Post on 22-Jan-2023
The P2P Threat From Your PC November 16, 2004
Robert Steinberg
Yury Kapgan*
* Robert Steinberg is a partner in the corporate and litigation departments, as well as a member of both the Venture
& Technology and Intellectual Property and Technology practice groups in the Los Angeles office of Latham & Watkins. Bob has a J.D. from Georgetown University and B.S. degrees in Systems Science Engineering and Economics from the University of Pennsylvania. Bob has an extensive background in business, law and engineering. His practice focuses on all aspects of negotiations, transactions and litigation and rights acquisitions concerning technology and media. He has represented start-up companies, emerging and middle market companies, major international corporations, entertainment studios, venture capitalist and investment banks, including companies such as America Online, Broadcom and Disney.
Yury Kapgan is an associate in the corporate and litigation departments at Latham & Watkins in Los Angeles. He has a J.D. from the University of California, Boalt Hall School of Law and a B.A. from UCLA.
Special thanks to Roxanne Christ and Dan Schecter, partners in the Los Angeles office of Latham & Watkins, for their comments on this paper.
The positions and opinions taken by the authors are not necessarily representative of their employers or clients. This notice also disclaims any responsibility with regard to actions taken or results obtained on the basis of this paper.
© Copyright 2004 Latham & Watkins LLP. All rights reserved. Latham & Watkins operates as a limited liability partnership worldwide, with an affiliate in the United Kingdom and Italy, where the practice is conducted through an affiliated multinational partnership.
Page 1
I. INTRODUCTION
Not since the advent of the VCR over 20 years ago has copyright law had the potential to affect
the behavior of so many Americans so significantly. The computer technology at the heart of the recent
uproar over Internet file-sharing is used by tens of millions Americans for downloading music.1 Peer-to-
peer (P2P) technology essentially permits the trading online of music, movies, videogames, and
practically any other file between the hard-drives of participating home computers.2
It should not be a surprise that such file-sharing has garnered a great deal of attention from big
business as well as big government. The recording and motion picture industries in particular have
come to believe that P2P is to blame for their declining revenues, especially the revenue decline seen by
the music industry,3 which has suffered a 31 percent drop in compact disc sales since mid-2000.4 In
response to this perceived threat to their livelihood, the major recording labels, their distributors, and the
Recording Industry Association of America (RIAA), as well as film studios, performers, and various other
associated parties have launched scores of lawsuits. Starting with P2P service providers like Napster,
Aimster, Kazaa, Grokster, and StreamCast, these suits have swelled to include individual downloaders,
financial investors and traditional Internet service providers (ISPs) who refused to reveal clients’ names
in the face of subpoenas.5 The Motion Picture Association of America (MPAA) and most of the large
movie studios are now following the recording industry’s lead by suing individuals who download
movies illegally.6
Though the infamous Napster cases7 decidedly carved out the copyright landscape for P2P
technology, the law on point has become part of a dynamic process whose twists and turns have been
1 See, e.g., Carl Bialik, “Key Questions in Crackdown On File Sharing by Music Firms,” Wall Street Journal Online
(June 30, 2003), available at http://www.mediadefender.com/press%20about%20MD/wsj_6_30_03.htm.
2 In a conventional Internet system, users access information from servers rather from each other. A peer-to-peer system is premised on the goal of allowing users to communicate directly with each other, such that each user becomes both a client and a server that can both receive and disseminate information. See Damien A. Riehl, Peer-to-Peer Distribution Systems: Will Napster, Gnutella, and Freenet Create a Copyright Nirvana or Gehenna?, 27 Wm. Mitchell L. Rev. 1761, 1765 (2001).
3 By some estimates, the record industry’s profits have tumbled “about 10 percent annually for the past few years.” Rebecca Dana, Colleges Tackle Music Piracy, Washington Post (August 28, 2003), available at http://stacks.msnbc.com/news/958371.asp.
4 Jeordan Legon, 261 Music File Swappers Sued; Amnesty Program Unveiled (Jan. 23, 2004), at http://www.cnn.com/2003/TECH/internet/09/08/music.downloading/index.html.
5 Id.; Jen Rogers, Music Industry Suing 532 Song Swappers (Jan. 26, 2004), at http://www.cnn.com/2004/TECH/ internet/01/22/online.music/index.html; John Borland, RIAA Takes Hundreds More ‘John Does’ to Court (June 22, 2004), at http://news.com.com/2102-1027_3-5243587.html; Reuters, RIAA Sues 744 More Over File-Sharing (Aug. 25, 2004), available at http://msnbc.msn.com/id/5819566.
6 Jon Healey & Lorenza Munoz, “MPAA Plans Suits to Stop Film Piracy,” Los Angeles Times, Nov. 4, 2004, at C1, C10.
7 A&M Records, Inc. v. Napster, Inc., 114 F. Supp. 2d 896 (N.D. Cal. 2000), aff’d, 239 F.3d 1004 (9th Cir. 2001) (“Napster”).
Page 2
reported in almost daily news headlines. Technological innovation has always pushed copyright law to
adapt in due turn, forcing the law to embrace technologies and acts that were hardly, if at all, in
existence when the Copyright Act of 1978 or even the Digital Millennium Copyright Act (DMCA) of 1998
came into being. Just a few years ago P2P file-sharing systems were fairly rare, such that copyright law
hardly could have envisioned the range of conduct at issue. As a result, judges have been forced to try
to adapt the general legal theories and defenses of copyright law to the particular oddities and nuances
of the P2P environment. Plaintiffs have urged the courts to stretch contributory and vicarious
infringement doctrines, in particular, to fit a new range of acts and actors. As the law has evolved and
theories of liability arguably expanded, P2P services have responded by trying to design around and
distance themselves from the features that felled Napster. Some such efforts may yet prove successful,
as evidenced by the recent Ninth Circuit Court of Appeals victory for P2P services Grokster and
StreamCast,8 while others like Aimster have failed and still others await their fates, leaving some
uncertainty as to the future of P2P.
This paper discusses the cutting-edge legal issues surrounding P2P technology, including the
most recent court decisions, in the hope of providing some guidance in navigating this precarious field in
copyright law.
II. OVERVIEW OF P2P SYSTEMS
From a technical standpoint, all P2P networks help link individual computers together, allowing
one user to search and access the hard-drives of and download files from other logged-on users. If the
file in question is a music file, as is often the case, User 1 might offer one music track to User 2 in the
hopes of receiving a different track off the system in return. In effect, a P2P system is a virtual
cooperative in which individual users afford complete strangers access to their computer files.9 In fact,
the millions of computers linked together from time to time in this sort of ad hoc relationship have been
said to create a massive computer “network,” built from scores of unrelated PCs in homes and
businesses across the country and around the world.10
P2P providers generally distribute their software free of charge (or for a nominal fee), permitting
individual users to download the P2P providers’ software onto their personal computers. It can be said
that P2P providers supply the base platform from which end users exchange digital media and create the
so-called P2P transfer network. A user may choose to share files from his own computer, including, for
8 Metro-Goldwyn-Mayer Studios, Inc. v. Grokster Ltd., 259 F. Supp. 2d 1029 (C.D. Cal. 2003), aff’d, 380 F.3d 1154
(9th Cir. 2004) (“Grokster”). The plaintiffs filed a petition for a writ of certiorari to the United States Supreme Court on October 8, 2004; the defendants filed their opposition brief on November 8, 2004.
