Advertisement
Guest User

Sony sucks

a guest
Jan 11th, 2011
378
0
Never
Not a member of Pastebin yet? Sign Up, it unlocks many cool features!
text 78.19 KB | None | 0 0
  1. 1
  2. 2
  3. 3
  4. 4
  5. 5
  6. 6
  7. 7
  8. 8
  9. 9
  10. 10
  11. 11
  12. 12
  13. 13
  14. 14
  15. 15
  16. 16
  17. 17
  18. 18
  19. 19
  20. 20
  21. 21
  22. 22
  23. 23
  24. 24
  25. 25
  26. 26
  27. 27
  28. 28
  29. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  30. Case No. ____________________________.
  31. KILPATRICK TOWNSEND & STOCKTON LLP
  32. JAMES G. GILLILAND, JR. (State Bar No. 107988)
  33. TIMOTHY R. CAHN (State Bar No. 162136)
  34. MEHRNAZ BOROUMAND SMITH (State Bar No. 197271)
  35. HOLLY GAUDREAU (State Bar No. 209114)
  36. RYAN BRICKER (State Bar No. 269100)
  37. Two Embarcadero Center, 8th Floor
  38. San Francisco, California 94111
  39. Telephone: (415) 576-0200
  40. Facsimile: (415) 576-0300
  41. Email: jgilliland@kilpatricktownsend.com
  42. tcahn@kilpatricktownsend.com
  43. mboroumand@kilpatricktownsend.com
  44. hgaudreau@kilpatricktownsend.com
  45. rbricker@kilpatricktownsend.com
  46. Attorneys for Plaintiff
  47. SONY COMPUTER ENTERTAINMENT AMERICA LLC
  48. UNITED STATES DISTRICT COURT
  49. FOR THE NORTHERN DISTRICT OF CALIFORNIA
  50. SAN FRANCISCO DIVISION
  51. SONY COMPUTER ENTERTAINMENT
  52. AMERICA LLC, a Delaware limited liability
  53. company,
  54. Plaintiff,
  55. v.
  56. GEORGE HOTZ; HECTOR MARTIN
  57. CANTERO; SVEN PETER; and DOES 1 through
  58. 100,
  59. Defendants.
  60. Case No._________________
  61. PLAINTIFF'S EX PARTE MOTION FOR
  62. TEMPORARY RESTRAINING ORDER,
  63. ORDER TO SHOW CAUSE RE:
  64. PRELIMINARY INJUNCTION, AND
  65. ORDER OF IMPOUNDMENT;
  66. MEMORANDUM OF POINTS AND
  67. AUTHORITIES IN SUPPORT
  68. Date: January 12, 2011
  69. Time: 9:00 a.m., or as soon as can be
  70. heard
  71. Courtroom: 3, 17th Floor
  72. Judge: Hon. Richard Seeborg
  73. 1
  74. 2
  75. 3
  76. 4
  77. 5
  78. 6
  79. 7
  80. 8
  81. 9
  82. 10
  83. 11
  84. 12
  85. 13
  86. 14
  87. 15
  88. 16
  89. 17
  90. 18
  91. 19
  92. 20
  93. 21
  94. 22
  95. 23
  96. 24
  97. 25
  98. 26
  99. 27
  100. 28
  101. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  102. Case No. _____________________
  103. i
  104. TABLE OF CONTENTS
  105. Page
  106. I. INTRODUCTION .............................................................................................................1
  107. II. BACKGROUND...............................................................................................................3
  108. A. SCEA’s PlayStation®3 Computer Entertainment System And Its
  109. Technological Protection Measures ......................................................................3
  110. B. SCEA’s Copyrights And Copyright Licenses.........................................................5
  111. C. Defendants’ Illegal Activities..................................................................................5
  112. 1. The FAIL0VERFLOW Defendants’ Unlawful Conduct and
  113. Circumvention Devices...............................................................................6
  114. 2. George Hotz’s Unlawful Conduct and Circumvention
  115. Devices.......................................................................................................7
  116. III. A TEMPORARY RESTRAINING ORDER IS NECESSARY TO
  117. PREVENT VIOLATIONS OF THE DMCA AND THE CFAA...........................................10
  118. A. SCEA Has Satisfied The Standards For Granting A Temporary
  119. Restraining Order And A Preliminary Injunction..................................................10
  120. B. The DMCA Authorizes Courts To Enjoin Persons From
  121. Trafficking In Circumvention Devices, And The CFAA
  122. Authorizes Courts To Enjoin Persons From Accessing
  123. Computers Without Authorization, Obtaining Proprietary
  124. Information And Trafficking In Such Information .................................................11
  125. C. SCEA Has Demonstrated An Indisputable Likelihood of Success
  126. On The Merits Of Its DMCA Claim ......................................................................12
  127. 1. Traffics In..................................................................................................14
  128. 2. A Technology or Part Thereof ..................................................................14
  129. 3. Primarily Designed ...................................................................................14
  130. 4. Circumvention Device...............................................................................15
  131. 5. Effective TPMs .........................................................................................15
  132. 6. Copyrighted Work.....................................................................................15
  133. D. SCEA Has Demonstrated An Indisputable Likelihood of Success
  134. On The Merits Of Its Claim Under The Computer Fraud and
  135. Abuse Act, 18 U.S.C. § 1030, et seq...................................................................16
  136. 1. 18 U.S.C. § 1030(a)(2)(C) – Confidential Information On
  137. Computer..................................................................................................16
  138. 2. 18 U.S.C. § 1030(a)(4) – Intent To Defraud And Obtain
  139. 1
  140. 2
  141. 3
  142. 4
  143. 5
  144. 6
  145. 7
  146. 8
  147. 9
  148. 10
  149. 11
  150. 12
  151. 13
  152. 14
  153. 15
  154. 16
  155. 17
  156. 18
  157. 19
  158. 20
  159. 21
  160. 22
  161. 23
  162. 24
  163. 25
  164. 26
  165. 27
  166. 28
  167. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  168. Case No. ______________________
  169. ii
  170. Value ........................................................................................................17
  171. 3. 18 U.S.C. § 1030(a)(5)(A) – Knowing Transmission of
  172. Code.........................................................................................................18
  173. 4. 18 U.S.C. § 1030(a)(5)(B) and (C) – Intentional and
  174. Reckless Damage And Loss ....................................................................18
  175. 5. 18 U.S.C. § 1030(a)(6)(A) – Trafficking in Password ...............................19
  176. 6. 18 U.S.C. § 1030(a)(7)(B) – Intent to Extort .............................................19
  177. E. Absent Injunctive Relief, SCEA Will Suffer Irreparable Injury And
  178. The Balance Of Hardships Strongly Favors SCEA .............................................19
  179. F. The Public Interest Strongly Favors Granting SCEA Injunctive
  180. Relief...................................................................................................................22
  181. G. SCEA Has Complied With The Procedural Requirements For
  182. Issuance Of A TRO And Order To Show Cause Re: Preliminary
  183. Injunction.............................................................................................................23
  184. IV. AN ORDER OF IMPOUNDMENT OF THE CIRCUMVENTION
  185. DEVICES IS WARRANTED...........................................................................................24
  186. V. CONCLUSION...............................................................................................................25
  187. 1
  188. 2
  189. 3
  190. 4
  191. 5
  192. 6
  193. 7
  194. 8
  195. 9
  196. 10
  197. 11
  198. 12
  199. 13
  200. 14
  201. 15
  202. 16
  203. 17
  204. 18
  205. 19
  206. 20
  207. 21
  208. 22
  209. 23
  210. 24
  211. 25
  212. 26
  213. 27
  214. 28
  215. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  216. Case No. _____________________
  217. iii
  218. TABLE OF AUTHORITIES
  219. Page(s)
  220. CASES
  221. 321 Studios v. Metro Goldwyn Major Studios, Inc.,
  222. 307 F. Supp. 2d 1085 (N.D. Cal. 2004) ........................................................ 12, 13, 16
  223. A&M Records, Inc. v. Napster, Inc.,
  224. 239 F. 3d 1004 (9th Cir. 2001) ................................................................................. 20
  225. America Online, Inc. v. LCGM, Inc.,
  226. 46 F. Supp. 2d 444 (E.D. Va. 1998) .........................................................................17
  227. Apple Inc. v. Psystar Corp.,
  228. 673 F. Supp. 2d 943 (N.D. Cal. 2009)......................................................................20
  229. Black & Decker (US), Inc. v. Smith,
  230. 568 F. Supp. 2d 929 (W.D. Tenn. 2008) .................................................................. 18
  231. Concrete Mach. Co. v. Classic Lawn Ornaments, Inc.,
  232. 843 F.2d 600 (1st Cir. 1988) .................................................................................... 22
  233. Connecticut Gen. Life Ins. Co. v. New Images of Beverly Hills,
  234. 321 F.3d 878 (9th Cir. 2003) .................................................................................... 23
  235. Coxcom, Inc. v. Chaffee,
  236. 536 F.3d 101 (1st Cir. 2008) .................................................................................... 13
  237. Craigslist, Inc. v. Naturemarket, Inc.,
  238. 694 F. Supp. 2d 1039 (N.D. Cal. 2010)....................................................................17
  239. Dollcraft Industries, Ltd. v. Well-Made Toy Mfg. Co.,
  240. 479 F. Supp. 1105 (E.D.N.Y 1978) .......................................................................... 25
  241. Duchess Music Corp. v. Stern,
  242. 458 F. 2d 1305 (9th Cir. 1972), cert. denied, 409 U.S. 847 (1972) .......................... 25
  243. eBay v. Digital Point Solutions,
  244. 608 F. Supp. 2d 1156 (N.D. Cal. 2009) .............................................................. 17, 18
  245. Jacobsen v. Katzer,
  246. 609 F. Supp. 2d. 925 (N.D. Cal. 2009).....................................................................20
  247. Macrovision v. Sima Products Corp.,
  248. 2006 U.S. Dist. LEXIS 22106, 2006 WL 1063284 (S.D.N.Y. 2006).................... 14, 20
  249. 1
  250. 2
  251. 3
  252. 4
  253. 5
  254. 6
  255. 7
  256. 8
  257. 9
  258. 10
  259. 11
  260. 12
  261. 13
  262. 14
  263. 15
  264. 16
  265. 17
  266. 18
  267. 19
  268. 20
  269. 21
  270. 22
  271. 23
  272. 24
  273. 25
  274. 26
  275. 27
  276. 28
  277. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  278. Case No. ______________________
  279. iv
  280. MDY Industries v. Blizzard Entertainment, Inc.,
  281. 2010 WL 5141269, 2010 U.S. App. LEXIS 25424, 2010 WL 5141269, No. 09-
  282. 15932 Slip. Op. (9th Cir., Dec. 14, 2010) ................................................................. 14
  283. MGM Studios, Inc. v. Grokster,
  284. Ltd., 518 F. Supp. 2d 1197 (C.D. Cal. 2007) ............................................................ 20
  285. Mitchell Int’l, Inc. v. Fraticelli,
  286. 2007 U.S. Dist. LEXIS 86787, 2007 WL 4197583 (D. P.R. 2007) ............................ 25
  287. Mortensen v. Bresnan Commun.,
  288. 2010 U.S. Dist. LEXIS 13419, 2010 WL 5140454 (D. Mont. 2010) .......................... 17
  289. Nintendo of America, Inc. v. Bung Enterprises, Ltd.,
  290. 1999 U.S. Dist. LEXIS 23588 at *36, 1999 WL 34975007, *13 .......................... 20, 21
  291. Nintendo of America Inc. v. Chan,
  292. 2009 U.S. Dist. LEXIS 66624, 2009 WL 2190186 (C.D. Cal. 2009) ......................... 13
  293. Nintendo of America, Inc. v. Elcon Indus., Inc.,
  294. 564 F. Supp. 937 (E.D. Mich. 1982)......................................................................... 24
  295. Realnetworks, Inc. v. DVD Copy Control Ass’n.,
  296. 641 F. Supp. 2d 913 (N.D. Cal. 2009).......................................................... 11, 13, 16
