Opinion
22-cv-00477-BAS-BGS
05-05-2022
ORDER GRANTING EX PARTE APPLICATION FOR LEAVE TO SERVE THIRD PARTY SUBPOENA PRIOR TO RULE 26(F) CONFERENCE
[ECF No. 4]
HON. BERNARD G. SKOMAL UNITED STATES MAGISTRATE JUDGE
Before the Court is Plaintiff Strike 3 Holdings, LLC's (“Plaintiff”) Ex Parte Application for Leave to Serve a Third-Party Subpoena Prior to a Rule 26(f) Conference. (ECF No. 4.) Since no defendant has been named or served, there have been no opposition or reply briefs filed. For the reasons discussed below, the Court GRANTS Plaintiff's application.
I. BACKGROUND
On April 8, 2022, Plaintiff filed its Complaint against Defendant John Doe subscriber assigned Internet Protocol (“IP”) address 24.165.82.242 (“Doe Defendant”) for copyright infringement. (ECF No. 1.) On April 29, 2022, Plaintiff filed an Ex Parte Application seeking leave to serve a third-party subpoena to ascertain the identity of the Doe Defendant. (ECF No. 4.)
In its Complaint, Plaintiff asserted that Defendant is liable for direct copyright infringement. (ECF No. 1 at 7-9.) Plaintiff alleged it owns the copyrights for movies it distributes through adult websites and DVD sales. (Id. at 1-4.) Plaintiff alleged Doe Defendant used BitTorrent, a peer-to-peer file sharing system, to copy and distribute its movies without consent. (Id. at 4-7.) As discussed further below, to identify the IP address that was illegally distributing its works, Plaintiff utilized its proprietary forensic software, VXN Scan (“VXN”). (Id. at 5-7; ECF No. 4-1 at 7.)
As it can only identify the Doe Defendant by the IP address used, Plaintiff requested permission to serve a Federal Rule of Civil Procedure 45 subpoena on the Internet Service Provider (“ISP”), Spectrum, that issued the IP address to Doe Defendant. (ECF No. 4-1 at 7-8.) The proposed subpoena only demands the name and address of Doe Defendant, and Plaintiff indicated it will only use this information to prosecute claims in the Complaint. (Id. at 8.)
Plaintiff claimed that good cause exists to grant the Ex Parte Application because: (1) Plaintiff has identified Doe Defendant with sufficient specificity through geolocation technology and forensic investigation; (2) Plaintiff has identified all previous steps taken to locate Doe Defendant; (3) Plaintiff's Complaint could withstand a motion to dismiss; and (4) Plaintiff has established that there is a reasonable likelihood that Plaintiff can identify the Doe Defendant and effectuate service. (Id. at 11-18.)
II. STANDARD OF REVIEW
Absent a court order, discovery is generally not allowed prior to the parties' Federal Rule of Civil Procedure 26(f) conference. See Fed.R.Civ.P. 26(d)(1). Early discovery to identify a defendant may be warranted given “a plaintiff cannot have a discovery planning conference with an anonymous defendant.” UMG Recordings, Inc. v. Doe, No. C-08-03999-RMW, 2008 WL 4104207, at *2 (N.D. Cal. Sept. 2008). To determine if early discovery is warranted in a particular case, the court applies a “good cause” test by weighing the need for discovery to further justice against the prejudice it may cause the opposing party. Semitool, Inc. v. Tokyo Electron Am., Inc., 208 F.R.D. 273, 276 (N.D. Cal. 2002); see also Strike 3 Holdings, LLC v. Doe, No. 17-CV-2317-JAH-BLM, 2017 WL 6389848, at *1 (S.D. Cal. Dec. 2017) (citing Semitool, 208 F.R.D. at 274).
