Digital Currency



Contact Us
This form does not yet contain any fields.
    Featured Audio

    Techdirt Interview of Ira Rothken
    -Discussion of Ira Rothken's career handling internet copyright cases

    February 23, 2012 Radio New Zealand
    -US abuse of power in taking down Megaupload
    -No such thing as criminal secondary copyright infringement
    -The Prosecution is politically motivated 

    Ira Rothken presentation at e-discovery seminar (excerpt)
    - discussion of technical-legal factors to consider in determining whether e-discovery related data is "not reasonably accessible"
    - More information can be found here 

    Featured Videos


    Documentary Extras
    Kim Dotcom: Caught
    in the Web

    Selected Talks and Interviews


    Twitter Alerts
    Investigation Tips
    This form does not yet contain any fields.
      News Index

      The information supplied on this web site is general in nature and should not be relied upon to make legal decisions. Interacting with e-mail, forms, or online forums on this web site does not constitute the creation of an attorney/client relationship. This web site is an advertisement for legal services. The examples of client cases and results discussed on this web site are not a guarantee of your outcome if we represent you in a particular case. 


      High Technology Litigation, Business Transactions,
      & Class Actions

      Our firm emphasizes internet litigation, intellectual property litigation (including trademarks, trade secrets, copyrights, and patents), internet law, startups, complex business litigation, class actions, videogame law, business law, blockchain law, employment litigation, consumer protection litigation, and personal injury/tort litigation.

       If you are interested in a free initial consultation or if you are a news organization interested in getting an interview you may use our contact form.

      We have dedicated sites for law technology niches at (law and blockchain, ICO consulting, smart contracts, litigation, and cryptocurrency) and (law and artificial intelligence, expert systems, drones, machine learning, and bots).


      Featured Current Events

      60 Minutes Interview of Ira Rothken by Bob Simon regarding government abuse of Kim Dotcom

      New Megaupload/Kim Dotcom Whitepaper

      Megaupload General Legal Points

      Ira Rothken interview with CNBC on the Kim Dotcom case

      For updates on the Megaupload/Kim Dotcom case please visit our special case update section

      Kim Dotcom, Steve Wozniak, Ira Rothken

      Read what Steve Wozniak thinks about Kim Dotcom and the Megaupload case in this CNET article 





      Ira P. Rothken on Bloomberg 

      Bloomberg Interview with Ira P. Rothken on the Megaupload/Kim Dotcom case discussing Court Order finding illegal government conduct




      Featured Activities

      About Us

      Our firm emphasizes intellectual property litigation (including trademarks, trade secrets, copyrights, and patents), internet law, startups, complex business litigation, class actions, videogame law, business law, blockchain law, employment litigation, consumer protection litigation, and personal injury/tort litigation. We are actively involved in cutting edge electronic discovery ("e-discovery") matters and Ira P. Rothken is an active member of the Sedona Conference and maintains a blog at on electronic discovery and evidence issues for legal professionals. Here is a CNET News Story Profiling Ira P. Rothken's Career Protecting Internet Technology Companies.

      Emily Chang interviewing Ira Rothken on Bloomberg West

      We Have Assisted in the Startup of Some of the Most Successful E-Commerce and Electronic Entertainment Companies in the World

      Ira P. RothkenIn addition to our robust litigation practice we assist electronic entertainment, high technology, and e-commerce companies in their business, startup, and legal transactions. For example, since the inception of the "commercialized" internet in the mid 1990s, we have represented some of the largest and most successful web sites in the world on a huge range of matters from startup issues to risk reduction strategies to e-commerce policies and agreements. In many instances we were called upon to handle issues where there was no clear precedent and thus we had to innovate a solution.

      We have also helped start numerous successful electronic entertainment and videogame companies including Nihilistic Software, Pandemic Games, Telltale, and Arenanet. Ira P. Rothken, a member of IGDA, has spoken multiple times on how to start a videogame development company at the Computer Game Developers Conference (CGDC). Here is a sample of videogame development transactions in which we assisted our clients:

      Featured Posts



      Cato Institute and Institute for Justice File Amicus Brief supporting Megaupload defendants 

      The Cato Institute and Institute for Justice filed an Amicus brief today in the Fourth Circuit Court of Appeals supporting the Megaupload defendants' request for rehearing en banc to reverse findings of Fugitive Disentitlement.

      The following is a short summary of the Cato-IJ Amicus brief. The full Amicus brief can be found here.


      The panel’s construction of 28 U.S.C. § 1355 expands federal jurisdiction and fundamentally alters the nature of a long standing doctrine of American law— in rem jurisdiction—with no clear statement from Congress. In addition, the panel’s construction raises serious doubts as to the constitutionality of the statute ignoring this court’s precedent. Further, the panel compounds this mistake by upholding 28 U.S.C. § 2466, which unconstitutionally cuts off the right to an essential constitutional protection—the due process of law—creating dangerous incentives for abuse by law enforcement...
      ...With the broad expansion of jurisdiction the panel adopted, the government’s elimination of due-process rights via the fugitive-disentitlement doctrine is alarming. Under the panel’s reading, anyone who has ever been online and happened to have payments routed through American servers could be subject to U.S. jurisdiction. Couple this de facto universal jurisdiction with the ability to invoke fugitive disentitlement in civil forfeiture proceedings, and this court could ratify a dangerous mix of perverse incentives and unchecked government profiteering. These concerns are hardly speculative. Over the course of the past two decades, it has become clear that forfeiture abuse is directly tied to whether law enforcement agencies and officials can profit from the seizures. This court should not make it easier for further misuse to occur. See Marian R. Williams, Jefferson E. Holcomb, et. al, Policing for Profit, Institute for Justice (Nov. 2015).
      The Supreme Court has only ratified the use of fugitive disentitlement in criminal appeals for certain limited purposes. Because those purposes can’t be extended to fugitive disentitlement in civil forfeiture proceedings, § 2466 serves no purpose except to strip claimants of due-process rights.



