A M P v Persons Unknown

JurisdictionEngland & Wales
JudgeTHE HON. MR. JUSTICE RAMSEY,Mr Justice Ramsey
Judgment Date20 December 2011
Neutral Citation[2011] EWHC 3454 (TCC)
Docket NumberCase No: 11-497
CourtQueen's Bench Division (Technology and Construction Court)
Date20 December 2011

[2011] EWHC 3454 (TCC)

IN THE HIGH COURT OF JUSTICE

QUEEN'S BENCH DIVISION

TECHNOLOGY AND CONSTRUCTION COURT

Royal Courts of Justice

Strand, London, WC2A 2LL

Before:

The Hon. Mr. Justice Ramsey

Case No: 11-497

Between:
A M P
Claimant
and
Persons Unknown
Defendant

Matthew Richardson and James Williams (instructed by Griffin Law) for the Claimant

Approved Judgment

I direct that pursuant to CPR PD 39A para 6.1 no official shorthand note shall be taken of this Judgment and that copies of this version as handed down may be treated as authentic.

Hearing dates: 8 &19 December 2011

THE HON. MR. JUSTICE RAMSEY Mr Justice Ramsey

Introduction

1

This is an application for an interim injunction to prevent transmission, storage and indexing of any part or parts of certain photographic images which are claimed to belong to the Claimant.

2

On 30 November 2011 I heard an application under CPR 39.2(4) for the Claimant to be given anonymity in these proceedings. I heard that application in private under CPR 39.2(3) on the basis that publicity would defeat the object of the hearing ( CPR 39.2(3)(a)) because the purpose of that hearing was to determine whether the Claimant should be given anonymity. The hearing also involved confidential information and I considered that publicity would damage that confidentiality ( CPR 39.2(3)(c)). The information provided the name and other personal information in respect of the Claimant which were sought to be kept confidential by the anonymity order. I also considered that the hearing should be held in private in the interests of Justice in dealing with the application for anonymity ( CPR 39.2(3)(g)).

3

In determining whether or not to make an anonymity order under CPR 39.2(4) I had to consider whether non-disclosure of the identity of the Claimant was necessary in order to protect the interests of that Claimant. In considering whether to grant an interim injunction in relation to the photographic images I have also had to consider some of the matters which I dealt with when granting the anonymity order. It is therefore convenient now to set out both my decision on whether to grant an interim injunction and also to deal with the anonymity order which I previously made.

Background

4

Evidence which sets out the background has been submitted on behalf of the

Claimant. Whilst at University in June 2008 her mobile phone was stolen or lost. It did not have a user password lock activated. The police were notified and the phone was reported as stolen.

5

The phone contained digital images of the Claimant which had been taken in or about August 2007 using the digital camera on that phone. These digital images included images of an explicit sexual nature which were taken for the personal use of her boyfriend at the time. The Claimant is alone in the photos and her face is clearly visible. The phone also contained other digital images of her family and friends.

6

Shortly after the loss or theft of her phone, the digital images were uploaded to a free online media hosting service that is used to upload and share images. The Claimant was informed by strangers on Facebook that the images had been uploaded and that her name and Facebook profile had been attached to them. She accordingly contacted the online media hosting service and the images were removed promptly in about August 2008. In about July 2008 the Claimant was contacted on Facebook by someone who stated their name was Nils Henrik-Derimot. That person threatened to expose her identity and to post the images widely online and tell her friends about the images if she did not add him as a friend on Facebook. She deleted these Facebook messages and blocked the sender.

7

At about the same time her father's business public relations team were contacted and allegedly threatened and blackmailed about some images but it was not specified that the images were of her.

8

On 2 November 2008 the images were uploaded to a Swedish website that hosts files known as "BitTorrent" files. The images have since been downloaded an unknown number of times by persons unknown. The images have been uploaded so that her name is appended to each of the images and can therefore readily be searched for when using online search engines. This has led to the link to the BitTorrent files being at the top of the list of search engine searches for her name. Her Solicitors have been able to have many of these links removed from those search engines using the Digital Millennium Copyright Act in the United States. By these proceedings the Claimant wishes to prevent the spread and indexing of the image files by preventing their storage and transmission within this jurisdiction.

BitTorrent technology

9

These proceedings have been brought in the Technology and Construction Court because the use of BitTorrent technology raises complex technical issues. The Claimant relies on witness statements dated 7 and 18 December 2011 from Professor Andrew Murray, a Professor of Law at the London School of Economics who has a special research interest in information technology law and cyber regulation. He provides an explanation of the concept of BitTorrents and what remedy might be appropriate to avoid further transmission, storage and indexing of any part or parts of the digital photographic images which the Claimant seeks to protect by these proceedings.

10

BitTorrent is a peer to peer file sharing protocol used for distributing large amounts of data over the internet. The BitTorrent protocol is used to download files quickly by reducing the server and network impact of distributing large files. Rather than downloading a file from a single source server, as is the case with the conventional HyperText Transfer Protocol (HTTP), the BitTorrent protocol allows users to join a "swarm" of users to download and upload from each other simultaneously.