The Ninth Circuit has held that when a defendant's identity is unknown at the time a complaint is filed, courts may grant a plaintiff leave to take early discovery to determine the defendant's identity “unless it is clear that discovery would not uncover the identit[y], or that the complaint would be dismissed on other grounds.” Gillespie v. Civiletti, 629 F.2d 637, 642 (9th Cir. 1980); see also Strike 3 Holdings, LLC v. Doe, No. 20CV948-WQH-MSB, 2020 WL 8674127, at *2 (S.D. Cal. July 2020).
District courts in the Ninth Circuit apply a three-factor test to determine whether good cause exists to allow for expedited discovery to identify Doe defendants. Strike 3 Holdings, LLC v. Doe, No. 21-CV-01899-BAS-JLB, 2021 WL 5908968, at *2 (S.D. Cal. Dec. 2021) (citing Columbia Ins. Co. v. Seescandy.com, 185 F.R.D. 573, 578-80 (N.D. Cal. 1999)). “First, the plaintiff should identify the missing party with sufficient specificity such that the Court can determine that [the] defendant is a real person or entity who could be sued in federal court.” Columbia Ins. Co., 185 F.R.D. at 578. Second, the plaintiff “should identify all previous steps taken to locate the elusive defendant” to ensure that the plaintiff has made a good faith effort to identify and serve process on the defendant. Id. at 579. Third, the plaintiff “should establish to the Court's satisfaction that [the] plaintiff's suit against [the] defendant could withstand a motion to dismiss.” Id. “Lastly, the plaintiff should file a request for discovery with the Court, along with a statement of reasons justifying the specific discovery requested as well as identification of a limited number of persons or entities on whom discovery process might be served and for which there is a reasonable likelihood that the discovery process will lead to identifying information about [the] defendant that would make service of process possible.” Id. at 580.
III. DISCUSSION
A. Identification of the Doe Defendant with Sufficient Specificity
Plaintiff has identified the Doe Defendant with sufficient specificity to enable the Court to determine if Doe Defendant is a real person, subject to the Court's jurisdiction. Columbia Ins., 185 F.R.D. at 578; see also Distinct Media Limited v. Doe Defendants 1-50, Case No. 15-cv-3312-NC, 2015 WL 13389609, *2 (N.D. Cal. Sept. 2015). To determine whether a doe defendant has been identified with sufficient specificity, courts look to whether a plaintiff provided “the unique IP address[ ] assigned to an individual defendant on the day of the allegedly infringing conduct” and used “‘geolocation technology' to trace the IP addresses to a physical point of origin.” 808 Holdings, LLC v. Collective of Dec. 29, 2011 Sharing Hash, Case No. 12CV00186-MMA-RBB, 2012 WL 12884688, at *4 (S.D. Cal. May 2012) (collecting cases). Identifying the unique IP address and location of the IP address has been shown to meet the requirement for identifying a doe defendant with sufficient specificity. Id.
Plaintiff has submitted several declarations in support of its request to serve a Rule 45 subpoena: David Williamson, Plaintiff's Chief Technology Officer; Patrick Paige of Computer Forensics LLC, retained to analyze forensic evidence captured by Plaintiff's infringement detection system; Susan B. Stalzer, an employee of Plaintiff that verifies infringing files are identical or strikingly similar to Plaintiff's works; and Emile Kennedy, Plaintiff's in-house General Counsel who verifies the infringing IP address traces to San Diego. (See ECF No. 4-2 [Ex Parte Appl, Exs. A (“Williams Decl.”), B (“Paige Decl.”), C (“Stalzer Decl.”), and D (“Kennedy Decl.”)].)