      Kim Dotcom files Petition to the Fourth Circuit Court of Appeals for rehearing en banc

      Today our US legal team on behalf of the Megaupload defendants, including Kim Dotcom, filed a Petition to the Fourth Circuit Court of Appeals for rehearing and rehearing en banc on the issues of forfeiture of assets and fugitive disentitlement. The case is entitled US v Finn Batato. 

      An excerpt of the Petition is below. The entire Petiition can be found here.

      Petitioners seek en banc review of a 2-1 ruling that conflicts with the precedents of this Court, the Supreme Court, and other circuits on issues of importance to the scope of federal jurisdiction over foreign property and civil forfeiture law.
      The case arises from a separate criminal case—the largest criminal copyright case in U.S. history—in which the government indicted several foreign defendants. Instead of following typical procedures—extraditing the defendants and then proving its case at trial before seeking forfeiture—the government took a much more aggressive approach. It brought this civil forfeiture case against foreign property owned by the defendants and others (collectively, “Claimants”) and, relying on the so-called “fugitive disentitlement” statute, argued that the owners’ claims to their property should be stricken and the property forfeited without a trial on the merits.
      This foreign property, however, is under the sole control of foreign courts that have not followed U.S. orders. The district court recognized that these courts “may or may not” respect its forfeiture order (JA-1982), and the government admits that “even with a valid forfeiture order, the fugitive’s property may suffer no adverse effect” (Br. 20 n.13). Even after the judgment below, these courts have released millions in assets to Claimants. As one of the courts put it: The “harsh- ness” of the district court’s “fugitive disentitlement” order finds “no place in [its] law” (JA-2197), and any U.S. request that “require[s] [its government] to ride roughshod over [its] own laws” is unenforceable. JA-2199, 2207. In short, the order below is not binding on those controlling the property—it is advisory.
      Yet, over Judge Floyd’s careful dissent, the panel held that Article III did not limit the district court’s exercise of in rem jurisdiction, disentitled Claimants from receiving any hearing on their ownership interests, and adjudged their property forfeit. That divided ruling conflicts with the precedents of this Court, the Supreme Court, and other circuits on three major issues.
      First, under this Court’s precedent, “[o]nly if the court has exclusive custody and control over the property does it have jurisdiction over the property so as to be able to adjudicate rights in it that are binding against the world.” R.M.S. Titanic, Inc. v. Haver, 171 F.3d 943, 964 (4th Cir. 1999) (Titanic I); R.M.S. Titanic, Inc. v. The Wrecked & Abandoned Vessel, 435 F.3d 521, 530 (4th Cir. 2006) (Titanic II); see Dissent 57 (Addendum B). Here, the property is controlled by foreign courts not bound to obey a U.S. forfeiture order, so such order is “a hypothetical judgment”—an unconstitutional “advisory opinion.” Steel Co. v. Citizens for a Better Env’t, 523 U.S. 83, 101 (1998).
      The panel dismissed Titanic I and II as “admiralty” cases. Op. 12-15. But nothing in those cases suggests that the Court’s Article III analysis was so limited. As Judge Floyd recognized, the cases “contain principles both of admiralty law and of constitutional law.” Dissent 57. En banc review is needed to ensure uniformity in this Court’s decisions, and to avoid a conflict with Supreme Court precedent.
      Second, the panel’s decision conflicts with the Second Circuit’s holding that the plain text of 28 U.S.C. § 1355 (Addendum A-1) provides for subject-matter jurisdiction, venue, and service of process in forfeiture cases involving foreign prop- erty, but does not (and could not) “fundamentally alter well-settled law regarding in rem jurisdiction.” United States v. All Funds on Deposit in Names of Meza or De Castro, 63 F.3d 148, 152 (2d Cir. 1995). After all, absent “control over [the foreign] property,” “[a] forfeiture order directed against such property [is] wholly unenforceable.” Id. In holding that § 1355 “dispenses with this traditional re- quirement” of control (Op. 8), the panel invited this result and deepened a circuit split. See Dissent 50 (Meza “reach[ed] the opposite conclusion”).
      Third, the panel’s holding that due process allows the government to seize Claimants’ property without an adversarial hearing conflicts with both Supreme Court precedent holding that “a court in a civil forfeiture suit [cannot] enter judg- ment against a claimant because he is a fugitive from ... a related criminal prosecution” (Degen v. United States, 517 U.S. 820, 823 (1996)) and circuit precedent holding that “barring [claimants’] right to defend” civil forfeiture suits violates due process (United States v. $40,877.59, 32 F.3d 1151, 1154-57 (7th Cir. 1994)).
      Even apart from the foregoing conflicts with precedent, the panel’s divided ruling raises issues of exceptional importance. By stacking allegations of fugitive status on top of allegations of forfeitability, the government can obtain an unprecedented, roving worldwide license to indict foreign citizens who have never lived or worked in the United States and forfeit their foreign property—all without proving any wrongdoing or having control over the property. Review is warranted.