  297. Realnetworks, Inc. v. DVD Copy Control Ass’n, Inc.,555
  298. U.S. 7, 641 F. Supp. 2d 913 (N.D. Cal. 2009) .......................................................... 20
  299. Rebis v. Universal CAD Consultants, Inc.,
  300. 1998 U.S. Dist. LEXIS 12366, 1998 WL 470475 (N.D. Cal. 1998) ........................... 24
  301. Rent-A-Center, Inc. v. Canyon Television & Appliance Rental, Inc.,
  302. 944 F.2d 597 (9th Cir. 2001) .................................................................................... 20
  303. Sega Enters. v. MAPHIA,
  304. 857 F. Supp. 679 (N.D. Cal. 1994)...........................................................................24
  305. Shugard Storage Centers, Inc. v. Safeguard Self Storage, Inc.,
  306. 119 F. Supp. 2d 1121 (W.D. Wa. 2000) ...................................................................17
  307. Sierra On-Line, Inc. v. Phoenix Software, Inc.,
  308. 739 F.2d 1415 (9th Cir. 1984) .................................................................................. 10
  309. Sony Computer Entertainment America v. Divineo, Inc.,
  310. 457 F. Supp. 2d 957 (N.D. Cal 2006)............................................................. 2, 13, 16
  311. Sony Computer Entertainment America v. Zoomba et al.,
  312. 2010 U.S. Dist. Lexis 113228, 2010 WL 4512835 (N.D. Cal. October 13, 2010) ....... 2
  313. 1
  314. 2
  315. 3
  316. 4
  317. 5
  318. 6
  319. 7
  320. 8
  321. 9
  322. 10
  323. 11
  324. 12
  325. 13
  326. 14
  327. 15
  328. 16
  329. 17
  330. 18
  331. 19
  332. 20
  333. 21
  334. 22
  335. 23
  336. 24
  337. 25
  338. 26
  339. 27
  340. 28
  341. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  342. Case No. ______________________
  343. v
  344. State of Alaska v. Native Village of Venetie,
  345. 856 F.2d 1384 (9th Cir. 1988) .................................................................................. 10
  346. SuccessFactors, Inc. v. Softscape, Inc.,
  347. 544 F. Supp. 2d 975 (N.D. Cal. 2008)......................................................................11
  348. Sun Microsystems, Inc. v. Microsoft Corp.,
  349. 21 F. Supp. 2d 1109 (N.D. Cal. 1998)......................................................................11
  350. Textile Unlimited, Inc. v. A. BMH & Co.,
  351. 240 F.3d 781 (9th Cir. 2001) .................................................................................... 10
  352. Ticketmaster L.L.C. v. RMG Techs., Inc.,
  353. 507 F. Supp. 2d 1096 (C.D. Cal. 2007)....................................................................23
  354. Universal City Studios, Inc. v. Reimerdes,
  355. 82 F. Supp. 2d 211 (S.D.N.Y. 2000) .................................................................. 14, 19
  356. Universal City Studios v. Reimerdes,
  357. 111 F. Supp. 2d 294 (S.D.N.Y. 2000) ......................................................................16
  358. Winter v. Natural Res. Def. Council, Inc.,
  359. 555 U.S. 7, 129 S.Ct. 365 (2008) ....................................................................... 10, 20
  360. WPOW, Inc. v. MRLJ Enters.,
  361. 584 F. Supp. 132 (D.D.C. 1984)............................................................................... 24
  362. Yamate USA Corp. v. Sugerman,
  363. 1991 U.S. Dist. LEXIS 20701, 1991 WL 274854 (D.N.J. 1991)................................ 24
  364. Yash Raj Films (USA), Inc. v. Sidhu,
  365. 2010 U.S. Dist. LEXIS 25988, 2010 WL 1032792 (E.D. Cal. 2010) ......................... 11
  366. YourNetDating, LLC v. Mitchell,
  367. 88 F. Supp. 2d 870 (N.D. Ill. 2000)..................................................................... 11, 23
  368. STATUTES
  369. 17 U.S.C. §1201(a)(1) ................................................................................................... 13
  370. 17 U.S.C. § 1201(a)(1)(A).............................................................................................. 12
  371. 17 U.S.C. §§ 1201(a)(2) and 1201(b)(1)........................................................................ 12
  372. 17 U.S.C. § 1201 et seq. ........................................................................................... 2, 12
  373. 17 U.S.C. § 1203(b)(1) .................................................................................................. 11
  374. 18 U.S.C. §1030 (a)....................................................................................................... 16
  375. 18 U.S.C. § 1030(a)(2)(C) ............................................................................................. 16
  376. 1
  377. 2
  378. 3
  379. 4
  380. 5
  381. 6
  382. 7
  383. 8
  384. 9
  385. 10
  386. 11
  387. 12
  388. 13
  389. 14
  390. 15
  391. 16
  392. 17
  393. 18
  394. 19
  395. 20
  396. 21
  397. 22
  398. 23
  399. 24
  400. 25
  401. 26
  402. 27
  403. 28
  404. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  405. Case No. ______________________
  406. vi
  407. 18 U.S.C. § 1030(a)(4) ............................................................................................ 17, 18
  408. 18 U.S.C. § 1030(a)(5)(A).............................................................................................. 18
  409. 18 U.S.C. § 1030(a)(5)(B) and (C)................................................................................. 18
  410. 18 U.S.C. § 1030(a)(6)(A).............................................................................................. 19
  411. 18 U.S.C. § 1030(a)(7)(B).............................................................................................. 19
  412. 18 U.S.C. § 1030 et seq. ........................................................................................... 2, 16
  413. 18 U.S.C. § 1030 (g)...................................................................................................... 11
  414. Federal Rule of Civil Procedure 65............................................................................ 1, 23
  415. Local Rule 7-10 ...............................................................................................................1
  416. Local Rule 65-1 ......................................................................................................... 1, 23
  417. 1
  418. 2
  419. 3
  420. 4
  421. 5
  422. 6
  423. 7
  424. 8
  425. 9
  426. 10
  427. 11
  428. 12
  429. 13
  430. 14
  431. 15
  432. 16
  433. 17
  434. 18
  435. 19
  436. 20
  437. 21
  438. 22
  439. 23
  440. 24
  441. 25
  442. 26
  443. 27
  444. 28
  445. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  446. CASE NO. ______________________
  447. 1
  448. I. INTRODUCTION
  449. Defendants George Hotz, “Bushing,” Hector Cantero, Sven Peter and “Segher”
  450. (collectively, “Defendants”) are computer hackers.1 Working individually and in concert with
  451. one another, Defendants recently bypassed effective technological protection measures
  452. (“TPMs”) employed by plaintiff Sony Computer Entertainment America LLP (“SCEA”) in its
  453. proprietary PlayStation®3 computer entertainment system (“PS3 System”). Through the
  454. Internet, Defendants are distributing software, tools and instructions (collectively,
  455. “Circumvention Devices”) that circumvent the TPMs in the PS3 System and facilitate the
  456. counterfeiting of video games. Already, pirated video games are being packaged and
  457. distributed with these circumvention devices. Declaration of Ryan T. Bricker In Support of Ex
  458. Parte Motion for Temporary Restraining Order And Order To Show Cause Re Preliminary
  459. Injunction; Order for Impoundment (“Bricker Decl.”) ¶2, Exh. A. Pursuant to Federal Rule of
  460. Civil Procedure 65 and Local Rules 65-1 and 7-10, SCEA moves ex parte to put an
  461. immediate halt to the ongoing distribution of these illegal Circumvention Devices and avoid
  462. irreparable harm to SCEA and to other video game software developers stemming from
  463. video game piracy.
  464. Defendants’ Circumvention Devices allow users to circumvent multiple TPMs in the
  465. PS3 System – including access control, encryption and digital signature protections – to
  466. enable use or playing of illegal copies of PlayStation®3 video games on the PS3 System.
  467. 1 Defendant Hotz, against whom this motion initially is being brought, has established
  468. considerable contacts with the District in connection with his unlawful conduct. Upon
  469. information and belief, Defendant George Hotz is bound by the “Playstation Network Terms
  470. of Service and User Agreement” (the “PSN User Agreement”), ¶14 of which states in relevant
  471. part that “both parties submit to personal jurisdiction in California and further agree that any
  472. dispute arising from or relating to this Agreement shall be brought in a court within San
  473. Mateo County, California.” Further, upon information and believe, in connection with his
  474. unlawful conduct, Hotz has utilized an account via PayPal, a company located in San Jose,
  475. California, and therefore derives a financial benefit through his unlawful conduct in this
  476. district. Bricker Decl. at ¶31, Exh. DD. Mr. Hotz is also unlawfully demonstrating and
  477. distributing a circumvention device or component thereof through YouTube, a widely used
  478. and interactive website located in Mountain View, California. Id. ¶25, Exh. W. Mr. Hotz has
  479. also discussed his unlawful conduct through Twitter, a widely used and interactive website
  480. located in San Francisco, California.
  481. 1
  482. 2
  483. 3
  484. 4
  485. 5
  486. 6
  487. 7
  488. 8
  489. 9
  490. 10
  491. 11
  492. 12
  493. 13
  494. 14
  495. 15
  496. 16
  497. 17
  498. 18
  499. 19
  500. 20
  501. 21
  502. 22
  503. 23
  504. 24
  505. 25
  506. 26
  507. 27
  508. 28
  509. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  510. Case No. ______________________
  511. 2
  512. These Circumvention Devices violate federal copyright law, including the Digital Millennium
  513. Copyright Act (“DMCA”), 17 U.S.C. § 1201 et seq. This Court previously has recognized the
  514. illegality of similar devices and enjoined their sale and distribution. See, e.g., Sony Computer
  515. Entertainment America v. Zoomba et al., 2010 U.S. Dist. Lexis 113228, 2010 WL 4512835
  516. (N.D. Cal. October 13, 2010); Sony Computer Entertainment America v. Divineo, Inc., 457 F.
  517. Supp. 2d 957 (N.D. Cal. 2006). Defendants’ intentional hacking of the PS3 System without
  518. authorization, and their obtaining and transmission of SCEA’s proprietary information
  519. (including but not limited to digital signature keys) also violates the Computer Fraud and
  520. Abuse Act (“CFAA”), 18 U.S.C. § 1030 et seq. If Defendants are not immediately enjoined
  521. from accessing the PS3 System, circumventing its TPMs and trafficking in illegal
  522. Circumvention Devices, Defendants will continue to do so, thereby facilitating and
  523. proliferating the unlawful copying of PlayStation3 games and causing immediate and
  524. irreparable harm to SCEA and others.
  525. Indeed, the Defendants’ enabling of software piracy through their activities over the
  526. last several days has been widely reported. Yesterday, for example, an article trumpeted
  527. that “PS3 Software Piracy Begins as First Game is Played on an Unmodded Playstation 3.”
  528. Bricker Decl. at ¶2, Exh. A. The article proceeds to explain:
  529. That didn’t take long, did it? The rootkey crack that was
  530. uncovered by Geohot [i.e., Defendant George Hotz] and other
  531. modders has the door wide open for rampant PlayStation 3
  532. piracy, and the first pirated game on an unmodded PS3 has been
  533. done.