Here, Plaintiff has identified the Doe Defendant with sufficient specificity. Mr. Williamson's declaration explains that he “oversaw the design, development, and overall creation of the infringement detection system called VXN Scan[, ] which [Plaintiff] both owns and uses to identify the IP addresses used by individuals infringing Plaintiff's movies via the BitTorrent protocol.” (Williamson Decl. at ¶ 40.) One part of the VXN Scan system involves the development of a proprietary BitTorrent client that emulates the behavior of a standard BitTorrent client by repeatedly downloading data pieces from peers within the BitTorrent network that are distributing Plaintiff's movies. (Id. at ¶¶ 52-56.) Mr. Williamson's declaration also explains that another component of the VXN Scan system is the PCAP Recorder that uses a PCAP Capture Card, which can record the IP addresses connecting to the Proprietary Client and sending the infringed copies of Plaintiff's work to the Proprietary Client through the BitTorrent network. (See id. at ¶¶ 57-70.) A PCAP contains the IP addresses used in the network transaction, the port number and BitTorrent client used to accomplish each transaction, and the “Info Hash” associated with the infringing computer file, which identifies the data that was shared in the recorded transaction as part of the specific digital media file, i.e., an infringing copy of Plaintiff's copyrighted works. (Id. at ¶¶ 61-62.) The PCAP Capture Card records perfect copies of every network packet received by the Proprietary Client. (Id. at ¶ 65.)
PCAP stands for “Packet Capture.” (Williamson Decl. ¶ 58.)
Mr. Williamson's declaration sets forth additional in-depth details regarding all components of the system.
Mr. Paige's declaration explains that the VXN Scan recorded numerous BitTorrent computer transactions with IP address 24.165.82.242 in the form of PCAPs. (Paige Decl. at ¶¶ 13-16.) Mr. Paige then reviewed the PCAP to confirm that it evidences a recorded transaction with that IP address on March 10, 2022 at 03:11:10 UTC involving the IP address uploading a piece or pieces of a file corresponding to a specific hash value to VXN Scan. (Id. at ¶¶ 16-18.) He then explains that based on his experience in similar cases, Defendant's ISP is the only entity that can correlate the identified IP address to its subscriber to pinpoint Defendant's identity. (Id. at ¶ 28.)
Ms. Stalzer's declaration explains that she viewed the unauthorized motion pictures corresponding with the file hashes side-by-side with Plaintiff's original movies and verified that each digital media file obtained from the VXN's Torrent Collector and Downloader components is a copy of one of Plaintiff's copyrighted works. (Stalzer Decl. at ¶¶ 10-11.) And finally, Ms. Kennedy's declaration explains that she used Maxmind's Geolocation Database to trace the infringing IP address to San Diego, California, within this Court's jurisdiction, on April 1, 2022. (Kennedy Decl. at ¶¶ 4-7.)
Plaintiff has identified the missing party with such “sufficient specificity” so as to assure the Court that the Doe Defendant is real, subject to the Court's jurisdiction, and able to be sued. Columbia Ins., 185 F.R.D. at 578.
B. Previous Steps Taken to Locate Doe Defendant
Plaintiff has sufficiently described all prior attempts it has made to identify Doe Defendant. Columbia Ins., 185 F.R.D. at 579. This element is aimed at ensuring that “plaintiffs make a good faith effort to comply with the requirements of service of process and specifically identify defendants.” Id. In addition to the efforts described above to trace the infringing activity to the IP address, Plaintiff has asserted that it has searched for Doe Defendant's IP address “on various web search tools [and] review[ed] numerous sources of authority, ” including technology guides and agency websites, but has not been able to identify Defendant. (ECF No. 4-1 at 14.) Further, Plaintiff has “discussed the issue at length with computer investigators and cyber security consultants [and] does not know how else it could possibly enforce its copyrights from illegal piracy over the Internet.” (Id.) Therefore, the Court finds that Plaintiff has made a good faith effort to identify the Doe Defendant.
C. Ability to Withstand a Motion to Dismiss
Plaintiff has also demonstrated that its claim could withstand a motion to dismiss. This requires Plaintiff to “make some showing that an act giving rise to civil liability actually occurred and that the discovery is aimed at revealing specific identifying features of the person or entity who committed that act.” Columbia Ins., 185 F.R.D. at 580.