9 Profit from Peer to Peer, The Economist, June 21, 2001, available at http://www.cfo.com/article/ 1,5309,5869,00.html.
10 Id.
Page 3
example, “music files, video files, software applications, e-books and text files,”11 or merely access the
files of other logged-on users. When launched, the software automatically connects the user to a P2P
network “and makes any shared files available for transfer to any other user currently connected to the
same peer-to-peer network.”12 A user can then search for specific files, whether audio, audiovisual or
text, by using some combination of keyword, title or artist terms, as available, to retrieve the exact items
desired.13
In terms of practical mechanics, P2P technologies tend to span a continuum, from systems in
which individuals trade files without the intervention of servers or computers controlled by a P2P
provider (a “decentralized system”), to systems in which the P2P provider’s central servers serve as a
hub to help connect users and enable them to perform search functions (a “centralized system”). In a
decentralized system, the P2P provider’s role is intended to be nominal, more akin to a software provider
who contributes the back-end program but theoretically little else towards facilitating the swapping of
files among users. In this sense, once the software has been transferred to the client, the provider’s role
is complete, and it is “hands-off” from that point. In a centralized system, the P2P provider’s role is
conceptualized as more ongoing, like that of a service provider, interacting with and facilitating end
users’ online file-swapping in a more “hands-on” capacity. This distinction makes all the difference in
copyright law.
Napster’s technology followed the “hands-on” model. Napster’s centralized system was based
on servers it allegedly controlled that enabled individual users to search for and retrieve files from other
users. This control meant that Napster could detect and block illegal downloading using its network
and, therefore, was obligated to do so.
More recent P2P technology is of a purer P2P nature, devoid of central servers or intermediary
contributions from the P2P provider. The FastTrack technology, employed originally by StreamCast and
Grokster, apparently performs no indexing functions through provider-controlled computers, instead
leaving such tasks to the computers of certain individual users known as “supernodes.”14 A supernode is
a computer with a high bandwidth connection which sits in the home or business of an individual user
11 Grokster, 259 F. Supp. 2d at 1032.
12 Id.
13 Id.
14 In a decision finding personal jurisdiction over Sharman Networks—the entity behind Kazaa from which Grokster originally licensed FastTrack—the district court in Grokster described the technology as follows: “[o]nce a search commences, the . . . software displays a list (or partial list) of users who are currently sharing files that match the search criteria, including data such as the estimated time required to transfer each file. The user may then click on a specific listing to initiate a direct transfer from the source computer to the requesting user's computer. When the transfer is complete, the requesting user and source user have identical copies of the file, and the requesting user may also start sharing the file with others. [Kazza’s] software includes other features, such as facilities for organizing, viewing and playing media files, and for communicating with other users.” Grokster, 243 F. Supp. 2d 1073, 1081 (C.D. Cal. 2003).
Page 4
and is tapped by the P2P network (usually unbeknownst to the user) to host a directory of files available
for downloading. By some accounts, once a user connects to a supernode, “local search hubs” compile
an index of files offered by the user for downloading. In response to a search request, the supernode
reviews its own index of files and, if it does not find what has been requested, searches the indices of
other supernodes; “[h]ence the index of files available at any point in time is distributed throughout the
various SuperNode computers maintained by users of the network.”15 Kazaa, Grokster and other “pure”
P2P service providers maintain that the pure P2P network technology makes it impossible to exert any
control over the use or conduct of client computers, such that even if all of a provider’s computers were
taken off-line, its “network” would continue functioning without interruption16—indexing, searching,
making connections and downloading files. The dichotomy, as framed by one court, comes down to
numbers: Napster functioned on one supernode, which it controlled and owned, while FastTrack entities
operate through many supernodes, spread among individual computers throughout the country, which
are allegedly neither owned nor controlled by the P2P providers.17
The purest of P2P systems are those that dispense with supernodes and all other intermediary
indices, instead passing search requests from user to user until a desired item is found. Though slow,
these networks may stand the best chance of avoiding secondary copyright infringement liability. In
fact, as exemplified by such second-generation P2P systems, the best chance for surviving liability for
copyright infringement appears to be to invest in a strategy of doing more to appear to do less.
III. LEGAL PRINCIPLES
A. Direct Infringement in Copyright Law
An end user who uploads or downloads copyrighted music through a P2P network without the
copyright owner’s authorization is liable for direct copyright infringement. The Copyright Act of 1976
provides that “anyone who violates any of the exclusive rights of the copyright owner . . . is an infringer
of the copyright.”18 These exclusive rights include reproduction and distribution of copyrighted
material.19 If a P2P network user downloads a copyrighted song to his hard drive, he has reproduced
that song (and the musical composition in the song). If he allows other P2P network users to access the
15 See David Hayes, Copyright Liability of Online Service Providers, 19 No. 11 Computer Internet Lawyer 15, 16
(Nov. 2002) (citing to Complaint in Lieber v. Consumer Empowerment, Civ. No. 01-09923 (C.D. Cal. 2001), later consolidated into Metro-Goldwin-Mayer Studios, Inc. v. Grokster Ltd., Civ. No. 01-08541).
16 See, e.g., Kazaa BV’s Answer to MGM Complaint at ¶ 114.
17 See Grokster, 259 F. Supp. 2d at 1039-40. Questions remain, however, concerning the existence and control of certain types of supernodes called “root supernodes,” which are said to connect users to the network by directing them to then active supernodes. The FastTrack software apparently contains a list of such root supernodes, which—depending on their function—may reintroduce questions concerning provider control reminiscent of those Napster suffered with its central servers. See id. at 1040.
18 17 USC § 501.
19 Id. § 106.
Page 5
copy of that song from his hard drive, he has distributed that song. If these actions are taken without
permission of the copyright owner or a valid defense,20 such reproduction and distribution constitute
direct copyright infringement,21 subject to damages of between $750 to $150,000 for each such
reproduction or distribution. There is no dispute that most users of P2P services such as Kazaa,
Morpheus, and Grokster are downloading and uploading music without permission and are therefore
direct infringers.22 In contrast, the providers of the services, who do not actually engage in the
reproduction or distribution of the copyrighted material themselves, cannot therefore be direct infringers.
The question then becomes whether such P2P providers are secondarily liable for the direct infringement
of their network users. And this is where the challenge begins.
B. Contributory Infringement
U.S. copyright law provides for secondary liability based on contributory or vicarious
infringement, extending to those who enable others to directly infringe. Cases brought against P2P
providers, like Napster, Aimster and Grokster, are based on these two indirect liability theories.
A contributory infringer is “one who, with knowledge of the infringing activity, induces, causes
or materially contributes to the infringing conduct of another.”23 The Supreme Court has described a
contributory infringer as one who “was in a position to control the use of copyrighted works by others
and had authorized the use without permission from the copyright owner.”24 To prevail on a
contributory copyright infringement claim, a plaintiff must show (1) direct infringement by a third party;
(2) that the defendant knew of the direct infringement; and (3) that the defendant materially contributed
to the infringement.25
The first element of the claim—direct infringement by a party—has not been disputed with
respect to P2P providers whose users swap music and other files. The individual file-swappers are direct
infringers, as noted above. For the second element, according to the Ninth Circuit Court of Appeals,
20 For example, “fair use” is one limitation on the copyright holder’s rights. See 17 USC § 107. According to Section
107 of the Copyright Act, factors to consider in determining whether a particular use is fair include: (1) the purpose and character of the use, including whether such use is of a commercial nature or is for nonprofit educational purposes; (2) the nature of the copyrighted work; (3) the amount and substantiality of the portion used in relation to the copyrighted work as a whole; and (4) the effect of the use upon the potential market for or value of the copyrighted work.
21 Napster, 239 F.3d at 1013-14.
22 See generally Fred von Lohmann, Electronic Frontier Foundation, IAAL: Peer-to-Peer File Sharing and Copyright Law after Napster (Jan. 2003), at www.eff.org.
23 Napster, 114 F. Supp. 2d at 918; Napster, 239 F.3d at 1019.
24 Sony Corp. of Am. v. Universal City Studios, Inc., 464 U.S. 417, 437 (1984) (“Sony-Betamax”); see also 3 Nimmer on Copyright § 12.04[A][2][a].
