.st0{fill:#FFFFFF;}

Meta, Strike 3 & Movie Gen: 2,400 Torrents —AI Training or Personal Use? 

 November 7, 2025

By  Joe Habscheid

Summary: Meta has moved to dismiss a suit from Strike 3 Holdings that accuses Meta of illegally torrenting thousands of adult films to train an unannounced AI video model called Movie Gen. Strike 3 says about 2,400 of its films were downloaded from Meta corporate IPs and that a "stealth network" of 2,500 hidden IPs hid further downloads. Meta answers: the downloads look like intermittent, private, "personal use" over seven years, the scale is far too small for AI training, its terms forbid adult-content generation, and Strike 3 offers guesses rather than proof. The company asks the court to drop the copyright claims. This post breaks down the facts, the legal frames, the technical realities, the policy trade-offs, and what each side needs to prove next. Read with the question in mind: which explanation fits the evidence best—organized data harvesting or scattered personal use?


Case background: what Strike 3 says and what Meta denies

Strike 3 alleges roughly 2,400 of its adult titles were downloaded over Meta corporate IP addresses and that Meta ran a shadowy "stealth network" to hide additional downloads. The complaint ties those downloads to an alleged internal project called Movie Gen and seeks damages that could exceed $350 million. Meta’s motion to dismiss calls the suit guesswork and labels Strike 3 a "copyright troll," arguing the company provides zero evidence that Meta directed or even knew about the downloads.

Meta makes three practical counters: the downloads span back to 2018, before the company’s multimodal video research gained steam; the number and cadence of downloads look like intermittent, private consumption—what Meta calls "personal use"; and its own policies forbid training on adult content, making deliberate collection counterproductive. Meta also questions the "stealth network" theory outright: if you wanted secrecy, why use obvious corporate IPs for hundreds of downloads and then hide a few others?

Timeline and scale: why those details matter

Timeline and scale are not trivial. Training a modern generative video model requires massive, carefully curated datasets that are dense and structured. Meta points out the alleged activity runs from about 2018 onward, while the company’s generative video and multimodal pushes came later. If downloads happened years before relevant R&D, can they reasonably be tied to training efforts later? That question sits at the heart of Meta’s motion.

Scale is equally important. Meta's calculation—roughly 22 flagged downloads per year on corporate IPs—does not match the kind of deliberate, high-volume data collection you'd expect for model training. If Meta’s statistic holds under scrutiny, it weakens the proposition that these downloads formed any meaningful part of an AI training set. Does 22 downloads a year equal a "concerted effort to collect massive datasets?" Mirror that phrase: "concerted effort to collect the massive datasets"—does the evidence look like that? The answer affects whether the plaintiffs can get past a dismissal.

The "stealth network" claim: plausible or odd?

Strike 3’s allegation of a 2,500-address stealth network is dramatic. But drama is not proof. Meta asks a simple question: why conceal some traffic and not other traffic? If you wanted to hide large-scale collection, you would not also use clearly traceable, corporate IP addresses for hundreds of downloads. That inconsistency weakens the narrative that Meta orchestrated a hidden harvesting operation.

Keep asking that same question: "Why hide some downloads but not most?" That repeated question highlights an evidentiary gap. A single suspicious device or contractor can explain a handful of downloads. A coordinated stealth pipeline would look very different—consistent, voluminous, and synchronized with internal R&D timelines.

Technical reality: what AI training needs

Training large generative video models requires massive, labeled, and often filtered datasets. Successful video models typically ingest thousands to millions of hours of footage, with metadata and preprocessing. A few dozen titles per year—especially downloaded sporadically and one file at a time—do not meet the requirements for building a competitive model.

That does not mean a single illicit download is harmless, nor does it mean models can’t learn from small samples indirectly. But the leap from a few dozen ad-hoc torrents to a functioning Movie Gen is large. If you want to hold a company responsible for model training on specific copyrighted works, you need a plausible chain: files downloaded → files stored in retrievable datasets → files ingested into training pipelines → model outputs showing learned content. Mirror that chain: downloaded → stored → ingested → reproduced. Strike 3 needs evidence for each link.

Legal theories in play: what plaintiffs must plead

At core, Strike 3 must tie the downloads to Meta’s liability. The usual claims are direct copyright infringement, contributory infringement, or vicarious liability. For a corporate defendant like Meta, courts look for volitional acts or direct control. Did Meta direct the downloads? Did it have knowledge and materially contribute to infringement? Did it benefit financially or have the right and ability to control the conduct?

History offers patterns: courts require more than circumstantial tracing of IP addresses to impose corporate liability. To hold Meta liable for an employee’s online conduct, plaintiffs typically need facts showing the employer authorized or endorsed the conduct, or that the company used the infringed works in its products. No simple IP-address log alone usually suffices. Strike 3 must plead facts that make those legal links plausible, not speculative.

Evidence: what would survive a motion to dismiss?