      Leading BitTorrent Search Engine Defends Itself Against DOJ's Experimental Criminal Copyright Claims

      In July of 2016 the United States Department of Justice brought a criminal complaint against Artem Vaulin for allegedly violating criminal copyright law arising out of the KickAssTorrents search engine. The DOJ started their case with a press release while at the same time having Polish authorities arrest and put Mr. Vaulin in jail so as to impede his ability to work with US counsel on his own defense. Mr. Vaulin has the presumption of innocence especially in an experimental case of first impression involving search engines, torrent files, and criminal copyright law. Mr. Vaulin's legal team requested in a letter this week that the DOJ dismiss the criminal complaint and free Mr. Vaulin from prison.
      Below is an excerpt from our letter requesting that the DOJ dismiss the criminal complaint against Artem Vaulin providing the view that the criminal claims fail as a matter of law.


      Summary. The Criminal Complaint in combination with the Affidavit of the Homeland Security Investigator, together referred to herein as the “CC”, fail to properly allege a crime as a matter of law. There is no showing of probable cause for the alleged offenses or for any offense.  This alleged criminal copyright case arises out of an erroneous theory of criminal copyright law advanced by the United States that attempts to hold Artem Vaulin ("Defendant") criminally liable for the alleged infringing acts of KAT's search engine users. Discussion of Mr. Vaulin’s involvement in KAT shall await another day. Distilled down, in terms of technology, nothing more is alleged in the CC than that a visitor to defendants' alleged "KickAssTorrents" ("KAT") site can take advantage of automated search processes embodied there to search for and locate "dot torrent" files. Such files contain textual information assembled by automated processes and do NOT contain copyrighted content. After leaving the defendants' alleged websites, the visitor may stop and do nothing or use the data in such torrent files in conjunction with third party "client" software; and that pursuit may, according to the desires of the user and the uncertain nature of the availability of third party files on the internet, lead to both infringing and non-infringing files being constructed that are located elsewhere on the Internet. By the time any possible primary infringement by a former KAT visitor could ever occur the visit to the site is long over.The indictment does not even come close to alleging direct "willful" copyright infringement as KAT contains and transmits no content files.  Defendants cannot be held criminally responsible for what users do after they leave the KAT search engine behind.  The Copyright Act does not criminalize secondary copyright infringement.  17 U.S.C. § 506; see also Metro-Goldwyn-Mayer Studios, Inc. v. Grokster, 545 U.S. 913, 930, 125 S.Ct. 2764, 2776, 162 L.Ed.2d 781 (2005) (hereinafter "Grokster") (noting that the Copyright Act does not expressly create any secondary liability).  The Criminal statute at issue namely Section 506 only imposes liability for direct, willful infringement that causes specific damages.  17 U.S.C. § 506(a). The government’s copyright conspiracy theory for similar reasons fails as a matter of law. Such a conspiracy theory is little more than a novel back door attempt to improperly argue judge made civil secondary infringement in a criminal case. Trying to hold KAT criminally responsible for the entire global BitTorrent network does not pass muster.

      The CC defects are breathtaking in scope and include failures in alleging geographical location and date of alleged offenses, conspiracy, willfulness and/or commercial advantage or gain.Although the CC categorically alleges that offsite downloads were "unauthorized," there is no specific allegations of the who, what, where, when, why, and how of any actual unauthorized downloads and no allegations to support criminal willful infringement.The absence of allegations of specific unauthorized downloads or direct infringements in the complaint is not inadvertent:  rather it is a side effect of how far removed defendant is from the potential infringing event and it is part of an improper criminal complaint that purports to impose presumptive criminal liability on a BitTorrent search engine for alleged offsite infringements. It is also a sign that the government is eager to improperly introduce concepts of judge made civil law into a criminal statutory analysis.

       The Affidavit is replete with incorrect, misleading and irrelevant allegations regarding BitTorrent technology and how KickAssTorrents was operated. Blanket allegations of a similar kind were lodged in the Seventh Circuit, where this case was filed, in Flava Works, Inc. v. Gunter, 689 F.3d 754 (7th Cir. 2012) and were found to be inadequate in a civil context.  Civil cases such asFlava Works have rejected contentions that operators of informational websites such as KAT have a duty to monitor or supervise uses of information obtained from their sites. Most of the accusations in the CC could equally be lodged against the site inFlava Works named MyVidster and even the Google search engine.

       The Affidavit fails to identify even one specific infringement committed within the last 180 days by someone in the United States of America, other than by HIS Special Agents.  (See ¶ 19 of the Affidavit.)   The Affidavit fails to connect automated operations of KAT servers with criminal knowledge or willfulness on the part of Defendant as to any copyright infringement in the United States, such as infringements of “Captain America:  Civil War” alleged in Count Three of the Criminal Complaint and apparently referenced in the foregoing ¶ 19 of the Affidavit. There can be no criminal copyright infringement under US law for infringements occurring outside the United States. It is an "'undisputed axiom that United States copyright law has no extraterritorial application[.]'" Subafilms, Ltd. v. MGM-Pathe Commc'ns Co., 24 F.3d 1088, 1093 (9th Cir. 1994) (en banc), cert. denied, 513 U.S. 1001 (1994) (quoting 3 David Nimmer & Melville B., Nimmer on Copyrights § 12.04[A][3][b], at 12-86 (1991)). According to ¶ 40 of the Affidavit, KAT servers for “Subject Domain 4” of KAT operations that are referenced in ¶ 19 were located in Canada.  

