason for so many getting caught is that PopcornTime appears to be a software which allows you to stream video content, but it uses bittorrent as its back-end to download the movies.

*** NOTE: The Amazon Fire sticks which have Kodi installed in my opinion can still get you caught for copyright infringement. The reason for this is that they connect directly to the internet exposing your real IP address. Most people don’t realize that they need to also configure their ROUTER to connect to the internet through their paid VPN provider.


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.

Need to rehash some bittorrent concepts because they are just as relevant today as they were five years ago.

In July, 2010, this blog was started to address the at-the-time unknown problem of copyright trolling.  For years, myself and my staff wrote articles explaining the business model of copyright trolling, which at the time was an adaptation of patent trolling (where “patent trolls” would file [often frivolous] lawsuits against alleged infringers who refused to pay what appeared to be a “shakedown” of the patent holders [e.g., “pay us or else you will end up having to pay even more to defend the claims against you in a federal court”], even when the patent being asserted against the would-be infringer had absolutely nothing to do with the product the targeted company was producing).

There were common threads between patent trolls and copyright trolls, and as the cases developed, there were common themes of how a copyright troll must act to make his model of extorting the public (the bittorrent internet users) profitable.  At the time, that included questions of 1) where and how can a copyright enforcement company or lawyer sue a group of defendants (personal jurisdiction), 2) how to link non-related downloaders into a cohesive set of defendants into a cohesive set of “John Doe Defendants,” (joinder, and my controversial strategy to force a copyright troll to sue the entire bittorrent swarm when a defendant is named and served) and 3) how to avoid risking the potential settlements from hundreds or thousands of accused bittorrent users by moving forward and “naming and serving” one or more defendants.  There were also time limits they faced based on a) how long the ISPs retained the records of which IP address was leased to which account holder / subscriber, b) statute of limitations on how long a copyright holder has to file a lawsuit, and c) how long a copyright troll attorney may keep a case alive before a judge imposes the time limits described in the Federal Rules of Civil Procedure (FRCP Rule 4m, a.k.a. the “120 Day Rule”).

Then, over the years, there arose a confusion under the discussions of “net neutrality” asking questions such as whether an internet service provider (ISP) was governed under the cable act, and if so, under what title.  The reason for this was that there were allegations that various ISPs were outright sharing the contact information of its subscribers without valid court orders to do so, thus violating the privacy rights of its subscribers.

In sum, there were a lot of issues, and we tackled each one over the course of almost five years.  The goal was to educate the bittorrent user and the accused downloader about the issues so that they understand how to act, react, and in many cases, fight against a group of attorneys with questionable ethics.

The problem is that these articles — the ones that have been so helpful to tens of thousands of accused defendants — these articles have been buried by the search engines because they are simply now aging and many articles are now many years old.  An accused defendant can no longer search for a “copyright troll” on Google and find any of my older articles.  [And, enterprising attorneys (and good for them) have put up websites containing SEO-based content full of keywords in hackneyed sentences, but devoid of useful content (e.g., the “contact our law firm, we can help you with your copyright troll lawsuit issue” type of website), while what I consider to be the “useful” content (not only mine, but content written by other attorneys in their blogs, and proactive users [really, trailblazers such as “Sophisticated Jane Doe” of FightCopyrightTrolls and “DieTrollDie”] in their respective blogs) is no longer accessible by typing the name of the particular copyright troll, issue, or case that has been recently filed.

What I will be doing to remedy this as far as this blog is concerned — and I apologize up front to the thousands of you who get updated on each and every article that I or a staff member of mine writes — is that I need to rehash some of the “older” content on the educational topics that I have already covered in the blog ad nauseam. The reason for this is that the older content explaining the legal concepts in terms of the bittorrent lawsuits (and now in terms of the DMCA letters being sent to subscribers through the ISPs) is just as relevant today as it was five years ago.  There has been little-to-no judicial or legal oversight of the copyright trolls from the attorney generals of each state and from the lawmakers (both federal and in each state), and the problem and issues surrounding “copyright trolling” is just as relevant today as it was almost five years ago.

For these reasons, I need to violate my own preference not to repeat information or content that has already been described or hashed-out in previous articles (my opinion is that one article describing a topic is enough, and writing multiple articles containing the same topic “waters down” or “cheapens” the content of a website).  The reason I now feel the need to rehash some of the older topics is to re-teach those who have not yet been victimized by the copyright trolls, as my older articles are no longer found, even by those looking for that particular topic.

ALSO.  Copyright trolls are now enjoying a seed of legitimacy by the courts, where once upon a time us defense attorneys were “winning” the cases by arguing concepts such as “an IP address does not equal a person,” or “my client had an open wireless router, it could have been anyone who downloaded this video,” the arguments themselves have also aged and are now increasingly being ignored by the courts, even though the arguments remain “an elephant in the room,” meaning, just as valid today as they were yesterday.  On the flip-side, faulty and failed arguments (e.g., “are you negligent if you let someone else use your internet connection to commit copyright infringement” [Answer: NO!]) are being reasserted by the copyright trolls, and to my utter disbelief, they are not immediately being dismissed by the judges as being a faulty argument.

Copyright trolling has not changed in the past five years, and the successful arguments defending a case do not deserve to be ignored just because they have been used successfully by defendants in older lawsuits which too are aging.  Ignoring good case law is contrary to law, as successful arguments in one jurisdiction are binding on all other judges in that federal district, and are persuasive on cases in the federal districts in other cases.  Yet, I see more and more lawlessness in judges who ignore the case law from not only other jurisdictions, but from their own jurisdiction as well (creating a “split” in the court), and they are denying a John Doe defendant’s ability to assert what was a successful argument in another court (even one binding upon them in their own jurisdiction).

In sum, judges are allowing plaintiff copyright holders to sue larger number of defendants each week, even though nothing has changed making this new trend permissible (in my opinion, whether 200 defendants were sued by a plaintiff attorney in one lawsuit or in ten cases [having 20 defendants in each case] filed in the same week still means that 200 defendants were sued; it does not matter that the plaintiff made the cases “appear” to be smaller, especially if they are implicating the same bittorrent swarm in each of the ten cases).

Remember, the underlying copyright troll business model of “shakedown, extort thousands of dollars from each defendant, but avoid moving forward against anyone [but pretend that you are prepared to move to trial]” is still the same as it was five years ago. It should not matter whether the content of the lawsuit is a Hollywood movie or an adult film.

[2017 UPDATE: Carl Crowell has created a new entity called RIGHTS ENFORCEMENT which has reverse-engineered CEG-TEK’s proprietary DMCA copyright infringement notice system.  Many of you have visited CEG-TEK links thinking that RIGHTS ENFORCEMENT was CEG-TEK, but really they are an ‘evil twin’ competitor.  Since the two entities operate almost the same way, e.g., sending DMCA copyright infringement notices to the subscriber directly via the ISP, this article is also relevant to RIGHTS ENFORCEMENT.]


CONTACT FORM: If you have a question or comment about what I have written, and you want to keep it *for my eyes only*, please feel free to use the form below. The information you post will be e-mailed to me, and I will be happy to respond.

NOTE: No attorney client relationship is established by sending this form, and while the attorney-client privilege (which keeps everything that you share confidential and private) attaches immediately when you contact me, I do not become your attorney until we sign a contract together.  That being said, please do not state anything “incriminating” about your case when using this form, or more practically, in any e-mail.