  534. See also, Bricker Decl. at ¶30, Exh. CC. This motion seeks to close the door for rampant
  535. piracy that Defendants have illegally pried open in violation of federal and California law.
  536. Though SCEA need only show “likely” success to obtain a Temporary Restraining
  537. Order (“TRO”), SCEA’s evidence demonstrates a compelling case of DMCA violations and
  538. computer fraud and abuse warranting preliminary relief and an order for impoundment.
  539. Accordingly, SCEA respectfully requests that the Court issue: (1) a TRO immediately barring
  540. Defendant Hotz from (a) circumventing the TPMs in the PS3 System; (b) offering to the
  541. public, marketing, distributing, or trafficking in the Circumvention Devices; and (c) accessing
  542. 1
  543. 2
  544. 3
  545. 4
  546. 5
  547. 6
  548. 7
  549. 8
  550. 9
  551. 10
  552. 11
  553. 12
  554. 13
  555. 14
  556. 15
  557. 16
  558. 17
  559. 18
  560. 19
  561. 20
  562. 21
  563. 22
  564. 23
  565. 24
  566. 25
  567. 26
  568. 27
  569. 28
  570. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  571. Case No. ______________________
  572. 3
  573. SCEA’s protected PS3 System, obtaining and transmitting SCEA’s proprietary information or
  574. code, and impairing the confidentiality of information obtained from the PS3 System until a
  575. preliminary injunction can be issued; (2) an Order for Impoundment; and (3) an Order to
  576. Show Cause why a preliminary injunction should not issue enjoining Defendants from
  577. continued circumvention, distribution of the Circumvention Devices and accessing and
  578. transmitting SCEA’s proprietary information.
  579. II. BACKGROUND
  580. A. SCEA’s PlayStation®3 Computer Entertainment System And Its
  581. Technological Protection Measures
  582. SCEA markets and sells the PS3 System, a computer entertainment system featuring
  583. hardware and firmware designed for the playing of video games. Declaration of Riley R.
  584. Russell In Support of Ex Parte Motion for Temporary Restraining Order And Order To Show
  585. Cause Re Preliminary Injunction; Order for Impoundment (“Russell Decl.”), ¶3, Exh. A. The
  586. PS3 System is a highly sophisticated apparatus that usually connects to a television or
  587. monitor for use in playing video game software simulating three-dimensional action. Id. The
  588. PS3 System also features PlayStation Network (“PSN”), an entertainment network that
  589. supports multiplayer online gameplay, access to the PlayStation Store to purchase video
  590. games as well as rent or buy feature films and PS3 System connectivity. Id.
  591. The PS3 System has enjoyed wide success throughout the United States and the
  592. world. Over 41 million PS3 Systems have been sold worldwide since the product release in
  593. November 2006. Russell Decl. at ¶4. There are hundreds of different video game titles
  594. currently available for the PS3 System in the United States, which typically sell for retail
  595. prices between $40.00 and $70.00. Id.
  596. All genuine PS3 Systems are manufactured with technological protection measures
  597. that effectively control access to the PS3 System and prevent unlicensed or copied software
  598. from playing on the PS3 System. See Declaration of Bret Mogilefsky In Support of Ex Parte
  599. Motion for Temporary Restraining Order And Order To Show Cause Re Preliminary
  600. Injunction; Order for Impoundment (“Mogilefsky Decl.”), ¶4. The PS3 System is designed to
  601. 1
  602. 2
  603. 3
  604. 4
  605. 5
  606. 6
  607. 7
  608. 8
  609. 9
  610. 10
  611. 11
  612. 12
  613. 13
  614. 14
  615. 15
  616. 16
  617. 17
  618. 18
  619. 19
  620. 20
  621. 21
  622. 22
  623. 23
  624. 24
  625. 25
  626. 26
  627. 27
  628. 28
  629. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  630. Case No. ______________________
  631. 4
  632. run multiple levels of authorized, encrypted code in one or more sequences. Id. at ¶5. Each
  633. level features TPMs, which control access, encrypt and decrypt code, and authenticate
  634. signatures to enable access to the files within the code. Id.
  635. One purpose of the PS3 System’s TPMs is to prevent users from playing illegally
  636. copied, pirated games. Id. at ¶14. To that end, every file authorized to run on the PS3
  637. System contains an authentic digital signature. Id. at ¶9. SCEA generates each digital
  638. signature using a pair of electronic keys (“Keys”). Id. at ¶10. The PS3 System verifies each
  639. signature using one of those Keys, which is encrypted and embedded in the system. Id. The
  640. other Key is held by SCEA; it is not distributed and cannot be located anywhere in the PS3
  641. System’s code or hardware, or the code of any authorized video game. Id. The PS3 System
  642. will not execute a file unless that file contains an authentic digital signature. Id.
  643. Unauthorized or unlicensed video game discs (such as those burned from genuine game
  644. discs) do not have an authorized signature code. Id. at ¶11. Accordingly, a normallyfunctioning
  645. PS3 System will not run those pirated video games.
  646. The PS3 System also utilizes access control and encryption TPMs. Id. at ¶8. Those
  647. TPMs prevent, restrict or otherwise limit access to certain sections of the PS3 System
  648. software and hardware. Id. at ¶5. As a result, the TPMs ensure that the PS3 System
  649. functions in a safe and reliable manner. Id. at ¶13. They also protect the encrypted
  650. firmware, encrypted digital signature Keys and other encrypted Keys that are stored within
  651. the PS3 System. Id. at ¶10. Because the PS3 System and its code are protected by these
  652. TPMs, users can neither access nor read the signatures or the Keys, and therefore cannot
  653. use those elements to gain access to the System to run a pirated video game. Id. at ¶13.
  654. Using the types of TPMs discussed above, the PS3 System allows only the operation
  655. of legitimate, authorized and approved software that is licensed for distribution in the region
  656. or geographical territory of the console’s sale. Id. at ¶6. By taking these precautions, SCEA
  657. has been able to protect its exclusive rights to copy, sell, distribute and manufacture video
  658. games. In addition, SCEA has been able to protect its substantial investment – and the
  659. investment of third-party videogame companies – in the development, creation, and
  660. 1
  661. 2
  662. 3
  663. 4
  664. 5
  665. 6
  666. 7
  667. 8
  668. 9
  669. 10
  670. 11
  671. 12
  672. 13
  673. 14
  674. 15
  675. 16
  676. 17
  677. 18
  678. 19
  679. 20
  680. 21
  681. 22
  682. 23
  683. 24
  684. 25
  685. 26
  686. 27
  687. 28
  688. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  689. Case No. ______________________
  690. 5
  691. distribution of the PS3 System and compatible video games.
  692. B. SCEA’s Copyrights And Copyright Licenses
  693. SCEA develops and publishes its own interactive entertainment software video games
  694. for the PS3 System. Russell Decl. at ¶6. Id. SCEA has invested and continues to invest
  695. substantial time, effort and expense in the design, development, testing, manufacturing and
  696. marketing of its video games. Id. at ¶4. Those games are highly creative and SCEA has
  697. obtained copyright registrations to protect them. Id. at ¶7. For example, SCEA owns valid
  698. copyright registration for the following video game software: Ratchet & Clank Future: Tools
  699. of Destruction (Copyright No. PA 1-616-055); Resistance 2 (Copyright No. PA 1-619-506),
  700. and Uncharted Drake’s Fortune (Copyright No. PA 1-611-286). Id., Exh. A.
  701. All PlayStation3 video games are programmed with computer code, referred to herein
  702. as PlayStation3 Programmer Tools (“PS3 Programmer Tools”), that authenticate authorized
  703. video game software and facilitate interaction with the central processing unit and
  704. microprocessors in the PS3 System. Mogilefsky Decl. at ¶3. A video game whose program
  705. does not incorporate the PS3 Programmer Tools cannot be played on the PS3 System. Id.
  706. The PS3 Programmer Tools are also incorporated within the PS3 System firmware. Id.
  707. SCEA is the licensee of the registered copyright for the PS3 Programmer Tools (Copyright
  708. No. TX0007208564) and is authorized to sublicense its rights to use, copy and distribute the
  709. Tools to third party video game developers and publishers. Russell Decl., Exh. B.
  710. SCEA also offers licenses to third parties to develop interactive entertainment
  711. software products for the PS3 System. Russell Decl. at ¶6. These licensees are authorized
  712. to use proprietary PlayStation®3 technology to develop video game software for the PS3
  713. System and to publish and distribute their video games. Id. SCEA receives royalties on
  714. each PlayStation®3 video game manufactured pursuant to its licenses with third party
  715. publishers. Id.
  716. C. Defendants’ Illegal Activities
  717. Since the release of the PS3 System in 2006, software hackers have attempted to
  718. write code to run unauthorized software on SCEA’s gaming system. Mogilefsky Decl. at ¶15.
  719. 1
  720. 2
  721. 3
  722. 4
  723. 5
  724. 6
  725. 7
  726. 8
  727. 9
  728. 10
  729. 11
  730. 12
  731. 13
  732. 14
  733. 15
  734. 16
  735. 17
  736. 18
  737. 19
  738. 20
  739. 21
  740. 22
  741. 23
  742. 24
  743. 25
  744. 26
  745. 27
  746. 28
  747. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  748. Case No. ______________________
  749. 6
  750. Until a few days ago, the efforts of these hackers were largely thwarted by the TPMs that
  751. secure the various levels of the PS3 System. Id. at ¶15. In late December 2010, a hacking
  752. group called FAIL0VERFLOW discovered a way to access certain (but not all) levels of the
  753. PS3 System by circumventing the corresponding TPMs. Id. at ¶16; Bricker Decl. at ¶5, Exh.
  754. D. At that point, hackers were given the tools to run unauthorized and pirated software on
  755. the PS3 System. Mogilefsky Decl. at ¶¶16-18. Building on FAIL0VERFLOW’s work,
  756. Defendant Hotz unlawfully gained access to a critical level of the PS3 System by
  757. circumventing the corresponding TPMs. Id. at ¶26. In early January 2011, Hotz publicly
  758. distributed the circumvention devices necessary to access that level, providing them to the
  759. public via the Internet and releasing software code that will allow users to run unauthorized or
  760. pirated software on the PS3 System. Id. at ¶¶20-25. Unless this Court enjoins Defendants’
  761. unlawful conduct, hackers will succeed in running and distributing Circumvention Devices
  762. that run pirated software on the PS3 System.
  763. 1. The FAIL0VERFLOW Defendants’ Unlawful Conduct and
  764. Circumvention Devices
  765. Defendants Bushing, Hector Cantero, Sven Peter and Segher formed
  766. FAIL0VERFLOW, a hacking group, with the purpose of circumventing the technological
  767. protection measures in the PS3 System and accessing and obtaining SCEA’s proprietary
  768. code from within the System. Bricker Decl. at ¶¶3-4, Exhs. B-C.2 On December 29, 2010,
  769. the FAIL0VERFLOW Defendants appeared at the Chaos Communication Conference (the
  770. “Chaos Conference”), a hacker event in Berlin. Id. at ¶4, Exh. C. Boasting that they had
  771. circumvented TPMs for certain levels of the PS3 System, the FAIL0VERFLOW Defendants
  772. broadcast detailed instructions for their circumvention method (the “FAIL0VERFLOW
  773. Instructional Materials”) and promised to divulge information and proprietary code they
  774. obtained by unlawfully accessing the PS3 System. Id. at ¶5, Exh. D. Hours after the Chaos
  775. 2 Each member of FAIL0VERFLOW has a history of circumventing TPMs and touting their
  776. exploits. Bricker Decl. at ¶3, Exh. B; ¶¶6-7, Exhs. E-F; ¶¶10-19, Exhs. I-R; ¶28-29, Exhs.