      We address separate issues below.  We urge you to dismiss the case.


      1.      Torrent Technology.

      BitTorrent technology is a kind of decentralized peer-to-peer file-sharing that is well suited to distribution of files, such as software upgrades, videogames and videos.  There are many independent legitimate creators who depend on BitTorrent technology.  Like any other dual use technology BitTorrent technology is “dual use” and can be used for good and bad purposes.  The BitTorrent technology at issue in this case is capable of substantial non infringing uses and is therefore protected by the Sony Doctrine.

      An important principle of torrent technology is the “swarm,” which is comprised of individuals sharing and acquiring a file.  One individual, called the “seed,” provides the original copy.  Other individuals, called “leeches,” each acquire a piece of the seed’s file and then exchange pieces among themselves.  A file may be broken up into dozens of pieces that are exchanged by individuals.  In a large swarm, several seeds may appear.  Individual join a swarm, share pieces amongst themselves and finally acquire a whole file, often thereafter leaving the swarm.

      “Torrent files” maintained on a torrent site such as KAT are text files that provide information pointers into the BitTorrent network. Torrent files thus serve a similar function to hyperlinks but are more attenuated.  Unlike hyperlinks where a click on the link can obtain a desired jump to another internet destination, such as an html “page” or pdf file, torrent files are more removed from the target. In order to use a torrent file, one must download the torrent file, leave the torrent search engine site, open up a third party "thin client" software to read the text information in the torrent file, and at some point initiate involvement in the global BitTorrent Network. This process can be automated by the end user by adjusting settings on the third party software. Once a user downloads a torrent file it leaves KAT behind.

      A “torrent site” provides a search engine of torrent files.  Towards that end, KAT provides a searchable index of torrents like that of other search engines. 

      Another online torrent component, a public “tracker,” enables computers using the BitTorrent protocol to contact each other.

      Neither a torrent site nor a tracker ever stores, copies, or transmits copyrighted materials. 

      Inadequacy of the Affidavit is demonstrated by comparing its charges with objective facts of torrent technology.  Paragraph 19 of the Affidavit inaccurately states:  “Between on or about June 24, 2016, and on or about June 30, 2016, HSI Special Agents downloaded from the Northern District of Illinois the following prerelease movies from KAT (at Subject Domain 4).”   There was no movie or other content on KAT that could ever be downloaded and therefore no direct infringements could have occurred on KAT. Perfect 10, Inc. v., Inc., 487 F.3d 701, 717 (9th Cir. 2007) (party from whose site content is actually transmitted and subsequently displayed on the end-user’s screen is responsible for display, not search engine that merely links to that content). Infringements that occur after users, including HSI Special Agents, leave the KAT site behind cannot be criminally actionable against KAT.         

      2.      Allegations that Defendant Himself Willfully Infringed Copyright in the United States are Devoid of Substance.

      Counts Three and Four of the Criminal Complaint allege that Defendant himself committed criminal copyright infringement in the Northern District of Illinois by willfully distributing copyrighted works.  The only copyrighted work identified in Counts Three and Four is “Captain America: Civil War,” referenced in paragraph 19, discussed supra.  There is no evidence to support the allegations as “Captain America: Civil War” or as to any specific work. The lack of evidence is not surprising given that the KAT technology did not store or transmit any content. If a user committed copyright infringement, it is only after they left the KAT servers behind.

      It is settled that liability for direct copyright infringement cannot be based on provision of information services to individuals that such individuals use to commit infringement. More specifically it is also well settled law that mere hyperlinks and their more attenuated cousin, torrent files, cannot constitute direct copyright infringement. In brief, because KAT did not copy anything or transmit content, it cannot be charged withdirect copyright infringement.  See, e.g., Perfect 10, Inc. v., Inc., 487 F.3d 701, 717 (9th Cir. 2007) (party from whose site content is actually transmitted and subsequently displayed on the end-user’s screen is responsible for display, not search engine that merely links to that content); Online Policy Group v. Diebold, Inc., 337 F. Supp. 2d 1195, 1202 n.12 (N.D. Cal. 2004) (“hyperlinking per se does not constitute direct copyright infringement because there is no copying.”);Arista Records, Inc. v. MP3Board, Inc., No. 00 CIV. 4660(SHS), 2002 WL 1997918, at *4 (S.D.N.Y. Aug. 29, 2002) (linking to content does not implicate distribution right and thus, does not give rise to liability for direct copyright infringement);Ticketmaster Corp. v., Inc., 54 U.S.P.Q.2d 1344, 1346 (C.D. Cal. 2000) (“[H]yperlinking does not itself involve a [direct] violation of the Copyright Act (whatever it may do for other claims) since no copying is involved. . . . [It] is analogous to using a library’s card index to get reference to particular items, albeit faster and more efficiently.”);Bernstein v. JC Penney, Inc., No. 98-2958 R EX, 1998 WL 906644, at *1 (C.D. Cal. Sept. 29, 1998) (granting motion to dismiss on the ground that hyperlinking cannot constitute direct infringement).