25 Grokster, 380 F.3d at 1160.
Page 6
constructive knowledge of infringement may be imputed to a P2P provider if its software is not “capable
of substantial” or “commercially significant” non-infringing uses.26 Going beyond the Ninth Circuit’s
articulation of this element, the Seventh Circuit Court of Appeals has held that “[e]ven where there are
noninfringing uses of an Internet file-sharing service, . . . if the infringing uses are substantial then to
avoid liability as a contributory infringer the provider of the service must show that it would have been
disproportionately costly for him to eliminate or at least reduce substantially the infringing uses.”27
Otherwise, if constructive knowledge of infringement cannot be imputed, a copyright owner must show
that the P2P provider has knowledge of specific infringement.28 Finally, the third element requires a
copyright owner to show that the P2P provider materially contributed to the infringement by, for
example, providing the “site and facilities” for the infringement (such as a central server for hosting an
index of available files) and failing to take steps to prevent the infringement, or inducing infringing uses
through advertisement.29
In Napster, the district court concluded, and the Ninth Circuit affirmed, that the P2P service
provided by Napster materially contributed to the direct infringement by end users: “Napster, Inc.,
supplies the proprietary software, search engine, servers, and means of establishing a connection
between users’ computers. Without the support services defendant provides, Napster users could not
find and download the music they want with the ease of which defendant boasts.”30 As explained by the
district court in Grokster, Napster’s “material contribution” was more than just its software; its network
constituted the “site and facilities” for infringement to take place because it hosted the central list of
available files, so “each and every search request passed through Napster’s servers,”31 thereby enabling
Napster to block access by infringing users. Napster “served as the axis of the file-sharing network’s
wheel. When Napster closed down, the Napster file-sharing network disappeared with it.”32 On the
other hand, if “users search for and initiate transfers of files using [the P2P provider] . . . without any
information being transmitted to or through any computers owned or controlled by [the P2P provider],”
those acts alone do not constitute material contribution by the P2P provider.33 In sum, the “critical
26 Id. at 1162. 27 In re Aimster Copyright Litigation, 334 F.3d 643, 653 (7th Cir. 2003). 28 Id. at 650 (requiring “knowledge of infringing uses”); Grokster, 380 F.3d at 1162 (requiring “reasonable
knowledge of specific infringement”). 29 Id. at 1163; Sony-Betamax, 464 U.S. at 435-38 (discussing advertising as a factor in contributory infringement). 30 Napster, 114 F. Supp. 2d at 919-20.
31 Grokster, 259 F. Supp. 2d at 1039.
32 Id.
33 Id. at 1040.
Page 7
question is whether [the P2P providers] do anything, aside from distributing software, to actively
facilitate—or whether they could do anything to stop—their users’ infringing activity.”34
1. The Staple Article of Commerce Doctrine and Substantial Noninfringing Uses
The decision in the Napster case, as well as Grokster and Aimster (discussed further below), are
rooted fundamentally in the Supreme Court’s twenty year-old Sony-Betamax decision. In deciding Sony-
Betamax, the Supreme Court borrowed from the “staple article of commerce” doctrine of patent law.
The Court held that the manufacturer of a VCR could not be held contributory liable for the infringing
activities of purchasers who used the VCRs to make unauthorized copies of copyrighted works, since the
VCR—a “staple article of commerce”—was capable of substantial noninfringing uses, such as recording
one television program while viewing another or simply recording a program for later viewing. In the
words of the Court, “the sale of copying equipment, like the sale of other articles of commerce, does not
constitute contributory infringement if the product is widely used for legitimate, unobjectionable
purposes. Indeed, it need merely be capable of substantial noninfringing uses.”35
The Court in Sony-Betamax recognized that a different decision would have allowed copyright
owners to unduly extend the reach of their copyright monopolies to articles of commerce that had little to
do with the copyrights themselves. Analogizing to patent law, the Court noted:
When a charge of contributory infringement is predicated entirely on the sale of an article of commerce that is used by the purchaser to infringe a patent, the public interest in access to that article of commerce is necessarily implicated. A finding of contributory infringement does not, of course, remove the article from the market altogether; it does, however, give the patentee effective control over the sale of that item. Indeed, a finding of contributory infringement is normally the functional equivalent of holding that the disputed article is within the monopoly granted to the patentee.
For that reason, in contributory infringement cases arising under the patent laws the Court has always recognized the critical importance of not allowing the patentee to extend his monopoly beyond the limits of his specific grant. These cases deny the patentee any right to control the distribution of unpatented articles unless they are “unsuited for any commercial noninfringing use.” Unless a commodity “has no use except through practice of the patented method,” the patentee has no right to claim that its distribution constitutes contributory infringement. “To form the basis for contributory infringement the item must almost be uniquely suited as a component of the patented invention.” “[A] sale of an article which though adapted to an infringing use is also adapted to other and lawful uses, is not enough to make the seller a contributory infringer. Such a rule would block the wheels of commerce.”36
Recognizing that “there are substantial differences between the patent and copyright laws,” the Court
nonetheless concluded that the “staple article of commerce doctrine must strike a balance between a
34 Id. at 1039.
35 Sony-Betamax, 464 U.S. at 442.
36 Id. at 440-41 (footnote and citations omitted).
Page 8
copyright holder’s legitimate demand for effective—not merely symbolic—protection of the statutory
monopoly, and the rights of others freely to engage in substantially unrelated areas of commerce.”37
That balance fell in favor of Sony. Unlike “cases involving an ongoing relationship between the direct
infringer and the contributory infringer at the time the infringing conduct occurred,” the Court was
particularly mindful that “[t]he only contact between Sony and the users of the Betamax . . . occurred at
the moment of sale.” 38
By contrast, the Ninth Circuit in Napster emphasized that, unlike in Sony-Betamax, where Sony
simply manufactured and distributed VCRs but lacked control over what buyers did with them
subsequently, Napster actually retained ongoing control over its service.39 Napster’s refusal to exercise
its retained power, after having acquired actual knowledge of end user infringement, destroyed its
substantial noninfringing use defense.40 Thus, in the context of an ongoing service relationship, rather
than a one-time sale of a product, where the provider is arguably in a position to supervise the use of its
service, once the service provider is notified of the specific infringing activity of its end users, its failure
to use its power to prevent further infringing activity can give rise to liability for contributory copyright
infringement.
C. Vicarious Liability
The other indirect liability theory—vicarious copyright infringement—arises when a defendant
“has the right and ability to supervise the infringing activity and also has a direct financial interest in
such activity.”41 In the P2P context, failure to police the system over which a party has control, coupled
with a showing of financial benefit from the continued availability of infringing files on a system, leads to
the imposition of vicarious liability.42 Neither an intent to infringe nor knowledge of direct infringement
37 Id. at 442.
38 Id. at 437-38.
39 The district court in Napster noted that “[i]n Sony, the defendant’s participation did not extend past manufacturing and selling the VCRs: ‘the only contact between Sony and the users of the Betamax . . . occurred at the moment of sale.’ Here in contrast, Napster, Inc. maintains and supervises an integrated system that users must access to upload or download files. Courts have distinguished the protection Sony offers to the manufacture and sale of a device from scenarios in which the defendant continues to exercise control over the device’s use. Napster, Inc.’s facilitation of unauthorized file-sharing smacks of [] contributory infringement . . . rather than the legitimate conduct of the VCR manufacturers. Given defendant’s control over the service, as opposed to mere manufacturing or selling, the existence of a potentially unobjectionable use like space-shifting does not defeat plaintiffs’ claims.” Napster, 114 F. Supp. 2d. at 917 (citations omitted).
40 Napster, 239 F.3d at 1021.
41 Id. at 1022 (citation and internal quotations omitted).
42 Id. at 1024.
Page 9
is an element of this tort.43 In addition, the Ninth Circuit has held that the Sony-Betamax “substantial
noninfringing use” defense does not apply to vicarious copyright infringement.44
Financial benefit exists where the availability of infringing material “acts as a draw for
customers.”45 In Napster, the Ninth Circuit concluded that Napster’s revenue, though yet nonexistent,
was dependent on an increase in its user base, such that Napster benefited financially from the draw of
copyright-protected works on its system.46 More recently, P2P entities more clearly derive a financial
benefit from the draw of consumers by generating substantial revenue from advertising dollars.