  777. AA-BB.
  778. 1
  779. 2
  780. 3
  781. 4
  782. 5
  783. 6
  784. 7
  785. 8
  786. 9
  787. 10
  788. 11
  789. 12
  790. 13
  791. 14
  792. 15
  793. 16
  794. 17
  795. 18
  796. 19
  797. 20
  798. 21
  799. 22
  800. 23
  801. 24
  802. 25
  803. 26
  804. 27
  805. 28
  806. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  807. Case No. ______________________
  808. 7
  809. Conference, the FAIL0VERFLOW Defendants’ Instructional Materials were published on the
  810. Internet. Id. Within two days, the group began publishing the code, software tools and
  811. scrambled or encrypted keys derived from their circumvention of the TPMs on Twitter and
  812. other websites. Id. at ¶¶6-7, Exhs. E-F; Mogilefsky Decl. at ¶18.
  813. The FAIL0VERFLOW Defendants’ Instructional Materials and code, software tools
  814. and keys constitute Circumvention Devices. The Instructional Materials enable others to gain
  815. access to certain protected levels in the PS3 System. Mogilefsky Decl. ¶17. Armed with the
  816. code, software tools and keys released by the FAIL0VERFLOW Defendants, individuals can
  817. now decrypt, avoid, bypass, deactivate or impair TPMs that protect fundamental levels of the
  818. PS3 System, and impermissibly run unauthorized software at those levels. Id. at ¶¶17-18.
  819. Indeed, other hackers have used the information and tools released by the FAIL0VERFLOW
  820. Defendants to circumvent the TPMs of the PS3 System and publish and traffick in
  821. circumvention devices. Id. at 17; Bricker Decl. at ¶8, Exh. G. This is exactly what the
  822. FAIL0VERFLOW Defendants wanted when, prior to releasing their Circumvention Devices,
  823. they posted the following message on Twitter:
  824. We’ll release tools … someone else can take over. The fun part
  825. is done ;)
  826. Bricker Decl. at ¶3, Exh. B.
  827. The FAIL0VERFLOW Defendants intentionally circumvented SCEA’s TPMs, accessed
  828. the PS3 System and trafficked in Circumvention Devices and SCEA’s proprietary information,
  829. with full knowledge that their unlawful conduct would irreparably harm SCEA. Indeed, five
  830. days prior to appearing at the Chaos Conference, Bushing echoed a fellow hacker’s
  831. comment anticipating this irreparable harm: “Last chance to sell any Sony stock you may
  832. have.” Id. at ¶18, Exh. Q.
  833. 2. George Hotz’s Unlawful Conduct and Circumvention Devices
  834. Defendant Hotz is a well-known hacker who has gained notoriety for circumventing the
  835. technological protection measures in a number of sophisticated software and hardware
  836. systems. Id. at ¶20, Exh. S. Building on the FAIL0VERFLOW Defendants’ Circumvention
  837. 1
  838. 2
  839. 3
  840. 4
  841. 5
  842. 6
  843. 7
  844. 8
  845. 9
  846. 10
  847. 11
  848. 12
  849. 13
  850. 14
  851. 15
  852. 16
  853. 17
  854. 18
  855. 19
  856. 20
  857. 21
  858. 22
  859. 23
  860. 24
  861. 25
  862. 26
  863. 27
  864. 28
  865. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  866. Case No. ______________________
  867. 8
  868. Devices, Hotz circumvented certain other TPMs in the PS3 System, intentionally accessed
  869. the PS3 System without authorization, and misappropriated critical SCEA Keys (referred to
  870. hereinafter as the “Metldr Keys” or the “Root Keys”):
  871. forgot to thank fail0verflow. . . . They had several keys but not the
  872. root key, I used their discoveries to find the [] root key.”
  873. Id. at ¶21, Exh. T.3 The Root Keys, or “Metldr Keys,” that Hotz wrongfully compromised are
  874. part of a TPM in the PS3 System, and are necessary to authenticate code that runs on a
  875. critical level of that System. Mogilefsky Decl. ¶12. With access to this particular level, one
  876. can control crucial functions and operations of the PS3 System and execute code that will
  877. enable pirated video games to run on the PS3 System. Id.
  878. Knowing that the “Metldr Keys” can defeat TPMs in the PS3 System, Hotz began
  879. using these proprietary Keys as a component of a Circumvention Device that applies SCEA
  880. signatures to any file, effectively “tricking” the PS3 System into running unauthorized
  881. programs. Mogilefsky Decl. ¶23. On January 2, 2011, Hotz published the Metldr Keys on his
  882. website under the banner “keys open doors.” Bricker Decl. at ¶23, Ex. V. By doing so, Hotz
  883. purposefully compromised the confidentiality of those Keys and invited other software pirates
  884. to incorporate the Keys into their own circumvention technology. Id. (quoting Hotz January
  885. 2nd post: “use this info wisely”). Hotz’s distribution of the Metldr Keys enabled software
  886. pirates to create and run unauthorized copies of video games. Mogilefsky Decl. ¶20.
  887. Shortly thereafter, Hotz began incorporating the Metldr Keys into other Circumvention
  888. Devices and software packages that he or other hackers had built. Mogilefsky Decl. ¶23.
  889. Many of these Devices and packages – including “dePKG Firmware Decrypter” – were of
  890. limited use without SCEA’s proprietary Keys. Armed with some of SCEA’s Keys, however,
  891. 3 Hotz further recognized the FAIL0VERFLOW Defendants’ contribution to his circumvention
  892. method, stating “props to fail0verflow.” Bricker Decl. ¶22, Exh. U. The FAIL0VERFLOW
  893. Defendants confirmed their collaboration with Hotz by posting the following statement on
  894. their Twitter page: “We discovered how to get the keys. . . . Geohot exploited metldr, then
  895. used our trick to get its keys.” Id. at ¶3, Exh. B.
  896. 1
  897. 2
  898. 3
  899. 4
  900. 5
  901. 6
  902. 7
  903. 8
  904. 9
  905. 10
  906. 11
  907. 12
  908. 13
  909. 14
  910. 15
  911. 16
  912. 17
  913. 18
  914. 19
  915. 20
  916. 21
  917. 22
  918. 23
  919. 24
  920. 25
  921. 26
  922. 27
  923. 28
  924. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  925. Case No. ______________________
  926. 9
  927. Hotz was able to use his dePKG Firmware Decrypter to decrypt a version of SCEA’s
  928. firmware,4 modify the firmware to remove and/or bypass some of its TPMs, and add a digital
  929. signature using the compromised Metldr Keys. Mogilefsky Decl. ¶22. On January 7, 2011,
  930. Hotz posted a video to YouTube demonstrating his circumvention of the PS3 System’s
  931. access controls and execution of this unauthorized, modified version of SCEA’s firmware.
  932. Bricker Decl. at ¶24, Exh. W. He referred to this process as “jailbreaking,” and happily
  933. explained that the “jailbroken” firmware allowed him to run other unauthorized programs on
  934. the PS3 System. Id.
  935. One day later, in furtherance of his unlawful conduct, Hotz published on his website
  936. the “3.55 Firmware Jailbreak” code, a circumvention device or component thereof that
  937. disables, avoids, bypasses, removes, deactivates and/or impairs a critical TPM in the PS3
  938. System. Id. at ¶22, Exh. U; ¶25, Exh. X; ¶26, Exh. Y; Mogilefsky Decl. ¶24. The 3.55
  939. Firmware Jailbreak code allows users to install and run unauthorized software – including
  940. pirated video games – in circumvention of the TPMs on the PS3 System. Mogilefsky Decl.
  941. ¶24. Indeed, in the last few days, people have already started copying, playing and
  942. trafficking in pirated copies of video games using the 3.55 Firmware Jailbreak. Bricker Decl.
  943. at ¶2, Exh. A.
  944. Most recently, on January 9, 2011, Hotz published “Signing Tools” that enable
  945. encryption and signing of unauthorized content, thereby permitting that content to run in
  946. circumvention of the TPMs on the PS3 System. Id. at ¶22, Exh. U; Mogilefsky Decl. at ¶25.
  947. These Signing Tools work together with the 3.55 Firmware Jailbreak to allow piracy.
  948. Mogilefsky Decl. at ¶25.
  949. By distributing the Circumvention Devices discussed herein, Hotz has caused
  950. irreparable injury and damage to SCEA. Russell Decl. at ¶¶9-10. Recognizing the harmful
  951. impact of his unlawful conduct on SCEA and attempting to leverage his circumvention
  952. 4 Firmware is a fixed program or data structure that internally controls various electronic
  953. devices, such as the PS3. Mogilefsky Decl. at ¶2.
  954. 1
  955. 2
  956. 3
  957. 4
  958. 5
  959. 6
  960. 7
  961. 8
  962. 9
  963. 10
  964. 11
  965. 12
  966. 13
  967. 14
  968. 15
  969. 16
  970. 17
  971. 18
  972. 19
  973. 20
  974. 21
  975. 22
  976. 23
  977. 24
  978. 25
  979. 26
  980. 27
  981. 28
  982. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  983. Case No. ______________________
  984. 10
  985. activities, Hotz addressed SCEA when he posted the Metldr Keys. Bricker Decl. at ¶22, Exh.
  986. U. In an attempt to obtain employment, he wrote: “if you want your next console to be
  987. secure, get in touch with me.” Id. Furthermore, in a January 6, 2011 interview with the BBC,
  988. Hotz acknowledged that his conduct will catalyze the piracy of video games: “I hate that it
  989. enables piracy.” Id. at ¶27, Exh. Z. Despite feigning disturbance resulting from the
  990. proliferation of piracy, Hotz then went on to release 3.55 Firmware JailBreak and the Signing
  991. Tool – both components of Circumvention Devices that are designed to facilitate videogame
  992. piracy. Id. at ¶22, Exh. U. Even the FAIL0VERFLOW Defendants, when interviewed,
  993. admitted that they expect Mr. Hotz’s conduct “to make piracy easier without accomplishing
  994. anything intrinsically useful.” Id. at ¶28, Exh. AA.5
  995. III. A TEMPORARY RESTRAINING ORDER IS NECESSARY TO PREVENT
  996. VIOLATIONS OF THE DMCA AND THE CFAA
  997. A. SCEA Has Satisfied The Standards For Granting A Temporary Restraining
  998. Order And A Preliminary Injunction
  999. The standards in the Ninth Circuit for obtaining a temporary restraining order are
  1000. identical to those for obtaining a preliminary injunction. State of Alaska v. Native Village of
  1001. Venetie, 856 F.2d 1384, 1389 (9th Cir. 1988). SCEA is entitled to preliminary injunctive relief
  1002. if it shows (1) a likelihood of success on the merits; (2) a likelihood of irreparable harm
  1003. absent a preliminary injunction; (3) that the balance of equities tips in favor of issuing an
  1004. injunction; and (4) that an injunction is in the public interest. Winter v. Natural Res. Def.