      On or about April 7, 2016 the Court of Justice in the EU ruled that defendant’s provision of hyperlinks on the Internet that lead to publicly available files on third party servers does not constitute direct copyright infringement. (GS Media BV v Sanoma Media Netherlands BV, Playboy Enterprises International Inc., Britt Geertruida Dekker). The EU Court of Justice would likely rule that torrent files that lead to publicly available files on third party servers do not constitute direct copyright infringement. To the extent that there is a dual criminality analysis in Poland this, amongst other things, makes any extradition request highly dubious.

      The failure to properly allege direct infringement is fatal to the government’s claim. Even in cases where a defendant is criminally charged with actual copying or direct infringement the standard is extremely high. The copyright statute itself indicates the higher level of knowledge and intent in a “willfulness” mental state. “Evidence of reproducing and distributing copyrighted works does not, by itself, establish willfulness.” See 17 U.S.C. § 506(a)(2).  Willfully” as used in 17 U.S.C. § 506(a) connotes a “voluntary, intentional violation of a known legal duty.” United States v. Liu, 731 F.3d 982, 990 (9th Cir. 2013).  Proof of the “defendant's specific intent to violate someone's copyright is required.”Id. at 989-90. 66.  Liu further holds that a general intent to copy is insufficient for criminal copyright liability. Id. at 991.  If 17 U.S.C. § 506(a)’s willfulness requirement were read “to mean only an intent to copy, there would be no meaningful distinction between civil and criminal liability in the vast majority of cases.” Id.  “[W]illful infringement requires a showing of specific intent to violate copyright law.” BC Tech., Inc. v. Ensil Int’l Corp., 464 Fed. Appx. 689, 696 (10th Cir. 2012). The language of the statute and interpretation by the courts teaches us that ignorance of the law is a defense. 

      The government has not properly alleged willful infringement against any person who has used KAT.

      In the instant case the government’s case fails at the threshold as KAT was not involved in copying or transmitting any content and cannot be a direct willful infringer as a matter of law.

      3.      There is No Criminal Liability for Secondary or Indirect Copyright Infringement.

      The Affidavit appears to base criminal charges on allegations and legal doctrines that are limited to the context of civil proceedings pursuant to theories of secondary or indirect copyright infringement.  Secondary liability in civil copyright law is a common law creation made by judges. SeeSony Corp. v. Universal City Studios, Inc., 464 U.S. 417, 434 (1984) (“The Copyright Act does not expressly render anyone liable for infringement committed by another.”);Perfect 10, Inc. v. Visa Int’l Serv. Ass’n, 494 F.3d 788, 794-95 (9th Cir. 2007) (“Contributory copyright infringement is a form of secondary liability with roots in the tort-law concepts of enterprise liability and imputed intent.”);Demetriades v. Kaufmann, 690 F. Supp. 289, 291-92 (S.D.N.Y. 1988) (“Federal copyright law, unlike patent law, does not expressly create any form of derivative, third-party liability.”).

      Erroneous allegations in the Affidavit include references to theDigital Millennium Copyright Act of 1998, 17 U.S.C. § 512 or DMCA.  Among other provisions, the DMCA establishes a “safe harbor” from civil liability for online service providers (“OSP”), namely, a statutory defense against civil infringement claims.  See Viacom Int'l, Inc. v. Youtube, Inc., 676 F.3d 19, 2012 BL 84337, 102 U.S.P.Q.2d 1283 (2d Cir. 2012).

      Alleged failures to comply with the conditions of a DMCA civil defense does not create a criminal cause of action.  There is no Act of Congress establishing a crime for violations of the DMCA safe harbors.  The DMCA is a defense in the civil context of contributory and vicarious liability for copyright infringement committed by third parties and of liability for intentionally inducing third parties to commit copyright infringement. 

      The Government knowing that Judge made civil law for internet secondary copyright infringement could not be applied in the criminal statutory context is attempting to use the vague and novel theory of criminal “conspiracy” to try to argue it through a back door and such arguments fail as a matter of law.  There is a scarcity of judicial opinions in contested criminal copyright cases that discuss how a criminal conspiracy theory could apply to mere internet hyperlinks or torrent files/trackers. The government by throwing against the wall the criminal conspiracy theory without any statutory support from Congress is trying to argue Judge made civil common law by analogy. Common-law civil liability principles cannot be extended to impose criminal liability.  Crimes must be specifically defined by Congress.  Federal crimes “are solely creatures of statute.” Liparota v. United States, 471 U.S. 419, 424 (1985); accord United States v. Lanier, 520 U.S. 259, 267 n.6 (1997) (“Federal crimes are defined by Congress, not the courts . . .”).  In copyright law in particular, “the deliberation with which Congress . . . has addressed the problem of copyright infringement for profit, as well as the precision with which it has chosen to apply criminal penalties in this area, demonstrates anew the wisdom of leaving it to the legislature to define crime and prescribe penalties.” Dowling v. United States, 473 U.S. 207, 228 (1985). 

      As Justice Blackmun observed inDowling, copyright is an area in which Congress has chosen to tread cautiously, relying "chiefly . . . on an array of civil remedies to provide copyright holders protection against infringement," while mandating "studiously graded penalties" in those instances where Congress has concluded that the deterrent effect of criminal sanctions are required.Dowling, supra at 221, 225.  "This step-by-step, carefully considered approach is consistent with Congress' traditional sensitivity to the special concerns implicated by the copyright laws."Id. at 225.

