|FROM ||Ruben Safir
|SUBJECT ||Re: [NYLXS - HANGOUT] DRM is Theft
|From owner-hangout-at-mrbrklyn.com Sun Oct 2 22:05:12 2005
Received: from www2.mrbrklyn.com (localhost [127.0.0.1])
by www2.mrbrklyn.com (8.13.1/8.13.1/SuSE Linux 0.7) with ESMTP id j9325Aa9029196
for ; Sun, 2 Oct 2005 22:05:12 -0400
Received: (from majordomo-at-localhost)
by www2.mrbrklyn.com (8.13.1/8.13.1/Submit) id j9325ArS029195
for hangout-outgoings; Sun, 2 Oct 2005 22:05:10 -0400
X-Authentication-Warning: www2.mrbrklyn.com: majordomo set sender to owner-hangout-at-nylxs.com using -f
Received: from stat29.mrbrklyn.com (stat29.mrbrklyn.com [10.0.0.35])
by www2.mrbrklyn.com (8.13.1/8.13.1/SuSE Linux 0.7) with ESMTP id j93257Wa029191;
Sun, 2 Oct 2005 22:05:09 -0400
Subject: Re: [NYLXS - HANGOUT] DRM is Theft
From: Ruben Safir
Content-Type: text/plain; charset=UTF-8
Organization: Brooklyn Linux Solutions
X-Mailer: Ximian Evolution 1.4.4
Date: Sun, 02 Oct 2005 22:08:22 -0400
RIAA Sues Another 750 For File Sharing Sept. 30, 2005
E-Mail This Article
Print This Article
Discuss This Article
Write To An Editor
Subscribe To InformationWeek
The Recording Industry Association of America (RIAA) files another 757
lawsuits against people accused of illegally copying digital music.
By Gregg Keizer
Even as some file-sharing networks wave the white flag, the Recording
Industry Association of America (RIAA) kept up the pressure Thursday by
filing another 757 lawsuits against people accused of illegally copying
Sixty-four of the people targeted use the high-speed Internet2 network,
the RIAA said, which named 17 universities, including Boston University,
Columbia, Princeton, and UCLA, as among the offenders.
Coincidentally, the RIAA became a corporate member of Internet2 only two
weeks ago. At that time, Cary Sherman, president of the RIAA, said in a
statement that "we look forward to collaborative work with a broad
spectrum of Internet2â€™s members to develop new technologies that will
enable us to produce and distribute digital content over next generation
networks in ways that protect and enhance the value of creative works."
The remaining 693 "John Doe" lawsuits were filed against users of such
peer-to-peer (P2P) file-sharing networks as eDonkey and LimeWire.
In its two-year legal campaign against file sharing, the RIAA has sued
some 14,800 U.S. computer users. Nor are the actions against Internet 2
users new; this is the third wave of suits naming users of the
high-speed network intended for academic researchers. In April and May
2005, the RIAA expanded its anti-copying efforts to include nearly 500
students at 38 different Internet2-equipped schools.
"As long as students continue to corrupt this specialized academic
network for the flagrant theft of music, we will continue to make it
clear that there are consequences for these unlawful actions," Sherman
said in a May statemen
On Sun, 2005-10-02 at 19:49, mlr52-at-michaellrichardson.com wrote:
> Pro Bono. It will make some lawyers day.
> -----Original Message-----
> From: Ruben Safir
> Subj: Re: [NYLXS - HANGOUT] DRM is Theft
> Date: Sun Oct 2, 2005 7:30 pm
> Size: 17K
> To: mlr52-at-michaellrichardson.com
> cc: hangout-at-mrbrklyn.com
> How is she going to finance this?
> On Sun, 2005-10-02 at 18:07, mlr52-at-michaellrichardson.com wrote:
> > I Hope she stays the course.
> > -----Original Message-----
> > From: Ruben Safir
> > Subj: [NYLXS - HANGOUT] DRM is Theft
> > Date: Sun Oct 2, 2005 3:53 pm
> > Size: 16K
> > To: hangout-at-mrbrklyn.com
> > Oregon RIAA Victim Fights Back; Sues RIAA for Electronic Trespass,
> > Violations of Computer Fraud & Abuse, Invasion of Privacy, RICO, Fraud
> > ATLANTIC V. ANDERSEN
> > This is the case peer-to-peer file sharers have been waiting for. Tanya
> > Andersen, a 41 year old disabled single mother living in Oregon, has
> > countersued the RIAA for Oregon RICO violations, fraud, invasion of
> > privacy, abuse of process, electronic trespass, violation of the
> > Computer Fraud and Abuse Act, negligent misrepresentation, the tort of
> > "outrage", and deceptive business practices.
> > Ms. Andersen's counterclaims demand a trial by jury.