  1005. Council, Inc., 555 U.S. 7, 129 S.Ct. 365, 374 (2008). A preliminary injunction is a way to
  1006. preserve the status quo and prevent irreparable loss of rights before judgment. See, e.g.,
  1007. Textile Unlimited, Inc. v. A. BMH & Co., 240 F.3d 781, 786 (9th Cir. 2001); Sierra On-Line,
  1008. 5 In a public on-line forum, FAIL0VERFLOW Defendant, Cantero, said “We didn’t release
  1009. keys due fear of legal repercussions, but we told people exactly how to calculate them, and
  1010. they did.” Bricker Decl. at ¶28, Exh. AA. In an earlier post, Defendant Cantero said, “we
  1011. used these techniques to obtain encryption, public, and private keys [for several fundamental
  1012. levels of the PS 3 System]. With these keys we could decrypt and sign our own firmware. …
  1013. The metldr key does break the console’s security even more (especially with respect to
  1014. newer, future firmwares – and thus also piracy of newer games) ….” Id.
  1015. 1
  1016. 2
  1017. 3
  1018. 4
  1019. 5
  1020. 6
  1021. 7
  1022. 8
  1023. 9
  1024. 10
  1025. 11
  1026. 12
  1027. 13
  1028. 14
  1029. 15
  1030. 16
  1031. 17
  1032. 18
  1033. 19
  1034. 20
  1035. 21
  1036. 22
  1037. 23
  1038. 24
  1039. 25
  1040. 26
  1041. 27
  1042. 28
  1043. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1044. Case No. ______________________
  1045. 11
  1046. Inc. v. Phoenix Software, Inc., 739 F.2d 1415, 1422 (9th Cir. 1984). Indeed, “public policy
  1047. favors injunctive relief to remedy the infringement of intellectual property rights.” Yash Raj
  1048. Films (USA), Inc. v. Sidhu, 2010 U.S. Dist. LEXIS 25988, *17-18, 2010 WL 1032792, *7 (E.D.
  1049. Cal. 2010). Courts may also consider whether the granting of a preliminary injunction favors
  1050. the public interest. Sun Microsystems, Inc. v. Microsoft Corp., 21 F. Supp. 2d 1109, 1118
  1051. (N.D. Cal. 1998). Both a temporary restraining order and preliminary injunction are clearly
  1052. proper here.
  1053. B. The DMCA Authorizes Courts To Enjoin Persons From Trafficking In
  1054. Circumvention Devices, And The CFAA Authorizes Courts To Enjoin
  1055. Persons From Accessing Computers Without Authorization, Obtaining
  1056. Proprietary Information And Trafficking In Such Information
  1057. SCEA has brought suit against Defendants based, inter alia, on their violations of the
  1058. Digital Millennium Copyright Act (“DMCA”).6 The DMCA specifically authorizes the granting
  1059. of "temporary and permanent injunctions" to restrain violations of the DMCA,
  1060. including circumvention of technological protection measures and trafficking in circumvention
  1061. devices. 17 U.S.C. § 1203(b)(1). Likewise, the CFAA provides “injunctive or other equitable
  1062. relief.” 18 U.S.C. § 1030 (g). Courts, including this one, have issued temporary and
  1063. preliminary injunctive relief to restrain violations of the DMCA in situations like the threat
  1064. posed by Defendants here. See, e.g., Realnetworks, Inc. v. DVD Copy Control Ass’n., 641
  1065. F. Supp. 2d 913 (N.D. Cal. 2009) (granting TRO and preliminary injunction based on
  1066. defendants’ sale of circumvention devices that make copies of copyrighted content);
  1067. SuccessFactors, Inc. v. Softscape, Inc., 544 F. Supp. 2d 975, 981 (N.D. Cal. 2008) (granting
  1068. preliminary injunction under the CFAA to cease unauthorized access of computer and use of
  1069. confidential information); YourNetDating, LLC v. Mitchell, 88 F. Supp. 2d 870, 872 (N.D. Ill.
  1070. 2000) (granting TRO against computer hacker under the CFAA).
  1071. 6 In its Complaint, SCEA has also alleged claims for contributory copyright infringement
  1072. under the Copyright Act, the California Comprehensive Computer Data Access and Fraud
  1073. Act, breach of contract, tortious interference with contractual relations, trespass and common
  1074. law misappropriation. SCEA is basing its request for TRO only on its DMCA and CFAA
  1075. claims.
  1076. 1
  1077. 2
  1078. 3
  1079. 4
  1080. 5
  1081. 6
  1082. 7
  1083. 8
  1084. 9
  1085. 10
  1086. 11
  1087. 12
  1088. 13
  1089. 14
  1090. 15
  1091. 16
  1092. 17
  1093. 18
  1094. 19
  1095. 20
  1096. 21
  1097. 22
  1098. 23
  1099. 24
  1100. 25
  1101. 26
  1102. 27
  1103. 28
  1104. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1105. Case No. ______________________
  1106. 12
  1107. C. SCEA Has Demonstrated An Indisputable Likelihood of Success On T7he
  1108. Merits Of Its DMCA Claim
  1109. The DMCA was enacted to prohibit, inter alia, circumvention of effective technological
  1110. protection measures and the trafficking of devices that circumvent the technological
  1111. measures used by copyright owners to restrict access to their copyrighted works. See 17
  1112. U.S.C. § 1201 et seq. Liability under the DMCA for circumventing a technological protection
  1113. measure is established by showing that: (1) plaintiff’s TPMs, in the ordinary course of
  1114. operation, prevent access to a work protected under the Copyright Act; and (2) defendant
  1115. has circumvented those TPMs. See 17 U.S.C. § 1201(a)(1)(A); 321 Studios v. Metro
  1116. Goldwyn Major Studios, Inc., 307 F. Supp. 2d 1085, 1095 (N.D. Cal. 2004). Liability under
  1117. the DMCA for trafficking in circumvention devices is established by showing that: (1)
  1118. plaintiff’s technological mechanism, in the ordinary course of operation, prevents access to a
  1119. copyrighted work (or protects a right of the copyright owner in the work); and (2) defendant
  1120. traffics in devices, or components thereof, primarily designed to circumvent such protections.
  1121. See 17 U.S.C. §§ 1201(a)(2) and 1201(b)(1); 321 Studios, 307 F. Supp. 2d at 1097-99.
  1122. SCEA easily satisfies the elements to prove that Defendants have both circumvented the
  1123. TPMs that prevent access to SCEA’s copyrighted works and trafficked in circumvention
  1124. devices or components thereof.
  1125. Defendants have circumvented technological protection measures that effectively
  1126. control access to the PS3 System, the works therein, and other copyrighted SCEA works and
  1127. the in violation of the DMCA, insofar as Defendants decrypted, avoided, bypassed, removed,
  1128. deactivated, or impaired those technological measures. Indeed, both the FAIL0VERFLOW
  1129. Defendants and George Hotz circumvented multiple encryption and access controls in order
  1130. to retrieve and compromise various Keys used by SCEA to prevent individuals from running
  1131. unauthorized code on the PS3 System. Bricker Decl. at ¶28, Exh. AA (Canton, a member of
  1132. FAIL0VERFLOW, noting that the group “deserve[s] a little more credit than we're getting for
  1133. [Hotz’s 3.55 Firmware Jailbreak]” because “he used our key recovery attack verbatim”);
  1134. Bricker Decl. at ¶5, Exh. D (explaining the “recovery attack” used by the FAIL0VERFLOW
  1135. 1
  1136. 2
  1137. 3
  1138. 4
  1139. 5
  1140. 6
  1141. 7
  1142. 8
  1143. 9
  1144. 10
  1145. 11
  1146. 12
  1147. 13
  1148. 14
  1149. 15
  1150. 16
  1151. 17
  1152. 18
  1153. 19
  1154. 20
  1155. 21
  1156. 22
  1157. 23
  1158. 24
  1159. 25
  1160. 26
  1161. 27
  1162. 28
  1163. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1164. Case No. ______________________
  1165. 13
  1166. Defendants and Defendants Hotz in detail). In addition to their circumvention of such
  1167. encryption and access controls, the Defendants misappropriated SCEA’s proprietary Keys
  1168. and used those Keys without permission in order to avoid SCEA’s effective technological
  1169. measures. Bricker Decl. at ¶21, Exh. T (announcing Hotz’s disclosure of Metldr Keys). By
  1170. circumventing those effective TPMs, all Defendants have clearly violated 17 U.S.C.
  1171. §1201(a)(1). Such conduct constitutes circumvention, as this Court has recognized several
  1172. times. For example, in Realnetworks, Inc. v. DVD Copy Control Ass'n, 641 F. Supp. 2d 913,
  1173. 934 (N.D. Cal. 2009), this Court held that the defendant had circumvented technological
  1174. measures that effectively controlled access to copyrighted DVD content, where the defendant
  1175. had a limited license to use some of the Plaintiff’s “decryption keys,” but used those keys
  1176. outside of the scope of its license to gain unlawful access to the DVD content and create a
  1177. permanent copy. Moreover, this Court concluded that the defendant in Realnetworks
  1178. circumvented technological measures each time it accessed the content that it copied during
  1179. its first instance of circumvention. Id. See also 321 Studios v. Metro Goldwyn Mayer
  1180. Studios, Inc., 307 F. Supp. 2d 1085 (N.D. Cal. 2004) (holding that decryption software
  1181. violated the DMCA by avoiding and bypassing an encoding scheme used by DVD producers,
  1182. because although the software used authorized “decryption keys,” it did so without the
  1183. permission of the content owner).
  1184. The law is also clear that trafficking in Circumvention Devices is illegal under the
  1185. DMCA in that their primary purpose is to bypass a technological measure designed to protect
  1186. copyrighted works. For example, in Sony Computer Entertainment America v. Divineo, Inc.,
  1187. 457 F. Supp. 2d 957 (N.D. Cal. 2006), this Court granted summary adjudication and
  1188. injunctive relief based on defendants trafficking in similar “mod chip” circumvention devices in
  1189. violation of the DMCA. See also 321 Studios, 307 F. Supp. 2d at 1085 (granting summary
  1190. judgment and injunction in favor of copyright holders on DMCA claim); Nintendo of America
  1191. Inc. v. Chan, 2009 U.S. Dist. LEXIS 66624, 2009 WL 2190186 (C.D. Cal. 2009) (granting
  1192. preliminary injunction based on defendant’s marketing and trafficking of “game copiers.”);
  1193. Coxcom, Inc. v. Chaffee, 536 F.3d 101 (1st Cir. 2008) (granting TRO and preliminary
  1194. 1
  1195. 2
  1196. 3
  1197. 4
  1198. 5
  1199. 6
  1200. 7
  1201. 8
  1202. 9
  1203. 10
  1204. 11
  1205. 12
  1206. 13
  1207. 14
  1208. 15
  1209. 16
  1210. 17
  1211. 18
  1212. 19
  1213. 20
  1214. 21
  1215. 22
  1216. 23
  1217. 24
  1218. 25
  1219. 26
  1220. 27
  1221. 28
  1222. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1223. Case No. ______________________
  1224. 14
  1225. injunction based on defendants’ sales of digital cable filters in violation of the DMCA);
  1226. Macrovision v. Sima Products Corp., 2006 U.S. Dist. LEXIS 22106, 2006 WL 1063284
  1227. (S.D.N.Y. 2006) (granting preliminary injunction based on defendants’ sale of “video
  1228. enhancer” products that circumvented plaintiff’s DVD copy protection technology); Universal
  1229. City Studios, Inc. v. Reimerdes, 82 F. Supp. 2d 211, 225-26 (S.D.N.Y. 2000) (granting
  1230. preliminary injunction on DMCA claim).
  1231. The Ninth Circuit in MDY Industries clarified this standard, explaining that the test
  1232. requires that the defendant (1) traffics in (2) a technology or part thereof (3) that is primarily
  1233. designed, produced, or marketed for, or has limited commercially significant use other than
  1234. (4) circumventing a technological measure (5) that effectively controls access (6) to a
  1235. copyrighted work. MDY Industries v. Blizzard Entertainment, Inc., 2010 WL 5141269 at *18,
  1236. 2010 U.S. App. LEXIS 25424 at *28-29, 2010 WL 5141269 at *18, No. 09-15932 Slip. Op.