      TheDowling court also stated: “It is the legislature, not the Court, which is to define a crime”) (quotingUnited States v. Wilberger, 5 Wheat. 76 (1820)).  “Accordingly, when assessing the reach of a federal criminal statute, [courts] must pay close heed to language, legislative history, and purpose in order strictly to determine the scope of the conduct the enactment forbids.”  Dowling v. United States, 473 U.S. 207, 213, 228-29 (1985).  In determining whether Congress intended to criminally proscribe a particular act, a “narrow interpretation” is appropriate. Id.

      The absence of a crime of secondary copyright infringement is further evidenced by Congress’ repeated - and so far unsuccessful - attempts to pass legislation aimed at conduct the Government is prosecuting here. See S. 968 - 112th Congress: Protecting Real Online Threats to Economic Creativity and Theft of Intellectual Property Act (2011) (aimed at websites that link to infringing materials); S. 3804 - 111thCongress: Combating Online Infringement and Counterfeits Act (2010) (proposing to authorize the Justice Department to file an in rem civil action against a domain name used to access an Internet site or sites “dedicated to infringing activities.”). 

      In a large-scale perspective, fundamental principles of due process preclude the Government from criminally charging defendants for acts that previously only constituted, at most, civil liability under principles of secondary or indirect copyright infringement arising from Judge made law. United States v. Lanier, 520 U.S. 259, 266 (1997) (“[D]ue process bars courts from applying a novel construction of a criminal statute to conduct that neither the statute nor any prior judicial decision has fairly disclosed to be within its scope.”) In doubtful cases of criminal charges, the Supreme Court applies “the rule of lenity,” which requires a court to interpret ambiguous statutory schemes in favor of defendants. See,Skilling v. United States, 561 U.S. 358, 410 (2010) (“ambiguity concerning the ambit of criminal statutes should be resolved in favor of lenity”). The government should not be given free reign to make up new theories of secondary criminal copyright liability in the internet or hyperlink/torrent file realm by calling it “conspiracy” or any other term – especially when one would have to guess where civil secondary copyright infringement ends and criminal copyright conspiracy begins and Congress has been asked to act and declined.

      4.      There is No Specific Evidence that Defendant Conspired with Others to Willfully Infringe Copyright in the United States.

      Even if one assumesarguendo that a criminal copyright conspiracy can be alleged it fails as a matter of law. Count One of the Criminal Complaint alleges conspiracy to commit copyright infringement. A conspiracy charge contains three elements: (1) "an agreement between two or more persons to act together in committing an offense," (2) "an overt act in furtherance of the conspiracy," and (3) "[t]here must be some showing that the defendant knew the conspiracy's purpose and took some action indicating his participation." United States v. Chorman, 910 F.2d 102, 109 (4th Cir. 1990).  See, United States v. Kingrea, 573 F.3d 186, 193 (4th Cir. 2009) (dismissing indictment that "failed to state an offense against the United States as the object of the conspiracy."). 

      The Government must show a union of criminally willful conduct on the part of an actual infringer and criminally willful conduct on the part of a conspirator or “double willfulness”.  Evidence that KAT acted willfully to directly infringe is insufficient if it does not unite with underlying and offsite direct infringements that are also willful.  See 17 U.S.C. § 506(a);United States v. Mekjian, 505 F.2d 1320, 1324 (5th Cir. 1975) (dismissing indictment that failed to allege willfulness);Med. Supply Chain, Inc. v. Neoforma, Inc., 419 F. Supp. 2d 1316, 1328 (D. Kan. 2006) (civil complaint).  “Even if civil liability has been established, without the requisite mens rea it does not matter how many unauthorized copies or phonorecords have been made or distributed:  No criminal violation has occurred.”  The required agreement between conspirators need not take a particular form, however, there must be some genuine meeting of the minds as to commission of a crime:  merely engaging in a business transaction is not sufficient to charge the crime of conspiracy.  As one court explained, ordinary retail businesses are not engaged in a conspiracy with their customers merely because they engage in repeat or standardized transactions.  See,United States v. Colon, 549 F.3d 565, 567-68 (7th Cir. 2008) (finding no conspiracy because “[i]f you buy from Wal-Mart your transactions will be highly regular and utterly standardized, but there will be no mutual trust suggestive of a relationship other than that of buyer and seller.”). 

      Any infringements that could possibly occur would have to occur after a user left the KAT site behind. There is no allegation of direct communication between Defendant and any direct infringer, and no probable cause for accusations that Defendant or KAT entered into a relationship with any user that involved anything other than “highly regular and utterly standardized” automated processes of the torrent file search engine and the tracker servers. There is a lack of evidence of actionable agreements, willful primary infringements, and overt acts. This is not surprising given how attenuated the KAT site was from any offsite infringements.There can be no criminal conspiracy to violate the judge made civil law in Grokster and its progeny. The alleged prior judgments are irrelevant. The conspiracy statute under 18 U.S.C. 371 makes clear that the object of the conspiracy must be an offense or fraud against the United States. Therefore, there can be no criminal conspiracy to commit a mere civil copyright infringement as a matter of law.

      The government is alleging a novel theory that if allowed to succeed gives too much discretion to prosecutors using vague allegations to engulf large parts of the internet, such as the Google search engine and BitTorrent network. Such a novel criminal law theory, placed under the lens of Dowling, ought to be subject to debate by Congress and implemented, if at all, through legislation where competing benefits and burdens on the growth of the internet can be properly debated and analyzed.