A defendant’s ability to supervise the infringing conduct establishes the final element of a
vicarious liability claim, reinforcing the importance of control over the P2P system. A capacity to block
infringers from access to a particular environment, for any reason whatsoever, is evidence of the right
and ability to supervise.47 In Napster, because the company had the right to control access to its system
and terminate accounts, it had a duty to police to the fullest extent, such that “[t]urning a blind eye to
detectable acts of infringement for the sake of profit gives rise to liability.”48 Napster’s ability to locate
infringing material on search indices, along with its right to disconnect user access to the system, was
indicative of such supervisory capacity.49 Accordingly, in the Ninth Circuit’s subsequent decision in
Grokster, as discussed below, the court found two other P2P providers lacked the ability to exercise such
control, and therefore escaped vicarious liability despite being able to benefit financially therefrom.50 By
contrast, the Seventh Circuit’s decision in Aimster suggested that when a P2P provider’s software
architecture is arguably designed with the intention of depriving the provider of otherwise available
supervisory control, the supervisory control element can be found to exist.51
43 Id. at 1022-24 (failure to police system combined with financial interest in ongoing infringement was sufficient to
justify preliminary injunction given likelihood of success on vicarious liability claim).
44 Id. at 1022; see generally 3 Nimmer on Copyright § 12.04[A][2][b].
45 Napster, 239 F.3d at 1023 (citing Fonovisa v. Cherry Auction, Inc., 76 F.3d 259, 263-64 (9th Cir. 1996), for proposition that financial benefit may be shown where infringing performances enhance the attractiveness of a venue).
46 Id.
47 Id.; see also Fonovisa, 76 F.3d at 259 (swap meet operator had right to supervise because it could terminate vendors, including those that were violating copyright law).
48 Napster, 239 F.3d at 1023.
49 The Ninth Circuit departed from the district court when it noted that “the right and ability to police is cabined by the system’s current architecture” but nevertheless went on to hold Napster vicariously liable because “Napster . . . has the ability to locate infringing material listed on its search indices, and the right to terminate users’ access to the system.” Id. at 1024.
50 Grokster, 380 F.3d at 1164-66. 51 In re Aimster Copyright Litigation, 334 F.3d 643, 654-55 (7th Cir. 2003). The Seventh Circuit, in the context of a
preliminary injunction against P2P provider Aimster, did not squarely decide whether the recording industry would likely prevail against Aimster on the issue of vicarious infringement, noting that whether Aimster’s failure to
Page 10
IV. POST-NAPSTER LAW ON P2P
The legal demise of Napster appeared to signal a major undoing for P2P networks. However,
more recent Ninth Circuit case law suggests there may be a safe haven for certain types of P2P
technology, much to the dismay of the music, videogame and motion picture industries. By all accounts,
the recent decision by the Ninth Circuit Court of Appeals in Grokster (in which a petition for a writ of
certiorari to the Supreme Court is pending) is one of the most significant in the P2P field to date.
Initiated in October 2001 in the Central District of California by plaintiffs comprised of virtually every
major motion picture and music studio, including MGM, Columbia Pictures, Disney, New Line Cinema,
Time Warner, Twentieth Century Fox, Universal, Arista Records, Atlantic, Capital Records and Sony,52
the case was predicted to ensure another plaintiff’s victory. Targeting the second-generation of P2P
systems—Kazaa, Grokster, and StreamCast—plaintiffs sought to replicate their Napster successes by
bringing claims of contributory and vicarious infringement against P2P service providers whose end
users were indisputably widely infringing the studios’ copyrights. Instead, the district court granted
summary judgment in favor of Grokster and StreamCast, which the Ninth Circuit recently affirmed.53
The decisions in favor of Grokster and StreamCast highlight the central significance of the
technological distinctions upon which this area of copyright law turns. Yet the Ninth Circuit’s decision
may conflict with the Seventh Circuit’s decision a year earlier upholding a preliminary injunction against
P2P provider Aimster. Consequently, the following sections of this paper focus on how technological
distinctions in software can affect secondary liability of P2P providers for infringing uses of their P2P
systems by consumers, in the context of analyzing the commonalities and conflicts between Ninth and
Seventh Circuit case law.
A. Grokster
If there is one factor that most significantly determines secondary liability for infringement in
P2P systems, it is this: control. Relying on Sony-Betamax and Napster, the Ninth Circuit affirmed
summary judgment in favor of Grokster and Streamcast, holding that neither could be secondarily liable
for the infringing activity of end users.
eliminate its software’s encryption feature and monitor use of its system was “academic,” because “its ostrich-like refusal to discover the extent to which its system was being used to infringe copyright is merely another piece of evidence that it was a contributory infringer.” Id. For unrelated reasons having to do with the theory of agency, however, the Seventh Circuit cast doubt on the district court’s finding in favor of the recording industry on Aimster’s vicarious infringement. See id. at 654 (“we are less confident than the district judge was that the recording industry would also be likely to prevail on the issue of vicarious infringement should the case be tried”).
52 The Grokster case was consolidated in the district court with Lieber v. Consumer Empowerment, in which music composition copyright holders advanced the same copyright claims against the same defendants.
53 Grokster, 259 F. Supp. 2d 1029 (C.D. Cal. 2003), aff’d, 380 F.3d 1154 (9th Cir. 2004). During the pendency of the litigation at the district court level, Kazaa ceased defending the action, and default judgment was entered against it. See Grokster, 380 F.3d at 1159 n.4. Sharman Networks, the successor-in-interest to Kazaa, remains a defendant in the district court.
Page 11
The Grokster court adopted wholesale what it called the district court’s “well reasoned
analysis”54 and succinctly framed the important lesson to be learned: “the software design is of great
import.”55 Like the district court, the Ninth Circuit contrasted Napster’s “centralized set of servers that
maintained an index of available files” to “StreamCast’s decentralized, Gnutella-type network and
Grokster’s quasi-decentralized, supernode, KaZaa-type network [where] no central index is
maintained.”56 That made the difference. Grokster and StreamCast appeared to reap the rewards of the
decentralized model adopted by second-generation P2Ps struggling to distance themselves from the
Napster model. As the district court put it:
Neither StreamCast nor Grokster facilitates the exchange of files between users in the way Napster did. Users connect to the respective networks, select which files to share, send and receive searches, and download files, all with no material involvement of Defendants. If either Defendant closed their doors and deactivated all computers within their control, users of their products could continue sharing files with little or no interruption. [¶] In contrast, Napster indexed the files contained on each user’s computer, and each and every search request passed through Napster’s servers. Napster provided the “site and facilities” for the alleged infringement, affording it perfect knowledge and complete control over the infringing activity of its users. If Napster deactivated its computers, users would no longer be able to share files through the Napster network. 57
With respect to contributory infringement, the Ninth Circuit held that constructive
knowledge of infringement could not be imputed to Grokster or StreamCast because their
systems were capable of substantial or commercially significant noninfringing uses. In support,
the court cited “numerous declarations by persons who permit their work to be distributed via
the software, or who use the software to distribute public domain works.”58 Though it held that
constructive knowledge could not be imputed, the Ninth Circuit did not go so far as to hold that
“actual knowledge” was therefore required. Instead, the court held that “the copyright owner
would be required to show that the defendant had reasonable knowledge of specific infringing
files,”59 with the added caveat that such knowledge must have been acquired “at a time at
which [defendants] contributed to the infringement, and failed to act upon that information.”60
Contribution to the infringement required, moreover, that Grokster and StreamCast have
54 Grokster, 380 F.3d at 1160. 55 Id. at 1163.
56 Id.
57 Grokster, 259 F. Supp. 2d at 1041 (emphases added; citations omitted).
58 Grokster, 380 F.3d at 1161. “Indeed, the record indicates that thousands of . . . musical groups have authorized free distribution of their music through the internet. In addition to music, the software has been used to share thousands of public domain literary works . . . as well as historic public domain films[.]” Id.