> > Ms. Andersen made the following allegations, among others:
> > 1. For a number of years, a group of large, multinational,
> > multi-billion dollar record companies, including these
> > plaintiffs, have been abusing the federal court judicial
> > system for the purpose of waging a public relations and public
> > threat campaign targeting digital file sharing activities. As
> > part of this campaign, these record companies retained
> > MediaSentry to invade private home computers and collect
> > personal information. Based on private information allegedly
> > extracted from these personal home computers, the record
> > companies have reportedly filed lawsuits against more than
> > 13,500 anonymous Ã¢Â€ÂœJohn Does.Ã¢Â€Â
> > 2. The anonymous Ã¢Â€ÂœJohn DoeÃ¢Â€Â lawsuits are filed for the sole
> > purpose of information farming and specifically to harvest
> > personal internet protocol addresses from internet service
> > providers.
> > 3. After an individualÃ¢Â€Â™s personal information is harvested, it
> > is given to the record companiesÃ¢Â€Â™ representatives and the
> > anonymous Ã¢Â€ÂœJohn DoeÃ¢Â€Â information farming suits are then
> > typically dismissed.
> > 4. The record companies provide the personal information to
> > Settlement Support Center, which engages in prohibited and
> > deceptive debt collection activities and other illegal conduct
> > to extract money from the people allegedly identified from the
> > secret lawsuits. Most of the people subjected to these secret
> > suits do not learn that they have been Ã¢Â€ÂœsuedÃ¢Â€Â until demand is
> > made for payment by the record companiesÃ¢Â€Â™ lawyers or Settlement
> > Support Center.....
> > 5. Tanya Andersen is a 42-year-old single mother of an
> > eight-year-old daughter living in Tualatin, Oregon. Ms. Andersen
> > is disabled and has a limited income from Social Security.
> > 6. Ms. Andersen has never downloaded or distributed music
> > online. She has not infringed on any of plaintiffsÃ¢Â€Â™ alleged
> > copyrighted interest.....
> > 7. Ms. Andersen has, however, been the victim of the record
> > companiesÃ¢Â€Â™ public threat campaign. The threats started when the
> > record companies falsely claimed that Ms. Andersen had been an
> > Ã¢Â€ÂœunnamedÃ¢Â€Â defendant who was being sued in federal court in the
> > District of Columbia. She was never named in that lawsuit and
> > never received service of a summons and complaint.
> > 8. Neither did Ms. Andersen receive any timely notice that the
> > suit even existed. That anonymous suit was filed in mid-2004.
> > Ms. Andersen first learned that she was being Ã¢Â€ÂœsuedÃ¢Â€Â when she
> > received a letter dated February 2, 2005, from the Los Angeles,
> > California, law firm Mitchell Silverberg & Knupp, LLP. The LA
> > firm falsely claimed that Ms. Andersen had downloaded music,
> > infringed undisclosed copyrights and owed hundreds of thousands
> > of dollars. Ms. Andersen was understandably shocked, fearful,
> > and upset. ....
> > 9. After receiving the February 2, 2005 letter, Ms. Andersen
> > contacted the record companiesÃ¢Â€Â™ Ã¢Â€Âœrepresentative,Ã¢Â€Â which turned
> > out to be Settlement Support Center, LLC. This company was
> > formed by the record companies for the sole purpose of coercing
> > payments from people who had been identified as targets in the
> > anonymous information farming suits. Settlement Support Center
> > is a Washington State phone solicitation company which engages
> > in debt collection activities across the country.
> > 10. When Ms. Andersen contacted Settlement Support Center, she
> > was advised that her personal home computer had been secretly
> > entered by the record companiesÃ¢Â€Â™ agents, MediaSentry.
> > 11. Settlement Support Center also falsely claimed that Ms.
> > Andersen had Ã¢Â€Âœbeen viewedÃ¢Â€Â by MediaSentry downloading Ã¢Â€Âœgangster
> > rapÃ¢Â€Â music at 4:24 a.m. Settlement Support Center also falsely
> > claimed that Ms. Andersen had used the login name
> > Ã¢Â€Âœgotenkito-at-kazaa.com.Ã¢Â€Â Ms. Andersen does not like Ã¢Â€Âœgangster
> > rap,Ã¢Â€Â does not recognize the name Ã¢Â€Âœgotenkito,Ã¢Â€Â is not awake at
> > 4:24 a.m. and has never downloaded music.
> > 12. Settlement Support Center threatened that if Ms. Andersen
> > did not immediately pay them, the record companies would bring
> > an expensive and disruptive federal lawsuit using her actual
> > name and they would get a judgment for hundreds of thousands of
> > dollars.
> > 13. Ms. Andersen explained to Settlement Support Center that she
> > had never downloaded music, she had no interest in Ã¢Â€Âœgangster
> > rap,Ã¢Â€Â and that she had no idea who Ã¢Â€ÂœgotenkitoÃ¢Â€Â was.