      5.      Copyright Infringements Are Actionable Only If They Occur in the United States.

      It is an “‘undisputed axiom that United States copyright law has no extraterritorial application[.]’”Subafilms, Ltd. v. MGM-Pathe Commc’ns Co., 24 F.3d 1088, 1093 (9th Cir. 1994) (en banc), cert. denied, 513 U.S. 1001 (1994) (quoting 3 David Nimmer & Melville B.,Nimmer on Copyrights § 12.04[A][3][b], at 12-86 (1991)); see Nintendo of Am., Inc. v. Aeropower Co. Ltd., 34 F.3d 246, 249 n.5 (4th Cir. 1994) (noting that the Copyright Act is “generally considered to have no extraterritorial application”);In re Outsidewall Tire Litig., 2010 WL 2929626, at *8 (E.D. Va. July 21, 2010) (citing with approval the Ninth Circuit’s extraterritoriality analysis inSubafilms). 50. “For the Copyright Act to apply, ‘at least one alleged infringement must be completed entirely within the United States.’”Elmo Shropshire v. Canning, No. 10-CV-01941-LHK, 2011 WL 90136, at *3 (N.D. Cal. Jan. 11, 2011) (quoting Los Angeles News Serv. v. Reuters Television Int’l, Ltd., 149 F.3d 987, 990-91 (9th Cir. 1998)); accordRundquist v. Vapiano SE, 798 F. Supp. 2d 102, 126 (D.D.C. 2011).

      Inadequacy of the Affidavit is again demonstrated.  Servers for “Subject Domain 4” referenced in Paragraph 19, supra, are located in Canada.  (Affidavit, paragraph 40.)  The only activities that are alleged in that paragraph to have occurred in the United States are activities of HSI agents.The government has the burden of proof on this US territoriality issue and there is a wholesale lack of evidence in the CC.

      6.      The Money Laundering Claims Lack Merit

      Count Two of the Criminal Complaint alleges money laundering.  Allegations are dependent on charges of criminal copyright infringement as there are no illegal proceeds without an underlying crime.  Given that the complaint fails to properly allege any type of criminal copyright claim, the money laundering claims fails as a matter of law.   There is no showing that earnings of Defendant were the result of or causally related to actionable criminal copyright infringements occurring in the United States.


      Kim Dotcom Argues Against Fugitive Disentitlement in the Fourth Circuit Court of Appeals

      Ira Rothken, Kim Dotcom’s Lead Global Counsel, informs TorrentFreak that the District Court’s decision denied defendants’ basic rights and violated due process.
      “We asked the Fourth Circuit to rule in favor of fairness, natural justice, and due process by stopping US efforts to take Kim Dotcom’s global assets for doing nothing more than lawfully opposing extradition to the United States—a country he has never been to,” Rothken says.
      Rothken believes that the U.S. Department of Justice (DOJ) wrongfully labeled the Megaupload defendants as fugitives and hopes the appeals court will undo the verdict.
      “The DOJ in our view is trying to abuse the Fugitive Disentitlement Doctrine by modifying it into an offensive weapon of asset forfeiture to punish those who fight extradition under lawful treaties, and a provocation for international discord.”
      “Today we asked the Court of Appeals for justice,” Rothken adds...

      Professor Lessig from Harvard Law School Provides Expert Opinion in the Kim Dotcom Extradition Case

      In submissions filed by the Kim Dotcom legal team in District Court in New Zealand, Professor Lawrence Lessig, from Harvard Law School, provided his expert legal opinion on the United States Department of Justice's (DOJ) criminal allegations in the extradition record against Kim Dotcom and the others. Below are quoted excerpts from Professor Lessig's opinion.


      I, LAWRENCE LESSIG of Cambridge, Massachusetts, United States of America, swear as follows:

      1. I am a professor of law at Harvard Law School, Harvard University and a practicing lawyer. One of my chief areas of specialty has been intellectual property law in the context of the Internet.

      2. I have been retained by the respondents’ (alternatively referred to as “defendants”) United States attorneys, Quinn Emanuel Urquhart & Sullivan LLP and Rothken Law Firm as liaison counsel to Anderson Creagh Lai Limited, to evaluate the Superseding Indictment and Record of the Case, to presume the truth of factual allegations therein, and to give my opinion as to whether a prima facie case has been made out that that would be recognized by United States federal law and subject to the Treaty on Extradition Between the United States of America and New Zealand, Art. VI, § 3, 1970 U.S.T. LEXIS 470; 22 U.S.T. 1s (US – NZ Extradition Treaty).

      3. I have also been asked to give my opinion as to whether the Superseding Indictment and Record of the Case are reliable, viewed in light of obligations of the United States to act as a model litigant in its extradition request for alleged criminal misconduct.


      4. It is my opinion that the Superseding Indictment and Record of the Case filed by the United States Department of Justice (DOJ) do not meet the requirements necessary to support a prima facie case that would be recognized by United States federal law and subject to the US – NZ Extradition Treaty. On the whole, the filings are not reliable.

      5. Charges in the Superseding Indictment fall into three classes:

      (a) Counts Four through Eight allege that respondents themselves committed crimes of copyright infringement. General allegations in such Counts do not find support in specific facts set forth in the Record of the Case. A showing of willful criminal copyright infringement requires compact factual proof identifying a specific copyrighted work, a right of the owner that has been violated, the geographical location of the infringement and other specific facts needed to establish a violation of United States criminal law. Such compact facts are absent here. The generalized accusations, defective and irrelevant allegations, scattered facts of alleged multiple infringements and statistics set forth in the Superseding Indictment and Record of the Case do not satisfy requirements of proof but rather manifest unreliability of the overall approach. Charges in Counts Four, Seven and Eight are outside the three-year statute of limitations provided by the US-NZ Extradition Treaty that I understand is applicable in this proceeding as well as lacking proof of other necessary elements.