59 Id.
60 Id. at 1162 (alterations and internal quotations omitted).
Page 12
provided the “site and facilities” for infringement or materially contributed in some other way.61
The court held they had not. “Infringing messages or file indices do not reside on defendants’
computers, nor do defendants have the ability to suspend user accounts,” and the recording
industry did not provide “evidence that defendants materially contribute in any other manner.”62
The court noted that while StreamCast “maintains an XML file from which user software
periodically retrieves parameters,” such as “addresses of websites [containing] lists of active
users,” and while “[t]he owner of the FastTrack software [licensed by Grokster], Sharman,
maintains root nodes containing lists of currently active supernodes to which users can connect,”
these activities were “too incidental to any direct copyright infringement to constitute material
contribution.”63 Therefore, Grokster and StreamCast could not be held liable for contributory
infringement.
With respect to vicarious infringement, although Grokster and StreamCast benefited
financially from advertising revenue, the Ninth Circuit again held that because they lacked the
right and ability to supervise the infringing conduct of end users, no vicarious infringement
could be found. In contrast to the control Napster exerted through its “integrated service,”
“Grokster and StreamCast are more truly decentralized, peer-to-peer file-sharing networks.”64
The Grokster network was based on the FastTrack technology licensed from and controlled by a
separate entity, Sharman. Similarly, StreamCast’s technology was based on the Gnutella
platform, which is open-source and outside the control of any single entity.65 In the words of the
court:
It does not appear from any of the evidence in the record that either of the defendants has the ability to block access to individual users. Grokster nominally reserves the right to terminate access, while StreamCast does not maintain a licensing agreement with persons who download Morpheus. However, given the lack of a registration and log-in process, even Grokster has no ability to actually terminate access to filesharing functions, absent a mandatory software upgrade to all users that the particular user
61 Id. at 1163.
62 Id. at 1163, 1164. 63 Id. at 1164. The district court described the supernode system in more detail:
One of the central features distinguishing FastTrack-based software from other peer-to-peer technology is the dynamic, or variable use of “supernodes.” A “node” is an end-point on the Internet, typically a user’s computer. A “supernode” is a node that has a heightened function, accumulating information from numerous other nodes. An individual node using FastTrack-based software automatically self-selects its own supernode status; a user’s node may be a supernode one day and not on the following day, depending on resource needs and availability of the network . . . . It is unclear whether or to what extent entities other than Grokster can control this process or other aspects of the FastTrack network, but there is no evidence—and Plaintiffs do not argue—that Defendants have any such role.
Grokster, 259 F. Supp. 2d at 1040 & n.5 (citations omitted). 64 Grokster, 380 F.3d at 1165. 65 Id. at 1159.
Page 13
refuses, or IP address-blocking attempts. It is also clear that none of the communication between defendants and users provides a point of access for filtering or searching for infringing files, since infringing material and index information do not pass through defendants’ computers.66
Thus, what the Ninth Circuit viewed as a lack of control by Grokster and StreamCast
over users of their P2P networks was the most significant factor for the court in rejecting the
imposition of both contributory and vicarious liability.
B. Aimster
In Aimster, the Seventh Circuit affirmed a preliminary injunction which effectively shut down a
P2P provider in a case brought by various record companies, songwriters and music publishers.67
Aimster was a P2P service that used AOL’s Instant Messenger service (“IM”) to allow members to
exchange files and messages, but “greatly expand[ed] the file transferring capability of AOL IM . . . by
designating every Aimster user as the ‘buddy’ of every other Aimster user. In this way, every Aimster
user [had] the ability to search for and download files contained on the hard drives of any other Aimster
user (provided that the user [had] previously designated those files to be available for searching).”68
Aimster users could also identify “buddies” who had interests in the same subject matter. Aimster also
provided a service called “Club Aimster”—“a repackaged version of the basic Aimster service that
greatly enhance[d] the ability of its members to locate and download copyrighted music” for a monthly
fee. Using a unique member name and password, and paying the monthly fee to Aimster, users could
download 40 “hot new releases”—virtually all of which were copyrighted and owned by the plaintiffs.
Moreover, a tutorial explained how to use the Aimster software and provided “as its only examples of
file sharing the sharing of copyrighted music, including copyrighted music that the recording industry
had notified Aimster was being infringed by Aimster’s users.”69
In upholding the preliminary injunction, the Seventh Circuit held that while there was the
possibility of substantial noninfringing uses of Aimster, in the face of evidence put forth by the recording
industry that the vast majority of files exchanged between Aimster users were infringing, the burden of
proof shifted to Aimster, which Aimster failed to meet by not “produc[ing] any evidence that its service
has ever been used for a noninfringing use, let alone evidence concerning the frequency of such uses.”70
Writing for the court, Judge Posner employed a balancing test for contributory infringement: “when a
supplier is offering a product or service that has noninfringing as well as infringing uses, some estimate 66 Id. at 1165. 67 In re Aimster Copyright Litigation, 252 F. Supp. 2d 634 (N.D. Ill. 2002), aff’d, 334 F.3d 643 (7th Cir. 2003), cert.
denied, 124 S. Ct. 1069 (2004) (“Aimster”).
68 Aimster, 334 F.3d at 642.
69 Id. at 651.
70 Id. at 652, 653.
Page 14
of the respective magnitudes of these uses is necessary for a finding of contributory infringement.”71
Based on the evidence introduced by the recording industry and Aimster’s failure to produce any
credible evidence to the contrary, Aimster fell on the wrong side of this balance.
In contrast to the Ninth Circuit’s discussion in Napster and Grokster concerning the degree of
control exerted by the defendants over their respective networks, the Seventh Circuit made hardly any
mention of the control exerted by Aimster over its own network. There was good reason for this
omission. In the district court, Aimster had attempted to distance itself from Napster by arguing that it
did not maintain a central index of files available on its system, which the recording industry vigorously
disputed. However, no evidentiary hearing was ever held on the matter because the proprietors of
Aimster filed for bankruptcy protection and a hearing was precluded by an order of the bankruptcy
court.
Although evidence of Aimster’s control remained undeveloped, the evidentiary development of
other facts absent in Grokster proved to be Aimster’s undoing.72 The Seventh Circuit found the material
contribution that was lacking in Grokster (and Sony-Betamax) in the form of the “Club Aimster” service
and the tutorial that the court called “the invitation to infringement.”73 Whether or not Aimster provided
the “site and facilities” for infringement was irrelevant in the face of such damning conduct.
The one aspect of Aimster’s control over its system that was apparent from the record was the
presence—like in Napster but unlike in Grokster—of a registration and log-in process for end users of
the software, indicating that Aimster could block access to its system by particular users. Although the
Seventh Circuit rejected the recording industry’s argument that the substantial noninfringing use
defense set forth in Sony-Betamax was inapplicable to services such as Aimster, it agreed with the
industry that “the ability of a service provider to prevent its customers from infringing is a factor to be
considered in determining whether the provider is a contributory infringer.”74 However, Aimster’s
degree of control over individual users and ability to prevent them from infringing copyrights became
important for the court only in rejecting Aimster’s argument that it lacked knowledge of infringing
activity because of encryption built into the software. Although encryption technology within the
Aimster software assured users of their anonymity, Aimster could not thereby avoid contributory liability
by contending it was powerless to control infringing uses. The Seventh Circuit held that Aimster had
willfully blinded itself by selectively applying that encryption technology when it was not shown that the
71 Id. at 649. 72 The district court in Aimster noted that its reasoning “would hold regardless of whether or not Aimster maintains a central database of
files available for transfer.” Aimster, 252 F. Supp. 2d at 641 n.6. 73 Aimster, 334 F.3d at 651-52. 74 Id. at 648.
