Large Recording Companies v. The Defenseless
Some Common Sense Solutions to the
Challenges of the RIAA Litigations
By Ray Beckerman
The concern of this court is that in
these lawsuits, potentially meritori-
ous legal and factual defenses are
not being litigated, and instead, the
federal judiciary is being used as a
hammer by a small group of plaintiffs
to pound settlements out of unrepre-
sented defendants.
—Judge S. James Otero,
Elektra Entertainment
Group Inc. v. O’Brien, 2007.
1
A
s every federal judge must be
painfully aware by now, an esti-
mated 30,000 ordinary people
2
have been sued during the past four
years in U.S. district courts by the
world’s four largest record companies,
EMI, SONY BMG, Warner Brothers
Records, and Vivendi/Universal, or their
affiliates. The suits have been brought for
alleged infringement of sound recording
Ray Beckerman
is a partner at
Vandenberg & Feliu, LLP, in New York
City. A commercial litigator, his practice
encompasses communications-related
topics. Beckerman is the author of a
popular copyright law blog, “Recording
Industry vs. The People,” http://recording-
industryvspeople.blogspot.com. He can be
reached at rbeckerman@vanfeliu.com.
copyrights. Although these companies
are represented by a trade association,
the Recording Industry Association of
America (RIAA), none of the hundreds
of other members of this association
has participated in the litigation cam-
paign. The large majority of the defen-
dants have defaulted, and the default
judgments against them have been in
amounts that represent more than 2,000
times the actual damages sustained by
the plaintiffs.
3
Of those remaining, most have paid
settlement amounts that exceed 1,000
times the plaintiffs’ actual damages,
and a great number of the settling
defendants—perhaps most of them—
are people who did not actually engage
in file sh aring, let alone copyright
infringement through file sharing, and
against whom no legally cognizable
claim for secondary infringement could
be mounted. However, they are settling
becau se the alternat ive—protracted,
costly federal litigation—is not pos-
sible for them.
As to the handful of defendants who
have neither defaulted nor settled, most
are pro se. Only a very few have had
any form of legal representation. And
in those instances where there has been
representation, the attorneys are usually
working pro bono, or on a basis closely
resembling it, sometimes as a favor and
sometimes even involuntarily.
4
The courts of other countries—no-
tably the Netherlands and Canada—are
not clogged with these cases for the sim-
ple reason that they were quick to recog-
nize the paucity of the RIAA’s evidence
and refused to permit the identities of
Internet subscribers to be disclosed to
the record companies.
5
The courts of the
United States have not been so discrimi-
nating and have allowed a veritable
flood of one-sided litigation to crowd
their dockets.
This article will at-tempt to remove
some of the mythology re-ga rding these
cases, to make observations regarding
some of the points at which the process
is breaking down, and at each of those
junctures, to offer one or more practical,
constructive suggestions as to what the
courts need to do to make the process
more fair and balanced.
The Origin of a Case
There is a common misconception, active-
ly fostered by the RIAA’s public relations
spokespeople, that these are “download-
ing” cases. Nothing could be further from
the truth. The cases are brought without
any proof of downloading whatsoever.
The way in which these cases come
about is that an unlicensed “investiga-
tor” (through a method the RIAA has
termed “automated,” “proprietary,” and
“confidential” and that it refuses to dis-
close),
6
engages in a pretexting opera-
tion in which the investigator pretends
to be an ordinary user of one of the peer-
to-peer file-sharing networks. When the
investigator locates a group of “shared
files” on his computer screen, he makes
a screen shot, downloads a small num-
ber of files, and, from the data packet
he retrieves, supplies the RIAA with the
Internet protocol (IP) address contained
in the packet, together with the date and
time of the screenshot.
7
One investigative company, SafeNet
(formerly known as MediaSentry), con-
ducts all of these automated-process
Published in The Judges’ Journal, Volume 47, Number 3, Summer 2008. © 2008 by the American Bar Association. Reproduced with permission. All rights reserved. This information or any portion thereof
may not be copied or disseminated in any form or by any means or stored in an electronic database or retrieval system without the express written consent of the American Bar Association.