  1237. (9th Cir., Dec. 14, 2010).
  1238. 1. Traffics In
  1239. The Defendants are trafficking, offering, and distributing their Circumvention Devices
  1240. through various internet channels, including their websites and Twitter accounts. Bricker
  1241. Decl. at ¶¶5-7, Exhs. D-F; ¶22, Exh. U.
  1242. 2. A Technology or Part Thereof
  1243. These Circumvention Devices comprise computer code that circumvents the TPMs in
  1244. the PS3 System, thereby allowing users to install and run unsigned programs, and play
  1245. pirated video games. Mogilefsky Decl. at ¶¶18-24.
  1246. 3. Primarily Designed
  1247. The FAIL0VERFLOW team and George Hotz designed these illegal Devices with the
  1248. sole purpose and function to circumvent the TPMs that effectively prevent access to the PS3
  1249. System and related copyrighted works. Id. at ¶ 27. Indeed, the Defendants themselves
  1250. advertise and promote their own circumvention, and distribute those Circumvention Devices
  1251. with a clear message inducing others to use the Devices in the same manner. See, e.g.,
  1252. Bricker Decl. at ¶24, Exh. W (video showing Defendant Hotz using his “3.55 Firmware
  1253. 1
  1254. 2
  1255. 3
  1256. 4
  1257. 5
  1258. 6
  1259. 7
  1260. 8
  1261. 9
  1262. 10
  1263. 11
  1264. 12
  1265. 13
  1266. 14
  1267. 15
  1268. 16
  1269. 17
  1270. 18
  1271. 19
  1272. 20
  1273. 21
  1274. 22
  1275. 23
  1276. 24
  1277. 25
  1278. 26
  1279. 27
  1280. 28
  1281. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1282. Case No. ______________________
  1283. 15
  1284. Jailbreak” to circumvent TPMs in the PS3 System); Id. at ¶22, Exh. U (offering links to
  1285. download the “3.55 Firmware Jailbreak,” the “Signing Tools).
  1286. 4. Circumvention Device
  1287. The Circumvention Devices distributed by Defendants enable users to circumvent or
  1288. disable the TPMs in the PS3 System: Hotz’s Metldr Keys, dePKG Firmware Decrypter, 3.55
  1289. Firmware Jailbreak code and Signing Tool, individually, or in combination, decrypt, bypass,
  1290. disable, or impair certain TPMs within the PS3 System and enable users to run pirated video
  1291. games; indeed, some of these Circumvention Devices have even been packaged together to
  1292. facilitate piracy. Id. at ¶30, Exh. CC (“First PS3 Backup Working on Geohot CFW 3.55,”
  1293. providing step-by-step instructions for using the 3.55 Firmware Jailbreak code and Signing
  1294. Tool to pirate video games). Further, the FAIL0VERFLOW Defendants’ code, software tools
  1295. and keys together with their Instruction Materials enable users to bypass TPMs to allow
  1296. unauthorized software to run. Mogilefsky Decl. at ¶18; supra, Section I (C)(1). Moreover,
  1297. The combination of Defendants’ various Circumvention Devices and/or components thereof
  1298. have no commercially significant purpose other than to circumvent SCEA’s technological
  1299. protection measures. The Defendants designed the methods, programs, and code described
  1300. herein, and offered to the public, trafficked in, and/or distributed those Circumvention Devices
  1301. with the express intent of allowing others to circumvent SCEA’s technological protection
  1302. measures so that they can impermissibly run unauthorized code on the PS3 System.
  1303. 5. Effective TPMs
  1304. As noted above, the TPMs in place on the PS3 System prevent users from playing
  1305. unlicensed or copied video game discs and installing unlicensed software, such as Hotz’s
  1306. 3.55 Firmware Jailbreak. Mogilefsky Decl. ¶ 7.
  1307. 6. Copyrighted Work
  1308. If these TPMs are circumvented or disabled, users can access the copyrighted PS3
  1309. Programmer Tools and can copy borrowed or rented video game discs, and play those
  1310. copied video games later without inserting the authentic, licensed disc. Id. at ¶14.
  1311. 1
  1312. 2
  1313. 3
  1314. 4
  1315. 5
  1316. 6
  1317. 7
  1318. 8
  1319. 9
  1320. 10
  1321. 11
  1322. 12
  1323. 13
  1324. 14
  1325. 15
  1326. 16
  1327. 17
  1328. 18
  1329. 19
  1330. 20
  1331. 21
  1332. 22
  1333. 23
  1334. 24
  1335. 25
  1336. 26
  1337. 27
  1338. 28
  1339. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1340. Case No. ______________________
  1341. 16
  1342. In sum, SCEA has shown an unquestionable likelihood of success on the merits of its
  1343. DMCA claim.7
  1344. D. SCEA Has Demonstrated An Indisputable Likelihood of Success On The
  1345. Merits Of Its Claim Under The Computer Fraud and Abuse Act, 18 U.S.C. §
  1346. 1030, et seq.
  1347. Defendants have committed numerous offenses under the Computer Fraud and
  1348. Abuse Act (CFAA”), 18 U.S.C. §1030 (a), including: circumventing the TPMs in the PS3
  1349. System, intentional unauthorized accessing of the PS3 System firmware, obtaining SCEA’s
  1350. proprietary information or code and distributing it, and impairing the confidentiality of
  1351. information obtained from the PS3 System.
  1352. 1. 18 U.S.C. § 1030(a)(2)(C) – Confidential Information On Computer
  1353. To prove a violation under 18 U.S.C. § 1030(a)(2)(C), SCEA must show that
  1354. Defendants: (1) intentionally accessed a protected computer used for interstate commerce or
  1355. communication; (2) without authorization or by exceeding authorized access to the protected
  1356. computer; and (3) thereby obtained information from the protected computer. SCEA has
  1357. established these elements.
  1358. First, the PS3 System consists of a “protected computer” because it is used in
  1359. interstate commerce (e.g., the Internet.) Second, without SCEA’s authorization, Defendants
  1360. intentionally accessed certain levels of the PS3 Systems by circumventing SCEA’s TPMs in
  1361. the PS3 Systems. Mogilefsky Decl. at ¶¶16-22. Defendants’ access to such levels in the
  1362. PS3 Systems is not authorized; to the contrary, the PlayStation Network Terms of Service
  1363. and User Agreement (“PSN User Agreement”) prohibits the circumvention of security
  1364. 7 “Fair use” is no defense even if there were a conceivable noninfringing use for these
  1365. devices. As this Court explained in Divineo, “downstream customers’ lawful or fair use of
  1366. circumvention devices does not relieve [defendant] from liability for trafficking in such devices
  1367. under the DMCA.” 457 F. Supp. at 965. See, e.g., Realnetworks, 641 F. Supp. 2d at 942
  1368. (any limited “fair use” exception does not apply to manufacturers or traffickers of the
  1369. circumvention devices); 321 Studios, 307 F. Supp. 2d at 1097 (“the downstream uses of the
  1370. software by the customers of [defendant], whether legal or illegal, are not relevant to
  1371. determining whether [defendant] itself is violating the statute.”); Universal City Studios v.
  1372. Reimerdes, 111 F. Supp. 2d 294, 318 (S.D.N.Y. 2000).
  1373. 1
  1374. 2
  1375. 3
  1376. 4
  1377. 5
  1378. 6
  1379. 7
  1380. 8
  1381. 9
  1382. 10
  1383. 11
  1384. 12
  1385. 13
  1386. 14
  1387. 15
  1388. 16
  1389. 17
  1390. 18
  1391. 19
  1392. 20
  1393. 21
  1394. 22
  1395. 23
  1396. 24
  1397. 25
  1398. 26
  1399. 27
  1400. 28
  1401. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1402. Case No. ______________________
  1403. 17
  1404. features in the PS3 System. Complaint at ¶15, Exh. A.8 See, e.g., Craigslist, Inc. v.
  1405. Naturemarket, Inc., 694 F. Supp. 2d 1039, 1052 (N.D. Cal. 2010) (violation of user
  1406. agreement established “without authorization” requirement of the CFAA); eBay v. Digital
  1407. Point Solutions, 608 F. Supp. 2d 1156, 1164 (N.D. Cal. 2009) (“access and use beyond
  1408. those set forth in a user agreement constitute unauthorized use under the CFAA.”); America
  1409. Online, Inc. v. LCGM, Inc., 46 F. Supp. 2d 444, 450 (E.D. Va. 1998) (“Defendants’ actions
  1410. violated [the] Terms of Service, and as such was unauthorized.”) Finally, as a result of their
  1411. unauthorized access, Defendants succeeded in discovering – then obtaining – SCEA’s
  1412. proprietary information, including SCEA’s Keys that digitally sign code to run on certain
  1413. secure levels of the PS3 System. Mogilefsky Decl. at ¶¶16-20.9
  1414. 2. 18 U.S.C. § 1030(a)(4) – Intent To Defraud And Obtain Value
  1415. To prevail on a claim under § 1030(a)(4), SCEA must show that Defendants: (1)
  1416. knowingly and with intent to defraud accessed a protected computer without authorization, or
  1417. exceeded authorized access; and (2) by means of such conduct furthered the intended fraud
  1418. and obtained anything of value. SCEA has satisfied these elements.
  1419. As discussed above, Defendants accessed the PS3 Systems without authorization.
  1420. Because Defendants intentionally circumvented the TPMs in the PS3 Systems, their acts
  1421. were knowing and with intent to defraud, and they furthered the intended fraud and obtained
  1422. something of tremendous value – SCEA’s proprietary information, including the Keys to the
  1423. PS3 Systems. Bricker Decl. at ¶¶3, 22, Exhs. B, U. Indeed, “fraud” in this context means
  1424. simply “wrongdoing and not proof of the common law elements of fraud.” Shurgard Storage
  1425. 8 In its Complaint, SCEA has also brought claims for breach of the PSN User Agreement and
  1426. tortious interference with contractual relations.
  1427. 9 SCEA has standing to assert claims under the CFAA because Defendants’ conduct has
  1428. caused loss to SCEA during any one year period aggregating far more than $5,000 in value,
  1429. and because Defendants’ conduct has caused damage affecting 10 or more PS3 Systems
  1430. during any one year period. See Mortensen v. Bresnan Commun., 2010 U.S. Dist. LEXIS
  1431. 13419, at *20-21, 2010 WL 5140454, at *7 (D. Mont. 2010) (installation and distribution of
  1432. Internet cookies onto multiple computers was sufficient to allege damages in excess of
  1433. $5,000)
  1434. 1
  1435. 2
  1436. 3
  1437. 4
  1438. 5
  1439. 6
  1440. 7
  1441. 8
  1442. 9
  1443. 10
  1444. 11
  1445. 12
  1446. 13
  1447. 14
  1448. 15
  1449. 16
  1450. 17
  1451. 18
  1452. 19
  1453. 20
  1454. 21
  1455. 22
  1456. 23
  1457. 24
  1458. 25
  1459. 26
  1460. 27
  1461. 28
  1462. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1463. Case No. ______________________
  1464. 18
  1465. Centers, Inc. v. Safeguard Self Storage, Inc., 119 F. Supp. 2d 1121, 1126 (W.D. Wa. 2000);
  1466. see also eBay, Inc. v. Digital Point Solutions, Inc., 608 F. Supp. 2d 1156, 1164 (N.D. Cal.