      (b) Counts One through Three allege conspiracy. Count Two (Conspiracy to Commit Copyright Infringement) is the chief matter discussed herein. In brief, it is alleged that respondents agreed with users of the Megaupload system that users would commit copyright infringement by means of Megaupload. Again, general allegations do not find support in actual facts. There is no showing of specific criminal “willful” infringements committed by specific individual users. There is an even more serious lack of evidence of communications between respondents and such alleged users needed to prove an agreement that is subject to laws of conspiracy. The United States Constitution (U.S. Const.) prohibits the United States DOJ from prosecuting, as they apparently want to here, a new kind of criminal conspiracy based on defendants providing an “environment of infringement” or their failing to disable all links to an allegedly infringing copy. Under the approach of the DOJ, many online operations and even individual persons would, without notice, suddenly become subject to criminal prosecution. Count One (Conspiracy to Commit Racketeering) and Count Three (Conspiracy to Commit Money Laundering) require showings of independent predicate offenses, which are lacking here.

      (c) Counts Nine through Thirteen allege Fraud by Wire and Aiding & Abetting Fraud by Wire. Charges involve an online “Abuse Tool” provided to copyright owners by Megaupload so that owners could report to Megaupload the appearance of unauthorized links to their works and automatically disable access to such links. It is alleged that owners were misled by Megaupload’s messages provided with the tool and that links, outside those included in such copyright takedown requests, were not removed although copyright owners believed that they should have been. The facts set forth in the Record of the Case fail to show a Wire Fraud offense or any offense. A novel interpretation of the Digital Millennium Copyright Act (DMCA) needed to support such charges would be contrary to the nature of Internet operations and to the DMCA itself. Essential elements of causation and damages are not supported by proof.


      114. The DOJ has failed to prove a case of direct civil copyright infringement. The Megaupload cloud storage system was the type of passive Internet hosting contemplated by the Loopnet court. There is an absence of compact facts that show liability of respondents for copyright infringement in the United States of a specific copyrighted work. Just as important, the Fourth Circuit Court of Appeals in Loopnet concluded that, “[a]t bottom, we hold that ISPs, when passively storing materials available to other users upon their request, do not ‘copy’ the material in direct violation of section 106 of the Copyright Act.” Loopnet, supra, at 555.

      115. The DOJ has failed to prove a case of criminal copyright infringement. Criminal infringement prohibitions under 17 U.S.C. § 506(a) apply to specific kinds of misconduct or to protect specific kinds of copyrighted works. Necessary specificity as to extraditable offenses is not clearly stated in the ROC. To prove a criminal case, in addition to showing copyright infringement of specific works in the United States, the DOJ must show a very high level of knowledge and intent, namely, a “willfulness” mental state. “Evidence of reproducing and distributing copyrighted works does not, by itself, establish willfulness.” See 17 U.S.C. § 506(a)(2). Under a willfulness standard, proof of indifference, recklessness, or negligence is insufficient to constitute criminal copyright infringement. Attacking an ISP for generally bad or negligent policies or alleging how the ISP could be better, faster, or more precise in its takedowns, user terminations, or repeat infringer policies is not enough. “Willfully” as used in 17 U.S.C. § 506(a) connotes a “voluntary, intentional violation of a known legal duty.” (See para. 61 and United States v. Liu, 731 F.3d 982, 990 (9th Cir. 2013).) Allegations revolve around, “fostering an environment conducive to infringement,” similar to a civil case of secondary copyright infringement. Principles of United States criminal law prohibit novel and expansive prosecutions on the basis of such evidence.

      116. The DOJ has failed to prove a case of criminal conspiracy. In addition to proof of criminal copyright infringement in the United States of specific copyrighted works, the DOJ must show an agreement with respect thereto between the actual infringer and an alleged conspirator. No such agreement is shown here. General allegations of, “fostering an environment” cannot substitute for the requisite agreement or for the necessary “willful” mental state of the alleged conspirator.

      117. The DOJ has failed to prove a case of wire fraud. In my opinion, the DOJ is improperly attempting to use an inappropriate “wire fraud” theory to criminalize new categories of conduct without the required Congressional authorization. Criminal charges based on alleged DMCA shortcomings would be contrary to DMCA principles stated by Congress. Wire fraud allegations further suffer from lack of requisite damages suffered by the victim of the fraud.

      118. The remaining alleged counts of RICO and Money Laundering require a predicate offense that is lacking here.

      119. It is my opinion that the Superseding Indictment and Record of the Case filed by the DOJ do not meet the requirements necessary to support a prima facie case that would be recognized by United States federal law and subject to the US-NZ Extradition Treaty. An attempt has been made to extract facts from multiple sources and over a wide span of time, to organize a large number of otherwise disconnected facts by using systematic phraseology and to juxtapose phrases in order to create an impression of coherence and substance. However, the attempt fails to reach its goals and any impression of coherence or substance dissolves under examination. Insofar as they are alleged in the Superceding Indictment and the ROC, respondents’ actions were not prohibited by criminal statutes of the United States. Filings of the DOJ attempt to create a false impression of criminal guilt and are not reliable.