11

The person who wants to upload a file using the BitTorrent protocol creates a descriptor file known as a ".torrent" file which contains a description of the file. In this case that descriptor file contained the Claimant's name. This ".torrent" file is distributed by conventional means using webpages, emails or mobile phones. The file being distributed is divided into segments called pieces.

12

The person downloading files must first download BitTorrent client software.

That person can then download a file with a ".torrent" file descriptor. That ".torrent" file is then downloaded by acting as a "leecher" but when a piece of a file is downloaded that user then becomes, in turn, an uploader or "seeder" of that piece of the file. In this way the distribution of files depends not just on the original source of the file, as in conventional protocols, but using BitTorrent client software each user who downloads the file becomes, in turn, a seeder facilitating the distribution of a particular file by allowing pieces of that file to be uploaded by other users downloading the file.

13

Conventionally, to prevent users from being able to download files, it would be possible to identify the relevant source used to provide the download and seek to prevent downloads from that site.

14

However, to prevent the transmission, storage and indexing of the relevant ".torrent" files it is necessary to identify the users who have downloaded the files using the BitTorrent protocol. The relevant files can then be deleted by these users and, in addition, these users can be prevented from acting as seeders of parts of the file which will prevent them distributing the images which are the subject of the current claim.

15

Professor Murray says that each seeder can be identified by way of their Internet Protocol Address ("IP Address") while they are seeding. He says that it would therefore be possible to obtain the IP Address of every seeder in the swarm and identify from that address their physical location, name and address from their Internet Service Provider. He says that, as a result of that action, it would be possible to identify the IP address of each computer seeding a particular ".torrent" file and details of the person allowing the seeding to take place. They could therefore be served with an order requiring them to take steps to stop their account from being used.

16

Professor Murray considers that, given the characteristics of the Claimant, it is unlikely that many of the seeders will be outside the jurisdiction of this Court. He says that, in those circumstances, it is likely that if a large number of the seeders can be found the distribution of the ".torrent" file by the BitTorrent protocol would cease to occur because of the want of seeders.

17

He says it is also possible to prevent internet search engines from indexing particular sites or files which contain specific words; in this case the descriptor file containing the Claimant's name could be filtered out on that basis. He says that this would then prevent wide-scale access to the ".torrent" file and again because of a lack of seeders the distribution by the BitTorrent protocol would cease to occur.

18

Finally he says that although the ".torrent" descriptor files are likely to be hosted outside the jurisdiction it is a relatively trivial matter for an internet service provider to block access to a site outside the jurisdiction using currently available technology.

The defendants

19

The claim in this case has been brought against "Persons Unknown". The reason for that is that until seeders of the relevant digital photographic image files have been identified by way of their IP Addresses whilst they are seeding and their addresses have been obtained from their Internet Service Provider, they cannot be made a party to these proceedings. It is submitted on behalf of the Claimant that the number of potential Defendants and the need to move rapidly to prevent increasing numbers of seeders...

To continue reading

Request your trial
1 cases
4 books & journal articles
  • Table of cases
    • United Kingdom
    • Construction Law. Volume I - Third Edition
    • 13 April 2020
    ...Pte Ltd v Otto Marine Ltd [2013] SGHC 240 III.25.108 A Monk & Co Ltd v Devon CC (1978) 10 BLR 9 (CA) III.26.33 AMP v Persons Unknown [2011] EWHC 3454 (TCC) III.26.06 AMP Fire & General Insurance Co Ltd v Leighton Contractors Pty Ltd [1993] NSWCA 6 III.26.190 Ampcontrol SWG Pty Ltd v Gujarat......
  • Litigation
    • United Kingdom
    • Construction Law. Volume III - Third Edition
    • 13 April 2020
    ...Court contain details of its case load and the mix of cases considered: see www.judiciary.uk. 26 See, eg, AMP v Persons Unknown [2011] EWHC 3454 (TCC), especially at [9], per Ramsey J. 27 Until relatively recently, London cases in the High Court could be heard by either a High Court judge o......
  • Table of Cases
    • United Kingdom
    • Wildy Simmonds & Hill Cyber Crime - Law and Practice Contents
    • 29 August 2019
    ...Componisten en Uitgevers CVBA (Sabam) (C-431/09) EU:C:2011:648, [2011] ECR I-9363, [2012] ECDR 3, ECJ 90 AMP v Persons Unknown [2011] EWHC 3454 (TCC), [2011] Info TLR 25, (2012) 156(2) SJLB 31 194 Associated Provincial Picture Houses Ltd v Wednesbury Corporation [1948] 1 KB 223, [1947] 2 Al......
  • Cyber Harassment and Cyber Stalking
    • United Kingdom
    • Wildy Simmonds & Hill Cyber Crime - Law and Practice Contents
    • 29 August 2019
    ...Petros and others v Chaudhari and another [2004] EWCA Civ 458; S v CPS [2008] EWHC 438 (Admin)). Similarly, in AMP v Persons Unknown [2011] EWHC 3454 (TCC), it was held that the dissemination of digital photographs via a BitTorrent system could also amount to harassment. In that case, the c......

VLEX uses login cookies to provide you with a better browsing experience. If you click on 'Accept' or continue browsing this site we consider that you accept our cookie policy. ACCEPT