mcfilms
So they know the image is not hosted at the site, yet they send the letter anyway? Presumably they are aware that the site hosting the RSS feed is not responsible for this. Is this not fraud? Don't Lucia and Dieselfish have some recourse?
If they had inspected the html when taking the screen shot which they should do, they would have known. After I told them it was not hosted on my server, they should have known. If they understand Perfect 10 says including <img src="http:not_my_domain.com/the_image.jpg"> makes the image visible to a visitor but is not considerd "displaying a copy" under US copyright law and they agree that case would hold up in other circuits, then I consider what they are doing to be fraud. I don't know if a judge would agree.
If it were possible to take them to court over this, it's possible their defense would be to observe the 9th circuit is not the Supreme Court and state their belief that if they were to pursue this to the Supreme Court, the Supreme Court would rule otherwise. Who knows?
dieslefish
@mcfilms In my case they generated a screenshot of the page containing the image. The screenshot they sent in the initial letter shows the URL of the page - not the URL of the image.In my case, they provided scaled down screenshot of a portion of the page and the url of the homepage of my site. Their text did not provide a url of the actual page involved in the dispute. Had the screenshot not been shrunken down, I might have been able to read the uri in the screenshot, but shrinking the screenshot made it impossible to read the uri.
From server stats, I can see when they generated the screenshot (a ping from Toronto)Interesting. I'm getting lots of attempts to rapidly load all images at my blog from various places in Toronto. These include servers claiming to be from the Canadian government, and prisons in Canada. We may need to share IPs.
I'm not sure what to look for to see when the software went throughIn principle, the user agent might tell you. In practice, this can be spoofed and I have reason to believe it is. But I am seeing odd useragents. I'd say more but dreamhost is down so I can't check to give examples.
Also, even if you know the useragent, that doesn't necessarily tell you what image they used. I suppose they could look at a page in a browser and then have some other image analysis software might fetch the image from the browser cache. The server wouldn't detect the image analysis software footprint.