  1467. 2009) (“’fraud’” under the CFAA only requires a showing of unlawful access.”). Accordingly,
  1468. Defendants have violated §1030 (a) (4) of the CFAA.
  1469. 3. 18 U.S.C. § 1030(a)(5)(A) – Knowing Transmission of Code
  1470. Under 18 U.S.C. § 1030(a)(5)(A), SCEA will also likely prevail on its claim that
  1471. Defendants “knowingly caused the transmission of a program, information, code or
  1472. command, and as a result of such conduct, intentionally caused damage without
  1473. authorization, to a protected computer.” Defendants knowingly transmitted SCEA’s
  1474. proprietary information or code via the Internet, which has greatly damaged SCEA and
  1475. threatens to cause immeasurable damage to the PS3 System. Bricker Decl. at ¶¶6-7, 21,
  1476. Exhs. E-F, T.
  1477. 4. 18 U.S.C. § 1030(a)(5)(B) and (C) – Intentional and Reckless Damage
  1478. And Loss
  1479. To prove a violation under 18 U.S.C. § 1030(a)(5)(B) and (C), SCEA must show that
  1480. Defendants “intentionally accessed a protected computer without authorization, and, as a
  1481. result of such conduct, recklessly causes damage” or “recklessly causes damage or loss.”
  1482. As established above, Defendants intentionally accessed the PS3 System without SCEA’s
  1483. authorization. There is no doubt that Defendants’ unlawful access of the PS3 Systems has
  1484. caused and will continue to cause great damage and loss to SCEA unless enjoined. Russell
  1485. Decl. at ¶10. By accessing the PS3 Systems, Defendants have impaired the TPMs in the
  1486. PS3 Systems, which protect fundamental levels of the PS3 System, and they are illegally
  1487. running unauthorized software at those levels. Mogilefsky Decl. at ¶¶23-24. See Black &
  1488. Decker (US), Inc. v. Smith, 568 F. Supp. 2d 929, 937 (W.D. Tenn. 2008) (“intentionally
  1489. rendering a computer system less secure should be considered ‘damage” even when no
  1490. data, program or system is damaged or destroyed.”). Unless Defendants are enjoined,
  1491. SCEA will continue to sustain great loss, including lost video game software sales for SCEA
  1492. and other game publishers, as a result of Defendants’ unauthorized access to the PS3
  1493. 1
  1494. 2
  1495. 3
  1496. 4
  1497. 5
  1498. 6
  1499. 7
  1500. 8
  1501. 9
  1502. 10
  1503. 11
  1504. 12
  1505. 13
  1506. 14
  1507. 15
  1508. 16
  1509. 17
  1510. 18
  1511. 19
  1512. 20
  1513. 21
  1514. 22
  1515. 23
  1516. 24
  1517. 25
  1518. 26
  1519. 27
  1520. 28
  1521. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1522. Case No. ______________________
  1523. 19
  1524. System. Russell Decl. at ¶¶9-10.
  1525. 5. 18 U.S.C. § 1030(a)(6)(A) – Trafficking in Password
  1526. Under 18 U.S.C. § 1030(a)(6)(A), SCEA will likely prevail on its claim that Defendants
  1527. “knowingly and with intent to defraud traffics in any password or similar information through
  1528. which a computer may be accessed without authorization if such trafficking affects interstate
  1529. or foreign commerce.” As discussed above, Defendants have trafficked in Circumvention
  1530. Devices and SCEA’s proprietary information, including the Keys which effectively provide the
  1531. “password” to access the most secure areas of the PS3 System, with full knowledge that
  1532. their unlawful conduct would irreparably harm SCEA.
  1533. 6. 18 U.S.C. § 1030(a)(7)(B) – Intent to Extort
  1534. Finally, SCEA will likely prevail on its claim under §1030(a)(7)(B), which prohibits
  1535. “intent to extort from any person any money or other thing of value” by threatening “to obtain
  1536. information from a protected computer without authorization or in excess of authorization or
  1537. to impair the confidentiality of information obtained from a protected computer without
  1538. authorization or by exceeding authorized access.” Hotz violated this provision when, in the
  1539. same post in which the published SCEA’s Keys, he attempted to obtain from SCEA “a thing
  1540. of value” in the form of employment: “if you want your next console to be secure, get in touch
  1541. with me.” Bricker Decl. at ¶22, Exh. U.
  1542. To prevent further harm to SCEA, the Court should immediately enjoin Defendants’
  1543. unauthorized access of the PS3 Systems.
  1544. E. Absent Injunctive Relief, SCEA Will Suffer Irreparable Injury And The
  1545. Balance Of Hardships Strongly Favors SCEA
  1546. Defendants’ distribution of Circumvention Devices and unauthorized access of the
  1547. PS3 System allow copyright infringement to occur unchecked. Unless Defendants are
  1548. enjoined, SCEA will be irreparably harmed. See e.g., Universal City Studios, Inc. v.
  1549. Reimerdes, 82 F. Supp. 2d 211, 215 (S.D.N.Y. 2000) (technology that circumvents copy
  1550. 1
  1551. 2
  1552. 3
  1553. 4
  1554. 5
  1555. 6
  1556. 7
  1557. 8
  1558. 9
  1559. 10
  1560. 11
  1561. 12
  1562. 13
  1563. 14
  1564. 15
  1565. 16
  1566. 17
  1567. 18
  1568. 19
  1569. 20
  1570. 21
  1571. 22
  1572. 23
  1573. 24
  1574. 25
  1575. 26
  1576. 27
  1577. 28
  1578. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1579. Case No. ______________________
  1580. 20
  1581. protection systems gives rise to “the same immediate and irreparable injury” as would occur
  1582. with direct copyright infringement.)10
  1583. There can be no dispute that Defendants’ continued illegal distribution of the
  1584. Circumvention Devices will greatly erode SCEA’s ability to protect its valuable intellectual
  1585. property rights. A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004, 1029 (9th Cir. 2001)
  1586. (granting injunctive relief because otherwise “plaintiffs would lose the power to control their
  1587. intellectual property.”). If SCEA “is unable to prevent the circumvention of its technology, its
  1588. business goodwill will likely be eroded, and the damages flowing therefrom extremely difficult
  1589. to quantify.” Macrovision v. Sima Products Corp., 2006 U.S. Dist. LEXIS 22106, *8, 2006 WL
  1590. 1063284, *3 (S.D.N.Y. 2006). See, e.g., Apple Inc. v. Psystar Corp., 673 F. Supp. 2d 943,
  1591. 948 (N.D. Cal. 2009) (irreparable harm in a copyright infringement action may be established
  1592. through reputational harm); MGM Studios, Inc. v. Grokster, Ltd., 518 F. Supp. 2d 1197, 1215
  1593. (C.D. Cal. 2007). All the cases hold that “Intangible injuries such as damage to. . . goodwill
  1594. qualify as irreparable harm.” Rent-A-Center, Inc. v. Canyon Television & Appliance Rental,
  1595. Inc., 944 F.2d 597, 603 (9th Cir. 2001).
  1596. The Central District of California in Nintendo of America, Inc. v. Bung Enterprises, Ltd.,
  1597. 1999 U.S. Dist. LEXIS 23588 at *36, 1999 WL 34975007, *13 summed up the dilemma
  1598. facing copyright owners like SCEA:
  1599. The sale of pirated video games, primarily through electronic
  1600. transfers on the Internet, is proliferating. For obvious practical
  1601. reasons, Nintendo and other owners of game copyrights, cannot
  1602. attack this practice through actions against the direct infringers,
  1603. who are frequently individuals or small commercial operations that
  1604. use [circumvention devices ] to make illegal copies of Nintendo
  1605. 10There is a split of authority among the courts in the Northern District of California on
  1606. whether a presumption of irreparable harm based on likelihood of success on the merits in
  1607. copyright actions exists after the U.S. Supreme Court’s decision in Winter v. Natural Res.
  1608. Def. Council, Inc., 129 S. Ct. 365, 374 (2008). Realnetworks, Inc. v. DVD Copy Control
  1609. Ass’n, Inc.,555 U.S. 7, 641 F. Supp. 2d 913, 953 (N.D. Cal. 2009) (recognizing presumption
  1610. of irreparable harm in copyright infringement case). But see Jacobsen v. Katzer, 609 F.
  1611. Supp. 2d. 925, 936 (N.D. Cal. 2009) (rejecting any presumption of irreparable harm in
  1612. copyright cases). However, even if irreparable injury is not presumed, SCEA has established
  1613. such harm.
  1614. 1
  1615. 2
  1616. 3
  1617. 4
  1618. 5
  1619. 6
  1620. 7
  1621. 8
  1622. 9
  1623. 10
  1624. 11
  1625. 12
  1626. 13
  1627. 14
  1628. 15
  1629. 16
  1630. 17
  1631. 18
  1632. 19
  1633. 20
  1634. 21
  1635. 22
  1636. 23
  1637. 24
  1638. 25
  1639. 26
  1640. 27
  1641. 28
  1642. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1643. Case No. ______________________
  1644. 21
  1645. products, which are then sold or given to others or uploaded to
  1646. the Internet. As Congress clearly recognized when it adopted
  1647. Section 1201 of the DMCA, the only effective way to protect a
  1648. game or other software developer’s investment in its copyright is
  1649. by bringing an end to the sale of devices which are designed to
  1650. circumvent the security protection placed within the software.
  1651. Congress thereby recognized that the only effective way to stop
  1652. the game counterfeiting industry is by enjoining
  1653. companies… from making the devices through that industry
  1654. is able to thrive.
  1655. Nintendo of America, Inc. v. Bung Enterprises, Ltd., 1999 U.S. Dist. LEXIS 23588 at *36,
  1656. 1999 WL 34975007, *13 (emphasis added). Unless enjoined, the proliferation of PS3 video
  1657. game piracy will irreparably harm SCEA by: (1) undermining SCEA’s monumental investment
  1658. in the PS3 System; (2) eliminating SCEA’s control over distribution of its copyrighted works;
  1659. (3) harming SCEA’s reputation with third party game developers; and (4) diminishing the
  1660. sales of legitimate PS3 video games by SCEA and its authorized retailers. Russell Decl. at
  1661. ¶¶10-12.
  1662. SCEA’s affiliates invested hundreds of millions of dollars developing the PS3 System,
  1663. including the PS3 System’s security measures. Id. at ¶12. The widespread distribution of
  1664. devices that disable or circumvent these measures, however, eradicates the investment in
  1665. the technology and undermines the values that these TPMs are meant to preserve. Id.
  1666. Primary among these values is SCEA’s ability to control distribution of its copyrighted video
  1667. games, as well as those video games owned by third party licensees. Id. For each new
  1668. consumer that gains access to Defendants’ circumvention devices, SCEA loses the ability to
  1669. prevent that consumer from copying and playing copied SCEA-copyrighted video games. Id.
  1670. Once these devices are in the hands of consumers, the loss of control over SCEA’s
  1671. copyrighted material is permanent and irreparable. Id. Equally serious is the damage to
  1672. SCEA’s reputation and goodwill with third party game developers, whose own copyrighted
  1673. video games are pirated for use with the PS3 System as well. Id. All of this piracy adds up
  1674. ultimately to lost sales for SCEA and other video game publishers as an enormous number of
  1675. consumers naturally prefer free copies of video games over spending money to purchase the
  1676. originals. Id.