Page 15
technology added value to the service or saved Aimster significant cost.75 Aimster’s resulting inability to
produce evidence of noninfringing uses was, therefore, a “self-inflicted wound.”76
C. A Conflict?
Although Grokster and StreamCast’s apparent technological decentralization was undoubtedly
the most important factor contributing to their victory in the Ninth Circuit, that court left open the
possibility that other factors could have been more important given other circumstances. Even though
Grokster and StreamCast had not provided the “site and facilities” for infringement, they still could have
been held liable had they “otherwise materially contribute[d] to direct infringement.”77 The Ninth
Circuit did not suggest what other factors might constitute material contribution, and the recording
industry pointed to none, as they could in Aimster (such as the “Club Aimster” service and Aimster’s
tutorial).
Interestingly, in affirming summary judgment in favor of Grokster and Streamcast, the Ninth
Circuit noted in passing a potential conflict with the Seventh Circuit in its interpretation of the
“substantial noninfringing use” standard.78 Indeed, the courts had reached different conclusions with
respect to two seemingly similar P2P systems: Grokster and Streamcast were absolved from liability
because their services were capable of substantial noninfringing uses (and they did not otherwise
materially contribute to infringement), but Aimster was enjoined from proceeding because although its
service may have been capable of substantial noninfringing uses, the defendants failed to put forth
evidence that it in fact was used in substantial noninfringing ways. The Ninth Circuit characterized the
difference as a legal one: “Aimster is premised specifically on a fundamental disagreement with
[Napster’s] reading of Sony-Betamax”79 and “determined that an important additional factor is how
‘probable’ the noninfringing uses of a product are.”80 In other words, the Ninth Circuit read Sony-
Betamax to preclude finding that a P2P provider has constructive knowledge of infringement by its users
where it demonstrates its system is capable of substantial current and future nonfringing uses.81 The
Ninth Circuit characterized Aimster’s reading of Sony-Betamax to impose the additional requirement
75 Id. at 650-51, 653-54. 76 Id. at 654. The Seventh Circuit did not decide the likelihood of Aimster’s liability for vicarious infringement, noting that the issue
was “academic” because Aimster’s “ostrich-like refusal to discover the extent to which its system was being used to infringe copyright is merely another piece of evidence that it was a contributory infringer.” Id. at 655. However, the Seventh Circuit did note that it was “less confident than the district judge was that the recording industry would prevail on the issue of vicarious infringement should the case be tried.” Id. at 654.
77 Grokster, 380 F.3d at 1163. See also id. at 1164 (“The Copyright Owners have not provided evidence that defendants materially contribute in any other manner.”).
78 Id. at 1162 n.9
79 Id. 80 Id. 81 Napster, 239 F.3d at 1020-21.
Page 16
that such uses must be shown to be probable before precluding the imposition of constructive
knowledge.82 But does requiring a showing that a system is capable of substantial current and future
noninfringing uses not inherently require a showing that those uses are probable? Put differently, could
substantial nonfringing current and future uses be shown, yet also be improbable?
It is not clear that the “important additional factor” that the Ninth Circuit claimed Aimster
imposed was really that—an additional factor at all—or that it was anything different from what the
Ninth Circuit in Grokster implicitly took into account. In determining whether Aimster was capable of
substantial noninfringing uses, the Seventh Circuit had the occasion to question how “probable” were
the purported uses of the service because the only evidence submitted by the defendants was a
declaration by Aimster’s founder containing a list of potential noninfringing uses of the software, but “no
evidence whatsoever . . . that Aimster is actually used for any of the stated noninfringing purposes.”83 In
contrast, the Grokster defendants “submitted numerous declarations by persons who permit their work
to be distributed via the software, or who use the software to distribute public domain works”84—i.e.,
actual evidence (not just a probability) of substantial noninfringing use. The court in Grokster might
have reached a different result had there been no actual evidence submitted of current, noninfringing
uses.
Indeed, both courts relied on Sony-Betamax to reach different results. In concluding that the
Betamax VCR was capable of substantial noninfringing uses, the Supreme Court in Sony-Betamax relied
on actual evidence of the product’s noninfringing uses, such as recording a copyrighted program without
objection from the copyright owners or for later viewing at home. The Court pointed to evidence that
included the “considerable testimony” of copyright owners who did not object to the practice of
consumers who recorded their programming for private home use, and noted this “was sufficient to
establish a significant quantity of broadcasting whose copying is now authorized, and a significant
potential for future authorized copying.”85 The Court also relied on evidence that unauthorized but
noncommercial home recording caused no actual harm to the copyright owners and no demonstrated
likelihood of future harm.86 While it mentioned that a product “need merely be capable of substantial
noninfringing uses” for its manufacturer to avoid contributory infringement, the Court did not purport to
rest its decision simply on the theoretical capabilities of VCRs without examining actual evidence of
82 Grokster, 380 F.3d at 1162 n.9. 83 Aimster, 334 F.3d at 653 (quoting district court opinion; emphasis in original). 84 Grokster, 380 F.3d at 1161. 85 Sony-Betamax, 464 U.S. at 444. 86 See id. at 447-54.
Page 17
current as well as potential future uses, among other factors. Such other factors included, incidentally,
the fact that Sony apparently did not encourage through advertising any infringing uses of its VCRs.87
Moreover, both Grokster and Aimster support the notion that the liability of P2P providers for
contributory infringement depends upon the balancing of factors that Sony-Betamax considered. Is there
an “ongoing relationship between the direct infringer and the contributory infringer at the time the
infringing conduct occurred”?88 Can the P2P provider stop infringing uses of its software? What is the
absolute number and proportion of the software’s consumers who use the software in noninfringing
ways? What is the likelihood that future consumers will use the software in noninfringing ways? Does
the P2P provider encourage illegal copying and distribution by consumers? Because the answers to
these questions depend upon intensely factual determinations, the differing results in Grokster and
Aimster may not be surprising. Generalizations about what features, factually, a P2P system must have
in order to be held liable for contributory infringement can therefore be difficult as well as misleading.
Undoubtedly the future of the Kazaa P2P service—the remaining defendant in the district court in
Grokster—will turn on the particulars of its software and behavior.89
While the divergent conclusions reached in Grokster and Aimster might have resulted merely
from differing facts and procedural postures, the court in Aimster did diverge in legal principle from
Grokster by suggesting that to avoid contributory infringement P2P providers could be obligated to
modify their software if infringing uses were substantial: “Even where there are noninfringing uses of an
Internet file-sharing service, moreover, if the infringing uses are substantial then to avoid liability as a
contributory infringer the provider of the service must show that it would have been disproportionately
costly for him to eliminate or at least reduce substantially the infringing uses.”90 In Grokster the
recording industry presented evidence that the vast majority of consumers who used the defendants’
software were infringing copyrights. This evidence, according to the reasoning of the Aimster court,
should have shifted to the defendants the burden of showing that “it would have been disproportionately
costly for [them] to eliminate or at least reduce substantially the infringing uses.” The Grokster court
imposed no such burden on the defendants.
87 Id. at 438. 88 Id. at 437-38. 89 As might be expected, the plaintiffs in Grokster allege that Kazaa/Sharman indeed retains control over its service,
with its central servers registering, identifying and logging-in users, then connecting them to supernodes. The various complaints also detail other alleged control-related activities, such as Kazaa monitoring transactions and controlling the entire system through encryption. MGM Complaint at ¶ 46. The plaintiffs have, at times, further alleged that Kazaa’s servers actually create a connection between the user who selects an unlawful file for copying and the user who offers the unlawful file for copying, making the entire infringing transaction possible. Lieber Complaint at ¶ 37.