If you were advising Strike 3, you'd push for concrete documentary ties. Internal emails or memos about acquiring adult content for training, transfer logs showing files moved to internal repositories used by research teams, or testimony from former employees that links the downloads to a project would all strengthen the complaint. Absent that, the complaint risks being described as "guesswork and innuendo," the language Meta used.

Ask: what single piece of evidence would change your view? Would a revelation that Movie Gen’s training manifests content traceable to specific Strike 3 titles do it? That is the test. If Strike 3 cannot point to such a bridge between download logs and training pipelines, the court may dismiss for failing to state a claim.

Network policing and privacy trade-offs

Meta rejects the idea that it should be forced to police every file downloaded on its global network. That position raises a real policy tension: demanding extensive monitoring protects copyright holders but creates surveillance burdens and privacy risks. Who bears that cost? Corporations, their users, third parties, or government regulators?

Meta says intensive monitoring would be complex and intrusive. Strike 3 says lack of monitoring enabled theft. Both sides have plausible fears. Mirror the concern: privacy versus protection. The court must balance those interests carefully. If the ruling tilts toward heavy corporate duty to police all downloads, expect businesses to rethink network access policies and guest controls, with consequences for workplace privacy and vendor relations.

Commercial and reputational stakes for Meta

This is not just about damages. Meta is defending its public commitment that its AI tools won’t produce explicit content. A ruling that a company trained on stolen adult films would create regulatory headaches across jurisdictions that limit sexual content in AI outputs. Meta wants to avoid legal precedents that hold platform operators strictly liable for the actions of employees or guests absent clear evidence of corporate direction.

From a persuasion standpoint, Meta leverages social proof—pointing to other dataset lawsuits and differentiating scale and intent. Meta also cites its terms that ban adult generation. That combination pushes readers toward a consistent narrative: Meta doesn’t want that content and took steps to prevent it. Strike 3 seeks justice for alleged theft. Both sides appeal to justice—but with different facts.

Where this likely goes next

Procedurally, Strike 3 has limited time to respond. To survive, its response should supply more than IP logs and assertions. It must plead facts tying the downloads to Meta’s systems used for training, or to a known corporate project, or showing that Meta had actual knowledge and failed to act. Without such facts the judge may grant dismissal under Rule 12(b)(6).

If the complaint survives, expect discovery battles. Strike 3 will seek internal logs, emails, and metadata. Meta will push back with privacy claims and corporate confidentiality. Discovery could reveal whether the downloads coincided with internal transfers or the appearance of similar material in internal test datasets. That is where the case will live or die.

Industry implications: precedent and incentives

A finding against Meta would raise the bar for corporate network governance and could force tech firms to adopt aggressive monitoring to avoid liability. That outcome would reshape workplace norms and vendor access. A dismissal, conversely, would make it harder for copyright holders to pursue suits based on isolated logs and would preserve current burdens on rights holders to produce stronger proof.

That raises the policy question: should rights holders or companies bear the burden of policing? If courts expect companies to track and filter every file, privacy and operational costs spike. If courts leave enforcement chiefly to rights holders, detection stays expensive and inefficient. Neither outcome is perfect. Which side do you think should carry the cost of detection and prevention?

Takeaway: reading the evidence with clear eyes

No single fact resolves this case yet. Mirror the core phrases: "personal use," "stealth network," "Movie Gen." Which narrative explains those facts in the simplest, most consistent way? Meta’s argument—that sporadic downloads across years look like private consumption and not organized training—fits the observed cadence and the timeline. Strike 3’s theory requires linking disconnected episodes into a purposeful, hidden pipeline. That link needs evidence.

No, the presence of downloads alone does not prove a corporate training operation. But yes, repeated and traceable transfers into research systems would change the calculus. Each side must now produce facts that persuade a judge that their story is the more likely story. That standard is neither low nor purely theoretical: it demands plausible, concrete connection.

Questions for readers

Which explanation seems more convincing to you: scattered "personal use" downloads or a covert data-collection effort? What evidence would make you change your mind? How far should companies go to monitor internal networks to protect outside rights holders—and what costs are you willing to accept to get that protection? Ask these questions and reply; your answers shape how policy and law will respond.

#MetaLawsuit #AItraining #CopyrightLaw #NetworkResponsibility #MovieGen #Strike3

More Info -- Click Here

Featured Image courtesy of Unsplash and Zulfugar Karimov (YMexLBcERng)

Joe Habscheid


Joe Habscheid is the founder of midmichiganai.com. A trilingual speaker fluent in Luxemburgese, German, and English, he grew up in Germany near Luxembourg. After obtaining a Master's in Physics in Germany, he moved to the U.S. and built a successful electronics manufacturing office. With an MBA and over 20 years of expertise transforming several small businesses into multi-seven-figure successes, Joe believes in using time wisely. His approach to consulting helps clients increase revenue and execute growth strategies. Joe's writings offer valuable insights into AI, marketing, politics, and general interests.

Interested in Learning More Stuff?

Join The Online Community Of Others And Contribute!