> > 14. Ms. Andersen wrote Settlement Support Center and even asked
> > it to inspect her computer to prove that the claims made against
> > her were false.
> > 15. An employee of Settlement Support Center admitted to Ms.
> > Andersen that he believed that she had not downloaded any music.
> > He explained, however, that Settlement Support Center and the
> > record companies would not quit their debt collection activities
> > because to do so would encourage other people to defend
> > themselves against the record companiesÃ¢Â€Â™ claims.
> > 16. Instead of investigating, the record company plaintiffs
> > filed suit this against Ms. Andersen. F. The Record Companies
> > have no Proof of Infringement.
> > 17. Despite making false representations to Ms. Andersen that
> > they had evidence of infringement .... plaintiffs knew that they
> > had no factual support for their claims.
> > 18. No downloading or distribution activity was ever actually
> > observed. None ever occurred. Regardless, the record companies
> > actively continued their coercive and deceptive debt collection
> > actions against her. Ms. Andersen was falsely, recklessly,
> > shamefully, and publicly accused of illegal activities in which
> > she was never involved.
> > Ms. Andersen further alleged:
> > 20. Entering a personÃ¢Â€Â™s personal computer without their
> > authorization to snoop around, steal information, or remove
> > files is a violation of the common law prohibition against
> > trespass to chattels.
> > 21. The record company plaintiffs employed MediaSentry as their
> > agent to break into Ms. AndersenÃ¢Â€Â™s personal computer (and those
> > of tens of thousands of other people) to secretly spy on and
> > steal information or remove files. MediaSentry did not have Ms.
> > AndersenÃ¢Â€Â™s permission to inspect, copy, or remove private
> > computer files. If MediaSentry accessed her private computer, it
> > did so illegally and secretly. In fact, Ms. Andersen was unaware
> > that the trespass occurred until well after she was anonymously
> > sued.
> > 22. According to the record companies, the agent, Settlement
> > Support Center used the stolen private information allegedly
> > removed from her home computer in their attempt to threaten and
> > coerce Ms. Anderson into paying thousands of dollars. ....
> > Under the provisions of the Computer Fraud and Abuse Act (18
> > U.S.C. Ã‚Â§ 1030) it is illegal to break into another personÃ¢Â€Â™s
> > private computer to spy, steal or remove private information,
> > damage property, or cause other harm.
> > 26. Ms. Andersen regularly used her personal computer to
> > communicate with friends and family across the country and for
> > interstate e-commerce. Ms. Andersen had password protection and
> > security in place to protect her computer and personal files
> > from access by others.
> > 27. The record company plaintiffs employed MediaSentry as their
> > agent to bypass Ms. AndersenÃ¢Â€Â™s computer security systems and
> > break into her personal computer to secretly spy and steal or
> > remove private information. MediaSentry did not have her
> > permission to inspect, copy, or remove her private computer
> > files. It gained access secretly and illegally.
> > 28. According to the record companiesÃ¢Â€Â™ agent, Settlement Support
> > Center, used this stolen private information in their attempt to
> > threaten and coerce Ms. Andersen into paying thousands of
> > dollars. ....
> > 31. According to the record companies, Ms. AndersenÃ¢Â€Â™s personal
> > computer was invaded by MediaSentry after she was identified
> > with a nine digit code (an Internet Protocol Address (Ã¢Â€ÂœIPAÃ¢Â€Â))
> > obtained from the anonymous information farming lawsuits.
> > MediaSentry did not have permission to inspect Ms. AndersenÃ¢Â€Â™s
> > private computer files. It gained access only by illegal acts of
> > subterfuge.
> > 32. The record companiesÃ¢Â€Â™ agent has falsely represented that
> > information obtained in this invasive and secret manner is proof
> > of Ms. AndersenÃ¢Â€Â™s alleged downloading. Ms. Andersen never
> > downloaded music but has been subjected to public derision and
> > embarrassment associated with plaintiffsÃ¢Â€Â™ claims and public
> > relations campaign.
> > 33. The record companies have used this derogatory, harmful
> > information to recklessly and shamefully publicly accuse Ms.
> > Andersen of illegal activities without even taking the
> > opportunity offered by Ms. Andersen to inspect her
> > computer. .....
> > 36. Despite knowing that infringing activity was not observed,
> > the record companies used the threat of expensive and intrusive
> > litigation as a tool to coerce Ms. Andersen to pay many
> > thousands of dollars for an obligation she did not owe. The
> > record companies pursued their collection activities and this
> > lawsuit for the primary purpose of threatening Ms. Andersen (and
> > many others) as part of its public relations campaign targeting
> > electronic file sharing.