90 Aimster, 334 F.3d at 653.
Page 18
The Ninth Circuit accepted the fact that Grokster and StreamCast’s architecture and software
design did not enable the P2P providers to supervise their users, and seemed untroubled by the fact that
the systems were deliberately engineered in such a way as to avoid control over their networks. After
all, “the software design is of great import.”91 That software design included no central servers and no
log-in or registration process, such that the networks would continue functioning without Grokster or
StreamCast’s further participation. While a software upgrade could have been, as a technical matter,
pushed down to end users to change this, the Ninth Circuit observed: “‘Failure’ to alter software located
on another’s computer is simply not akin to the failure to delete a filename from one’s own computer, to
the failure to cancel the registration name and password of a particular user from one’s user list, or to the
failure to make modifications to software on one’s own computer.”92 With respect to software design or
architecture, the Ninth Circuit simply does not require that any affirmative steps be taken by a P2P
provider to avoid liability. Accordingly, the court concluded, the Grokster defendants did not materially
contribute to their users’ infringement.
In contrast, the Seventh Circuit did not simply accept Aimster’s architecture and software
design. Although, as noted above, no evidence was presented with respect to the control Aimster’s
software allowed the company over individual files and file indices, Aimster argued that it had no
knowledge of infringement because of encryption technology that was built into its software. In
rejecting this argument, the Seventh Circuit concluded that even if there were noninfringing uses of
Aimster’s software, in the face of substantial infringing uses Aimster failed to meet its burden that it
would have been disproportionately costly to eliminate or substantially reduce the infringing uses by
“failing to present evidence that the provision of an encryption capability effective against the service
provider itself added important value to the service or saved significant cost.”93
In the end, liability for contributory and vicarious copyright infringement by P2P file-networks
may largely depend upon the distinction between products and services that the Supreme Court
articulated in Sony-Betamax. The VCR was a product that could be used in a variety of legitimate ways
without requiring or, more to the point, enabling Sony’s continued contact with customers once sold. In
contrast, Napster’s software required ongoing service and customer contact. Somewhere between those
two ends of the continuum fall Aimster, Grokster and StreamCast, whose systems clearly do not require
ongoing customer contact but could be designed or used to facilitate supervision for supervision’s sake.
Whether such systems can avail themselves of the Sony-Betamax “substantial noninfringing use”
defense remains to be seen.
91 Grokster, 380 F.3d at 1163
92 Id. at 1163-64.
93 Aimster, 334. F3d at 653 (emphasis in original).
Page 19
The Grokster plaintiffs have petitioned the Supreme Court for review, urging it “to resolve the
conflict between the Ninth and Seventh Circuits” and “to clarify the standards for secondary liability
applicable to Internet-based services that facilitate copyright infringement.”94 The plaintiffs’ petition has
been joined by the amicus briefs of forty state attorney general offices, among others.95 Indeed, the case
may provide a unique opportunity for the Court to clarify the reach of its two-decades-old Sony-Betamax
“substantial noninfringing use” defense for P2P providers. In their opposition to the plaintiffs’ petition,
Grokster and StreamCast contend that Congress is better suited to and already in the process of
determining secondary liability rules for digital technologies, and that no circuit split is presented by the
case.96 Whether or not the Supreme Court grants review, the entertainment industry has already begun
its war on other fronts, discussed below.
V. THE NEWEST CHAPTERS IN P2P SUITS
A. Individual Users of P2P services
Lawsuits over copyright infringement of P2P systems have not been limited to the gatekeepers of
such file-sharing. Notwithstanding prevailing wisdom and the court’s recognition in Aimster that
lawsuits against direct infringers can be impractical and futile,97 the music industry has sued individuals
for their uses of file-sharing services.
The RIAA first announced in June 2003 that it would be launching a major offensive against
individual offenders.98 Notwithstanding what users might have believed, the RIAA could and did locate
and identify the online music collections of individual users. As a prelude to its actions against
individuals, the RIAA subpoenaed99 Verizon, a major Internet service provider, demanding that it
provide the names of subscribers whose Internet addresses the recording industry had identified as
rampant copiers and distributors of copyrighted music.100 Verizon resisted the subpoena but in the end
was forced to provide the names to the RIAA. Indeed, the RIAA won approval for more than 1,300
94 Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., Petition for a Writ of Certiorari at 2 (Oct. 8, 2004).
95 John Borland, States, Artists Urge Top Court to Hear P2P Case (Nov. 8, 2004), at http://news.com.com/2102-1027_3-5443812.html.
96 Metro-Goldwyn-Mayer Studios Inc. v. Grokster, Ltd., Brief in Opposition at 15-16 (Nov. 8, 2004).
97 Aimster, 334. F3d at 645. The court noted that “chasing individual consumers is time consuming and is a teaspoon solution to an ocean problem.” Id. (quoting Randal C. Picker, Copyright as Entry Policy: The Case of Digital Distribution, 47 Antitrust Bull. 423, 442 (2002)).
98 Recording Industry to Begin Collecting Evidence and Preparing Lawsuits Against File “Sharers” Who Illegally Offer Music Online, RIAA press release (June 25, 2003), at http://www.riaa.com/news/newsletter/062503.asp.
99 The subpoena power was granted per the DMCA, 17 U.S.C. § 512(h).
100 In re Verizon Internet Services, Inc., 257 F. Supp. 2d 244 (D.D.C. 2003).
Page 20
subpoenas compelling Internet service providers to identify computer users suspected of illegally sharing
music files on the Internet.101
On September 9, 2003, armed with the names it had subpoenaed, the RIAA proceeded to file 261
federal lawsuits in courts across the country, targeting those it claimed had distributed an average of
more than 1,000 copyrighted music files each and warning that thousands more such suits would follow.
The suits targeted a grandfather in Texas, whose grandchildren had downloaded music on his home
computer during visits, a Yale University professor, a 12-year-old honor student living in a housing
project, and assorted other individuals from New York to Boston to San Francisco.102 The RIAA also
announced an amnesty program aimed at forcing admissions of liability from users in return for a
promise not to sue. With its most recent campaign, as the total number of defendants has risen to over
6,000, the RIAA promises to expose more and more people to copyright liability in the digital age.
But the RIAA is not the only entertainment trade organization flexing its muscle. The MPAA
recently announced that it is launching a flurry of lawsuits against individuals who offer copyrighted
movies on file-sharing networks.103 Joining the effort are at least five of the MPAA’s seven large movie
studio members. While movie-swapping is not nearly as widespread as music-swapping, largely due to
still-limited broadband access, the movie studios have undoubtedly taken a cue from the recent victories
for Grokster and StreamCast and the record industry’s years-long reluctance in suing individual
infringers, perhaps in the hope that a preemptive strike will deter would-be movie pirates. Whether
such lawsuits make a meaningful dent in illegal file-sharing of music as well as film remains to be seen.
B. Investors in P2P Companies
In addition to P2P providers and individual file swappers, recent suits have also targeted the
financial backers of P2P services, hoping to sever their financial pipelines. In April 2003, two record
labels filed suit for contributory and vicarious infringement against Hummer Winblad Venture Partners
(HW) and two of its partners over HW’s $13.5 million investment in Napster.104 Relying on the favorable
outcome in Napster, the plaintiffs allege that the investors controlled Napster during that period of time
when the Napster system enabled billions of acts of infringement and that they knew copyrighted works
were being illegally copied and distributed through the Napster system when it made its decision to
101 The RIAA’s tactics raised concerns among many, including the chairman of the Senate Governmental Affairs’
Permanent Subcommittee on Investigations, who called for hearings on the industry’s use of copyright subpoenas to track downloaders. Associated Press, Revealed: How RIAA Tracks Downloaders (Aug. 28, 2003).
102 See Associated Press, Elderly Man, Schoolgirl, Professor Among File-Swapping Defendants (Sept 9, 2003), available at http://www.usatoday.com/tech/news/techpolicy/2003-09-09-riaa-defendants_x.htm.