  1677. 1
  1678. 2
  1679. 3
  1680. 4
  1681. 5
  1682. 6
  1683. 7
  1684. 8
  1685. 9
  1686. 10
  1687. 11
  1688. 12
  1689. 13
  1690. 14
  1691. 15
  1692. 16
  1693. 17
  1694. 18
  1695. 19
  1696. 20
  1697. 21
  1698. 22
  1699. 23
  1700. 24
  1701. 25
  1702. 26
  1703. 27
  1704. 28
  1705. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1706. Case No. ______________________
  1707. 22
  1708. SCEA has established that Defendants’ publication, trafficking in and distribution of
  1709. the Circumvention Devices facilitate the sale and playing of unauthorized or unlicensed
  1710. copies of PS3 System video game software. See Section III.c., supra. If these devices are
  1711. made further available on the market, they will have a dramatic downward effect on the sales
  1712. of PS3 video games, as unauthorized copies of PS3 System video games will quickly
  1713. circulate and become prevalent in the marketplace. Russell Decl. at ¶¶10-12; Bricker Decl.
  1714. at ¶30, Exh. CC. It is already happening. Even now, pirated video games are being
  1715. packaged and distributed with these circumvention devices. Bricker Decl. at ¶¶2, 30, Exhs.
  1716. A, CC. In the absence of injunctive relief, Defendants will continue their illegal activity while
  1717. SCEA will continue to be greatly harmed by the distribution of these circumvention devices to
  1718. the public. The lack of injunctive relief will therefore result in the loss of goodwill to licensees,
  1719. encourage infringers to increase operations, and discourage anti-piracy enforcement – all of
  1720. which is great and irreparable harm. In contrast, Defendants will only be ordered to cease
  1721. their illicit activity. They will not suffer any monetary damage since, at this point, they are
  1722. only distributing Circumvention Devices for free on the Internet. Because of the irreparable
  1723. harm to SCEA and because the balance of hardships weighs heavily in favor of SCEA,
  1724. SCEA is entitled to a TRO and preliminary injunction.
  1725. F. The Public Interest Strongly Favors Granting SCEA Injunctive Relief
  1726. In copyright infringement cases, it is ordinarily presumed that an injunction will serve
  1727. the public interest if the copyright holder shows a likelihood of success on the merits.
  1728. Concrete Mach. Co. v. Classic Lawn Ornaments, Inc., 843 F.2d 600, 612 (1st Cir. 1988). "[I]t
  1729. is virtually axiomatic that the public interest can only be served by upholding copyright
  1730. protections and, correspondingly, preventing the misappropriation of the skills, creative
  1731. energies, and resources which are invested in the protected work."
  1732. The interest of the public will be strongly served through a TRO and preliminary
  1733. injunction against Defendants’ trafficking of the Circumvention Devices and unauthorized
  1734. access to the PS3 System. Allowing the ongoing distribution of Circumvention Devices will
  1735. reward – not deter – software piracy, ultimately harming the public. True innovators will be
  1736. 1
  1737. 2
  1738. 3
  1739. 4
  1740. 5
  1741. 6
  1742. 7
  1743. 8
  1744. 9
  1745. 10
  1746. 11
  1747. 12
  1748. 13
  1749. 14
  1750. 15
  1751. 16
  1752. 17
  1753. 18
  1754. 19
  1755. 20
  1756. 21
  1757. 22
  1758. 23
  1759. 24
  1760. 25
  1761. 26
  1762. 27
  1763. 28
  1764. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1765. Case No. ______________________
  1766. 23
  1767. deterred from investing the effort and resources needed to create new products if counterfeitenabling
  1768. developers are allowed to siphon away the compensation that real creators such as
  1769. SCEA otherwise would earn. On the other hand, no public benefit results from Defendants’
  1770. activities. No new works have been created; indeed, piracy deters creativity. Public policy
  1771. certainly does not support violations of the DMCA to facilitate software piracy.
  1772. G. SCEA Has Complied With The Procedural Requirements For Issuance Of
  1773. A TRO And Order To Show Cause Re: Preliminary Injunction
  1774. SCEA has complied fully with Fed. R. Civ. P. 65, Local Rules 65-1 and 7-10 for
  1775. issuance of an ex parte TRO and an Order to Show Cause why a preliminary injunction
  1776. should not issue. SCEA has submitted declarations and other evidence showing that it will
  1777. be irreparably harmed without an Order restraining Defendants from any further distribution
  1778. of Circumvention Devices. SCEA has submitted the required documentation in compliance
  1779. with Local Rule 65-1(a). Bricker Decl. at ¶32.
  1780. Fed. R. Civ. P. 65 (c) provides that a bond be posted “in an amount that the court
  1781. considers proper to pay the costs and damages sustained by any party found to have been
  1782. wrongfully enjoined or restrained.” A bond “may not be required, or may be minimal, when
  1783. the harm to the enjoined party is slight or where the movant has demonstrated a likelihood of
  1784. success.” Ticketmaster L.L.C. v. RMG Techs., Inc., 507 F. Supp. 2d 1096, 1116 (C.D. Cal.
  1785. 2007); see also Connecticut Gen. Life Ins. Co. v. New Images of Beverly Hills, 321 F.3d 878,
  1786. 882 (9th Cir. 2003) (“bond amount may be zero if there is no evidence the party will suffer
  1787. damages from the injunction.”); YourNetDating, LLC, 88 F. Supp. 2d at 872 (no bond
  1788. required for TRO against hacker who violated the CFAA). Here, there is virtually no prospect
  1789. that any of Defendants’ legitimate interests would be impinged by an order requiring them to
  1790. cease distribution of the Circumvention Devices. However, if the Court requires that a bond
  1791. be posted, SCEA submits that the bond should not exceed $5,000 since that amount is more
  1792. than sufficient to account for the unlikely possibility that Defendants would be “wrongfully
  1793. enjoined or restrained,” from distributing the Circumvention Devices. Fed. R. Civ. P. 65 (c)
  1794. 1
  1795. 2
  1796. 3
  1797. 4
  1798. 5
  1799. 6
  1800. 7
  1801. 8
  1802. 9
  1803. 10
  1804. 11
  1805. 12
  1806. 13
  1807. 14
  1808. 15
  1809. 16
  1810. 17
  1811. 18
  1812. 19
  1813. 20
  1814. 21
  1815. 22
  1816. 23
  1817. 24
  1818. 25
  1819. 26
  1820. 27
  1821. 28
  1822. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1823. Case No. ______________________
  1824. 24
  1825. IV. AN ORDER OF IMPOUNDMENT OF THE CIRCUMVENTION DEVICES IS
  1826. WARRANTED
  1827. Section 1203 (b) (2) of the DMCA specifically authorizes impoundment of “any device
  1828. or product that is in the custody or control of the alleged violator and that the court has
  1829. reasonable cause to believe was involved in a violation” of §1201.11 Accordingly, SCEA
  1830. seeks the impoundment of any and all media in which circumvention devices are stored
  1831. within the possession, custody or control of Defendants, including computers, hard drives,
  1832. CD-ROMs, DVDs, USB sticks and other media.
  1833. Impoundment “most often is granted in ‘piracy’ actions involving widespread
  1834. duplication or marketing of counterfeit merchandise such [as] . . . video game and other
  1835. software.” 6-35 Nimmer on Copyright §35.05 (2008). Impoundment “is a form of preliminary
  1836. relief and the same standards apply with respect to issuance of an impoundment order as to
  1837. issuance of a preliminary injunction.” Yamate USA Corp. v. Sugerman, 1991 U.S. Dist.
  1838. LEXIS 20701, *41-42, 1991 WL 274854, at *14 (D.N.J. 1991). Accordingly, courts routinely
  1839. order the impoundment of infringing materials in preliminary injunction cases. See, e.g.,
  1840. Sega Enters. v. MAPHIA, 857 F. Supp. 679, 691 (N.D. Cal. 1994) (ordering the impoundment
  1841. of video game copiers and unauthorized copies of video game software); Rebis v. Universal
  1842. CAD Consultants, Inc., 1998 U.S. Dist. LEXIS 12366, *12, 1998 WL 470475 *4-5 (N.D. Cal.
  1843. 1998) (ordering the impoundment of infringing software); Yamate USA Corp., 1991 U.S. Dist.
  1844. LEXIS 20701 at *44-45, 1991 WL 274854, *14 (ordering the impoundment of defendants’
  1845. equipment used in making the infringing video games); Nintendo of America, Inc. v. Elcon
  1846. Indus., Inc., 564 F. Supp. 937, 938 (E.D. Mich. 1982) (ordering the impoundment of infringing
  1847. video games); WPOW, Inc. v. MRLJ Enters., 584 F. Supp. 132, 139 (D.D.C. 1984)
  1848. 11 Section 503(a) of the Copyright Act also provides that “at any time while an action under
  1849. this title is pending, the court may order the impounding, on such terms as it may deem
  1850. reasonable, of all copies. . . . claimed to have been made or used in violation of the copyright
  1851. owner’s exclusive rights. . .or other articles by means of which such copies. . . may be
  1852. reproduced.”
  1853. 1
  1854. 2
  1855. 3
  1856. 4
  1857. 5
  1858. 6
  1859. 7
  1860. 8
  1861. 9
  1862. 10
  1863. 11
  1864. 12
  1865. 13
  1866. 14
  1867. 15
  1868. 16
  1869. 17
  1870. 18
  1871. 19
  1872. 20
  1873. 21
  1874. 22
  1875. 23
  1876. 24
  1877. 25
  1878. 26
  1879. 27
  1880. 28
  1881. PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT
  1882. Case No. ______________________
  1883. 25
  1884. (impoundment of infringing material issued since the standard for preliminary injunction was
  1885. met); Dollcraft Industries, Ltd. v. Well-Made Toy Mfg. Co., 479 F. Supp. 1105, 1118 (E.D.N.Y
  1886. 1978) (ordering impoundment of materials infringing copyright and components used for
  1887. manufacture of the infringing items); Duchess Music Corp. v. Stern, 458 F.2d 1305, 1308 (9th
  1888. Cir. 1972), cert. denied, 409 U.S. 847 (1972) (impoundment order in copyright infringement
  1889. case should “impound everything the plaintiff alleges infringes his copyright,” including any
  1890. “means” for making infringing copies.) (emphasis in original). In Duchess Music Corp., the
  1891. Ninth Circuit held it was error for the district court not to order impoundment of machines
  1892. used by defendants to reproduce the copyrighted records. The Ninth Circuit explained that
  1893. “machines, blank cassettes and cartridges . . . and other devices are ‘other means’ for
  1894. making infringing copies to [plaintiff’s] copyrights” and thus “fall within the scope of both the
  1895. statute and the rules and were properly impounded.” Id. at 1308. Further, computers, when
  1896. used to copy and store copyrighted programs, also are subject to impoundment. In Mitchell
  1897. Int’l, Inc. v. Fraticelli, 2007 U.S. Dist. LEXIS 86787, *25-26, 2007 WL 4197583, *10 (D. P.R.
  1898. 2007), the district court ordered the impoundment of defendant’s computers to determine
  1899. whether they contained any of plaintiff’s copyrighted software programs. The same should
  1900. occur here, as it is almost certain the original Circumvention Devices are stored by
  1901. Defendants on their computers.
  1902. V. CONCLUSION
  1903. SCEA respectfully requests that the Court grant the relief in the proposed Order
  1904. submitted herewith.
  1905. DATED: January 11, 2011 Respectfully submitted,
  1906. KILPATRICK TOWNSEND & STOCKTON LLP
  1907. By:
  1908. JAMES G. GILLILAND, JR.
  1909. Attorneys for Plaintiff
  1910. SONY COMPUTER ENTERTAINMENT AMERICA LLC
  1911. 63092926 v1
Advertisement
Add Comment
Please, Sign In to add comment
Advertisement