> > 37. The record companies have falsely represented and pleaded
> > that information obtained in this invasive and secret manner is
> > proof of Ms. AndersenÃ¢Â€Â™s alleged downloading and distribution of
> > copyrighted audio recordings. Ms. Andersen never downloaded
> > music but has been subjected to public derision and
> > embarrassment.....
> > 40. The record companies knowingly represented materially false
> > information to Ms. Andersen in an attempt to extort money from
> > her.
> > 41. For example, between February and March 2005, the record
> > companies, through their collection agent Settlement Support
> > Center, falsely claimed that they had proof that Ms. AndersenÃ¢Â€Â™s
> > IPA had been Ã¢Â€ÂœviewedÃ¢Â€Â downloading and distributing over 1,000
> > audio files for which it sought to collect hundreds of thousands
> > of dollars. This statement was materially false. Ms. Andersen
> > never downloaded or distributed any audio files nor did the
> > record companies or any of their agents ever observe any such
> > activity associated with her personal home computer.....
> > 49. Despite having never observed any downloading or
> > distribution associated with Ms. AndersenÃ¢Â€Â™s personal home
> > computer and despite refusing Ms. AndersenÃ¢Â€Â™s offer to allow an
> > inspection of her own computer, the record companies wrongfully
> > continued their improper debt collection activities against
> > her.....
> > 50. The record companies pursued debt collection activities for
> > the inappropriate purpose of illegally threatening Ms. Andersen
> > and many thousands of others. This tortious abuse was motivated
> > by and was a central part of a public relations campaign
> > targeting electronic file sharing.
> > 51. An employee of Settlement Support Center admitted to Ms.
> > Andersen that he believed that she had not downloaded any music.
> > He explained that Settlement Support Center and the record
> > companies would not quit the debt collection activity against
> > her because to do so would encourage other people to defend
> > themselves against the record companiesÃ¢Â€Â™ claims.
> > 52. The record companies were aware of Ms. AndersenÃ¢Â€Â™s
> > disabilities and her serious health issues. Settlement Support
> > Center knew that its conduct would cause extreme distress in Ms.
> > Andersen. As a result of defendantÃ¢Â€Â™s conduct, Ms. Andersen
> > suffered severe physical and emotional distress and health
> > problems.
> > 53. The record companiesÃ¢Â€Â™ conduct resulted in damages, including
> > harm to Ms. AndersenÃ¢Â€Â™s health and property in an amount to be
> > specifically proven at trial......
> > 55. OregonÃ¢Â€Â™s Unlawful Trade Practices Act prohibits those in
> > trade or commerce from engaging in unfair or deceptive practices
> > in the course of business with consumers. ORS 646.605 et seq.
> > 56. The record companiesÃ¢Â€Â™ agent, Settlement Support Center, is a
> > company doing business in Washington which was established to
> > engage in debt collection activities in manystates, including
> > Washington and Oregon.
> > 57. Settlement Support Center acting as the record companiesÃ¢Â€Â™
> > agent made false and deceptive statements to Ms. Andersen in an
> > attempt to mislead, threaten, and coerce her into paying
> > thousands of dollars.
> > 58. Settlement Support Center acting as the record companiesÃ¢Â€Â™
> > agent has made similar false and deceptive statements to many
> > other residents of Washington and Oregon, and across the
> > country. The public interest has been and continues to be
> > directly impacted by plaintiffsÃ¢Â€Â™ deceptive practices.
> > 59. The record companiesÃ¢Â€Â™ conduct resulted in damages and harm
> > to Ms. Andersen and her property in an amount to be specifically
> > proven at trial. ....
> > 61. The Oregon Racketeer Influenced and Corrupt Organization Act
> > prohibits companies from engaging in organized racketeering or
> > criminal activities. ORS 166.715 et seq.
> > 62. As fully set forth above, the record companies hired
> > MediaSentry to break into private computers to spy, view files,
> > remove information, and copy images. The record companies
> > received and transmitted the information and images to
> > Settlement Support Center. As the record companiesÃ¢Â€Â™ agent,
> > Settlement Support Center then falsely claimed that the stolen
> > information and images showed Ms. AndersenÃ¢Â€Â™s downloading and
> > distributing over 1,000 audio files. The record companies
> > falsely claimed that Ms. Anderson owed hundreds of thousands of
> > dollars in an attempt to coerce and extort payment from her.
> > 63. The record companies directed its agents to unlawfully break
> > into private computers and engage in extreme acts of unlawful
> > coercion, extortion, fraud, and other criminal conduct.
> > 64. The record companies and their agents stood to financially
> > benefit from these deceptive and unlawful acts. Proceeds from
> > these activities are used to fund the operation of the record
> > companiesÃ¢Â€Â™ continued public threat campaigns.
> > 65. These unlawful activities were not isolated. The record
> > companies have repeated these unlawful and deceptive actions
> > with many other victims throughout the United States.