103 Jon Healey & Lorenza Munoz, “MPAA Plans Suits to Stop Film Piracy,” Los Angeles Times, Nov. 4, 2004, at C1, C10.
104 UMG Recordings, Inc. v. Hummer Winblad Venture Partners, No. C-04-1166 MHP (N.D. Cal.); see Stefanie Olsen, Record Labels Sue Napster Investor (Apr. 22, 2003), at http://news.com.com/2100-1027-997860.html.
Page 21
invest in Napster.105 The suit further asserts that the defendants knowingly and materially contributed to
the infringement, controlling Napster in the period after the investment and thus facilitated the
infringing acts.106 In the claim for vicarious infringement, the plaintiffs allege that the defendants had a
direct financial interest in the infringing conduct and the right and ability to supervise and/or control
that conduct.107 They allege that the defendants could have shut down the site and facilities, prevented
Napster users from gaining access to the Napster servers or terminated the index feature with links to
infringing music files.108 In July 2004, the district court denied pretrial motions filed by the defendants to
dismiss the cases, noting that they mischaracterized plaintiffs’ complaints as alleging “tertiary
infringement”—a questionable theory on which to pin liability.109 “Rather than alleging that defendants
merely supplied Napster with necessary funding . . . or accusing defendants of contributory and
vicarious infringement in conclusory fashion[,] plaintiffs have specifically accused defendants of
assuming control over Napster’s operations and directing the infringing activities that gave rise to the
original Napster litigation.”110 The court cautioned that the plaintiffs’ allegations “may be wholly
unfounded” but were more than sufficient at the pleading stage to state claims of secondary liability for
infringement.111 It expressly reserved the question of how much control was sufficient to state a claim.
If the case ever goes to trial and the defendants lose on the merits, the ramifications could be
huge. Venture capital firms and other investors could be held secondarily liable for infringement,
although presumably the court would establish guidelines requiring a high degree of control over their
clients before the imposition of liability. Thorough intellectual property due diligence would also
become more important. Disclosures to co-investors, venture capital fund investors, lenders, and the
panoply of other financially-interested parties could become extensive and spun to support the merits of
the plaintiffs’ contentions. And a victory for the plaintiffs would undoubtedly encourage more lawsuits
and widen the search for more deep-pocket defendants, but discourage investment in the advancement
of technology.
105 UMG Recordings, Inc. v. Hummer Winblad Venture Partners, Complaint for Contributory Copyright Infringement,
Vicarious Infringement of Copyrights, Violation of California Civil Code Section 980 and Misappropriation, Statutory and Common Law Unfair Competition, and Conspiracy, CV-03-2785 (C.D. Cal.) at ¶ 38.
106 Id. at ¶ 46-47.
107 Id. at ¶ 54.
108 Id.
109 Memorandum & Order Re: Defendants’ Motion to Dismiss, No. C-04-1351 MHP, at 7 (N.D. Cal. July 14, 2004).
110 Id.
111 Id. at 9.
Page 22
C. The Future of P2P
Emerging P2P providers continue to learn from the hits and misses of their ancestors, innovating
away from liability while continuing to cater to their user base.112 Aware that users might be frightened
off by the risk of their own legal exposures, the P2Ps have already begun focusing more and more on
new tools designed to shield the end user, including encryption. Freenet, an open-source project, was
created to address information privacy concerns.113 Where Napster was a file-sharing service, Freenet
has been characterized as a file-storage service that pushes information to other computers (nodes) for
storage.114 A node does not necessarily know what files have been pushed into it since the data is
encrypted. Messages in this system do not travel directly from sender to recipient, but rather wend their
way through a number of nodes. Each node only knows the next node in the chain (either before or
after) and does not know if its neighboring node was the originator or final recipient of the message or
just one link in the chain.115 Users insert a file into the Freenet by creating a “key” (somewhat akin to a
filename) and making the file available on their node. As other users request the file, it is copied onto
additional nodes, distributing it across Freenet.116 Not only does Freenet’s existence as an open-source
tool eliminate a central facet indicative of control, but the encryption and communication systems make
it difficult for plaintiffs to monitor and document the wide-scale copyright infringement of individuals.117
In fact, not only is it difficult to identify end users who may have reproduced copyrighted material, but
the fact that any given user is unaware of the information cached on his node complicates the issue of
distribution of copyrighted works. Napster users knew what files they were sharing; Freenet users only
know that they have made space available for shared files, but due to encryption, not what those files
contain.
However, if federal circuit courts follow Aimster’s lead, or if the Supreme Court grants review in
the Grokster case, commercial P2P services may not be able to shield themselves through such
encryption, although end users may enjoy some protection to the extent encryption makes it more
112 From a technological standpoint, Kazaa’s supernode system is actually an advance over the Gnutella process in
which a request for a file goes to every user on the system. Newer tools enhance this capability even further by creating temporary indexing responsibility for specific file categories at the level of individual computers (eDonkey), and splitting files into smaller pieces that can be distributed independently and more quickly (eDonkey and BitTorrent). The IP addresses of the information downloaders are exposed on both eDonkey and BitTorrent, which would allow antipiracy enforcers to track down these users. See John Borland, File Swapping Shifts Up a Gear (May 27, 2003), at http://zdnet.com.com/2100-1104-1009742.html.
113 See Ian Clarke et al., Protecting Free Expression Online with Freenet, IEEE Internet Computing, 6(1) (Jan./Feb. 2002) at 40, available at http://freenetproject.org/papers/freenet-ieee.pdf.
114 Id. at 42.
115 Id. at 43.
116 Ryan Roemer, The Digital Evolution: Freenet and the Future of Copyright on the Internet, 2002 UCLA J.L. & Tech. 5, at 3 (2002), available at http://www.lawtechjournal.com/articles/2002/05_021229_roemer.php.
117 Id. at 8.
Page 23
difficult to track illicit uses. Undoubtedly the variety of architectural permutations P2P providers will
employ in their software will continue to challenge secondary liability in copyright law.
VII. Conclusion
With each new court decision, P2P services have come away with a kernel of knowledge on how
to adapt to their copyright environment, hoping to improve their chances of survival. Although P2P
providers may continue to reap short-term benefits, their long-term survival remains in doubt. Even if
P2P entities are completely vindicated, the P2P industry might still be weakened if users are frightened
away on a large scale by the RIAA and MPAA’s direct infringement actions.
The relative success of services like iTunes,118 Rhapsody,119 and Movielink120 suggest that, at the
right price points, legal music and movie subscription services are economically viable. Just as the Sony-
Betamax case presaged a very profitable video and DVD industry at the time the movie studios thought
that VCRs would completely undermine their business, online music and movie distribution could
conceivably become more lucrative than capital- and labor-intensive distribution of tangible recordings.
Perhaps cooperation between the recording and movie industries on the one hand, and their
once arch rival P2P networks on the other, is inevitable. Indeed, Bertelsmann had surprised industry
observers by investing in Napster in 2000. In late 2003, Sony and Bertelsmann agreed to merge their
respective recorded music businesses into Sony BMG. Although Sony’s music division was a plaintiff in
the Grokster case prior to the Sony-Bertelsmann venture, Sony BMG recently announced that it is
cooperating with Grokster in a venture to combine free music sampling with paid downloads.121 Details
remain sketchy at the time of this writing, but Sony’s move may signal a capitulation by the recording
industry in its legal attack on P2P services—or at least slow its momentum. What results from the
cooperation between Sony BMG and Grokster, and whether other record companies will follow suit
individually or in manner that pools their catalogues, remains to be seen. Making your enemies your
friends—at least those to whom you have lost—may be the entertainment industry’s new tagline.
118 See www.apple.com/itunes.
119 See www.listen.com.
120 See www.movielink.com.
121 Jon Healey, “Sony BMG, Grokster Join Forces,” Los Angeles Times, at C1 (Oct. 29, 2004).