A claim may be dismissed pursuant to Rule 12(b) for lack of subject matter jurisdiction or for failure to state a claim. Fed.R.Civ.P. 12(b)(1), 12(b)(6). To prevail on a copyright infringement claim, Plaintiff must show: (1) ownership of a valid copyright; and (2) that the defendant violated the copyright owner's exclusive rights under the Copyright Act. See Perfect 10, Inc. v. Giganews, Inc., 847 F.3d 657, 666 (9th Cir. 2017); Ellison v. Robertson, 357 F.3d 1072, 1076 (9th Cir. 2004) (citing 17 U.S.C. § 501(a)). “Direct infringement requires the plaintiff to show causation (also referred to as ‘volitional conduct') by the defendant.” Perfect 10, 847 F.3d at 666.
Here, Plaintiff's Complaint alleged subject matter jurisdiction under 28 U.S.C.§ 1331 (federal question) and 28 U.S.C. § 1338 (jurisdiction over copyright actions). (ECF No. 1 at 2.) Further, Plaintiff provided evidence that it is the exclusive rights holder of the copyrighted works at issue. (See ECF Nos. 1-2, 1-3.) Plaintiff alleged that Defendant infringed Plaintiff's copyrighted work via the BitTorrent file distribution network. (ECF Nos. 1 at 7-9, 1-3 at 1-4.) Plaintiff also alleged that it did not permit or consent to Doe Defendant's copying or distribution of this work. (ECF No. 1 at 7.) Accordingly, Plaintiff has alleged the prima facie elements of direct copyright infringement and could withstand a motion to dismiss for failure to state a claim. See Columbia Ins., 185 F.R.D. at 579-80. Additionally, the Court finds that the Complaint could withstand a challenge based on personal jurisdiction or venue. As discussed at length above, Plaintiff has traced the infringing conduct to this district. (See Section III.A.)
Exhibit A is a chart containing United States Copyright Office registration information. In its Complaint, Plaintiff states that it “owns the copyrights to the Works and the Works have been registered with the United States Copyright Office.” (ECF No. 1 at 7.)
D. Requested Discovery Will Lead to Identifying Information
Finally, Plaintiff has satisfied the last element required in Columbia Insurance by demonstrating the requested discovery will lead to identifying information about Doe Defendant that would make service of process possible. Columbia Ins., 185 F.R.D. at 580. As explained above, Plaintiff's investigation has revealed a unique IP address. Due to the fact that the only entity able to correlate an IP address to a specific individual is the ISP, Spectrum, the requested Rule 45 subpoena would lead to information making physical service of process possible.
IV. CONCLUSION AND ORDER
The Ex Parte Application (ECF No. 4) is GRANTED. Accordingly, IT IS HEREBY ORDERED that:
1. Plaintiff may serve the ISP, Spectrum, with a Rule 45 subpoena commanding the ISP to provide Plaintiff with the true name and address of the subscriber assigned the IP address 24.165.82.242. Plaintiff may not subpoena additional information about the subscriber and Plaintiff may only use the disclosed information to protect its copyrights in pursing this litigation.
2. Plaintiff shall attach a copy of this Order to any Rule 45 subpoena issued pursuant to this Order and the ISP must also provide a copy of this Order along with the required notice to the subscriber whose identify is sought.
3. Within fourteen (14) calendar days after the service of the subpoena, the ISP shall notify the subscriber that its identity has been subpoenaed by Plaintiff.
4. The subscriber whose identity has been subpoenaed shall have thirty (30) calendar days from the date of such notice to seek a protective order or challenge the disclosure by filing an appropriate pleading with this Court contesting the subpoena. The subscriber may proceed anonymously as a Doe Defendant until the Court orders otherwise.
Plaintiff's Ex Parte Application specifically states that Plaintiff is not opposed and “in fact welcomes” allowing Defendant to proceed anonymously. (ECF No. 4-1 at 18.)
5. If the ISP wishes to move to quash the subpoena, it shall do so before the return date of the subpoena. The return date of the subpoena must allow for forty-five (45) calendar days from service to production. If a motion to quash or other customer challenge is brought, the ISP shall preserve the information sought by Plaintiff in the subpoena pending resolution of such motion or challenge.