General

Let’s look for attorneys to represent several defendant categories

If any of those people, whom Sperlein has already named on the case, are reading this, you definitely need to start actively looking for attorneys. (Those who are not yet named might want to start talking to attorneys as well.) I would suggest that you start calling those California attorneys, who are on the list provided by EFF. (There is also a List of Attorneys from Subpoena Defense Alliance, but I am not sure whether it is up to date.) Ask those attorneys if they would be willing to represent several people with the same defense (I have listed several defense categories below). This way people with similar defense argumentation can get together, polish arguments, and hopefully save on attorney fees. If you find an attorney for a particular category, please list his information in a comment to this post. Then we’ll discuss this attorney, and people in the relevant defense category will decide whether they would like to join the group represented by this attorney. I suggest taking part in this discussion before committing to one particular attorney: it will be more efficient if people in one defense category will end up in one group. If people in one group like two or three attorneys, they can try asking those attorneys to work together for the entire group – like EFF and Public Citizen attorneys did.

Here is my list of possible defense categories. If I forgot something, or if you have better ideas, please comment.

  1. Those who never used or downloaded the eDonkey client and have an unsecured wireless router. Note that the troll is accusing you of negligence and states that “AT&T requires in its Terms of Use that subscribers secure wireless routers with a password.” (See case Docket 41, p.22.) Please look at the Terms of Use and make sure that this fact is not misrepresented. Also note that you will likely have to submit all your computer equipment for technical investigation: the troll will be looking for traces of IO Group’s products and eDonkey client.
  2. Those who have been using eDonkey but did not intend to download any copyrighted product or any pornography (as indicated by the innocent file name listed above the title of the allegedly infringed movie on p.2 of the ransom letter). I believe that your defense should claim (and you will need evidence to substantiate this claim) that one can find plenty of legally free files on eDonkey and you were looking for one of such files, as the file name listed in the letter indicates. In order to entrap you, someone renamed one of IO Group’s products to make the file name look like the name of the free file that you were searching for. Under your circumstances, Sperlein’s conspiracy argument sounds ridiculous. Note, however, that he may claim that it was a negligent or accidental distribution and you are still liable under 17 U.S.C. § 504 and 505. I believe that if you were entrapped, you should not be liable, but only an experience copyright attorney can give you a credible opinion on this matter.
  3. Those who have been using eDonkey and were looking for freely distributed (i.e. not copyrighted) pornography (as indicated by the file name listed above the title of the allegedly infringed movie on p.2 of the ransom letter). All the arguments for group 2 above hold for you, but I hope that you understand that the defendants in group 2 would prefer not to be associated with pornography. In addition, your attorney will need to explain how you were going to distinguish free pornography from copyrighted one.
  4. Those who were looking for some particular copyrighted non-pornography product. The troll will probably do his best to claim civil conspiracy to infringe copyright (in general). Note how he claims that “the eDonkey2000 Network is used almost exclusively to locate, reproduce, and distribute infringing content” (Docket 41, p.18). Your attorney will have to work on this issue.
  5. Those who were looking for some particular copyrighted pornography product. I don’t really know whether it will make a difference whether it was IO Group’s product or some other copyrighted porno, but, even though I hate the idea of feeding trolls, settling is probably your best option, unless you can find an attorney who will agree to defend you pro bona. I don’t hope. However that you will find such attorney.
  6. Those whose ransom letters show the file name that cannot be interpreted (for example, -江蕙 酒候的心聲.rar). In your place, I would consult a cryptographer to see whether this unreadable sequence actually means something, and after this consultation see whether you fall into one of the categories listed above.

Please limit the subjects of comments in this thread only to discussing the categories and attorneys that could work with those. I suggest using other posts for other topics. If you’d like to see a post with a new topic, please send me an e-mail with the text that you suggest for this topic.

A reminder: try to limit your communications with Mr. Sperlein to an absolutely necessary minimum, and avoid disclosing your defense to him. He will do his best to turn your words upside down and use them against you.

wordpress counter

Discussion

3 responses to ‘Let’s look for attorneys to represent several defendant categories

    • What if your are providing the internet account to another household. For example, a relative’s household has internet but I am the account holder. Which household’s computer equipment needs to be submitted? The household where the internet is being provided or my household were I reside?

  1. This troll is full of shit when he says that people are required to have passwords on their routers. The terms of service make no such claim. The only thing they say is that the account information that they give you is to be kept confidential, they do not say that the subscriber has to put a password on their router. In point of fact it is only recently that routers have been shipping in a locked down state. Up till now routers have come completely open out of the box so quite a large number of people do have open networks. Especially if they are not tech literate,not that this encryption can really stop hackers as WEP and WPA can be cracked within minutes. That someone even has a secured network hardly means that they do not have intruders on their network. That this guy willfully misrepresents the facts of the user agreement is not surprising though.

Leave a Reply

Fill in your details below or click an icon to log in:

WordPress.com Logo

You are commenting using your WordPress.com account. Log Out / Change )

Twitter picture

You are commenting using your Twitter account. Log Out / Change )

Facebook photo

You are commenting using your Facebook account. Log Out / Change )

Google+ photo

You are commenting using your Google+ account. Log Out / Change )

Connecting to %s