Motion For TRO
Motion For TRO
Motion For TRO
23
24
25
26
27
28
15
16
17
18
19
20
21
22
23
24
25
26
27
28
2 TABLE OF AUTHORITIES
3 Page(s)
CASES
4
321 Studios v. Metro Goldwyn Major Studios, Inc.,
5 307 F. Supp. 2d 1085 (N.D. Cal. 2004) ........................................................ 12, 13, 16
6 A&M Records, Inc. v. Napster, Inc.,
7 239 F. 3d 1004 (9th Cir. 2001) ................................................................................. 20
28
PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT iii
Case No. _____________________
1 MDY Industries v. Blizzard Entertainment, Inc.,
2010 WL 5141269, 2010 U.S. App. LEXIS 25424, 2010 WL 5141269, No. 09-
2 15932 Slip. Op. (9th Cir., Dec. 14, 2010) ................................................................. 14
3
MGM Studios, Inc. v. Grokster,
4 Ltd., 518 F. Supp. 2d 1197 (C.D. Cal. 2007) ............................................................ 20
28
21 STATUTES
23 17 U.S.C. § 1201(a)(1)(A).............................................................................................. 12
24 17 U.S.C. §§ 1201(a)(2) and 1201(b)(1)........................................................................ 12
25 17 U.S.C. § 1201 et seq. ........................................................................................... 2, 12
26 17 U.S.C. § 1203(b)(1) .................................................................................................. 11
27
18 U.S.C. §1030 (a)....................................................................................................... 16
28
18 U.S.C. § 1030(a)(2)(C) ............................................................................................. 16
PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT v
Case No. ______________________
1 18 U.S.C. § 1030(a)(4) ............................................................................................ 17, 18
2 18 U.S.C. § 1030(a)(5)(A).............................................................................................. 18
3 18 U.S.C. § 1030(a)(5)(B) and (C)................................................................................. 18
4
18 U.S.C. § 1030(a)(6)(A).............................................................................................. 19
5
18 U.S.C. § 1030(a)(7)(B).............................................................................................. 19
6
18 U.S.C. § 1030 et seq. ........................................................................................... 2, 16
7
18 U.S.C. § 1030 (g)...................................................................................................... 11
8
Federal Rule of Civil Procedure 65............................................................................ 1, 23
9
Local Rule 7-10 ............................................................................................................... 1
10
Local Rule 65-1 ......................................................................................................... 1, 23
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
3 (collectively, “Defendants”) are computer hackers.1 Working individually and in concert with
5 (“TPMs”) employed by plaintiff Sony Computer Entertainment America LLP (“SCEA”) in its
8 “Circumvention Devices”) that circumvent the TPMs in the PS3 System and facilitate the
9 counterfeiting of video games. Already, pirated video games are being packaged and
11 Parte Motion for Temporary Restraining Order And Order To Show Cause Re Preliminary
12 Injunction; Order for Impoundment (“Bricker Decl.”) ¶2, Exh. A. Pursuant to Federal Rule of
13 Civil Procedure 65 and Local Rules 65-1 and 7-10, SCEA moves ex parte to put an
14 immediate halt to the ongoing distribution of these illegal Circumvention Devices and avoid
15 irreparable harm to SCEA and to other video game software developers stemming from
18 PS3 System – including access control, encryption and digital signature protections – to
19 enable use or playing of illegal copies of PlayStation®3 video games on the PS3 System.
20
1
Defendant Hotz, against whom this motion initially is being brought, has established
21 considerable contacts with the District in connection with his unlawful conduct. Upon
information and belief, Defendant George Hotz is bound by the “Playstation Network Terms
22 of Service and User Agreement” (the “PSN User Agreement”), ¶14 of which states in relevant
part that “both parties submit to personal jurisdiction in California and further agree that any
23 dispute arising from or relating to this Agreement shall be brought in a court within San
Mateo County, California.” Further, upon information and believe, in connection with his
24 unlawful conduct, Hotz has utilized an account via PayPal, a company located in San Jose,
California, and therefore derives a financial benefit through his unlawful conduct in this
25 district. Bricker Decl. at ¶31, Exh. DD. Mr. Hotz is also unlawfully demonstrating and
distributing a circumvention device or component thereof through YouTube, a widely used
26 and interactive website located in Mountain View, California. Id. ¶25, Exh. W. Mr. Hotz has
also discussed his unlawful conduct through Twitter, a widely used and interactive website
27 located in San Francisco, California.
28
21 See also, Bricker Decl. at ¶30, Exh. CC. This motion seeks to close the door for rampant
22 piracy that Defendants have illegally pried open in violation of federal and California law.
23 Though SCEA need only show “likely” success to obtain a Temporary Restraining
24 Order (“TRO”), SCEA’s evidence demonstrates a compelling case of DMCA violations and
25 computer fraud and abuse warranting preliminary relief and an order for impoundment.
26 Accordingly, SCEA respectfully requests that the Court issue: (1) a TRO immediately barring
27 Defendant Hotz from (a) circumventing the TPMs in the PS3 System; (b) offering to the
28 public, marketing, distributing, or trafficking in the Circumvention Devices; and (c) accessing
10 SCEA markets and sells the PS3 System, a computer entertainment system featuring
11 hardware and firmware designed for the playing of video games. Declaration of Riley R.
12 Russell In Support of Ex Parte Motion for Temporary Restraining Order And Order To Show
13 Cause Re Preliminary Injunction; Order for Impoundment (“Russell Decl.”), ¶3, Exh. A. The
14 PS3 System is a highly sophisticated apparatus that usually connects to a television or
15 monitor for use in playing video game software simulating three-dimensional action. Id. The
16 PS3 System also features PlayStation Network (“PSN”), an entertainment network that
17 supports multiplayer online gameplay, access to the PlayStation Store to purchase video
18 games as well as rent or buy feature films and PS3 System connectivity. Id.
19 The PS3 System has enjoyed wide success throughout the United States and the
20 world. Over 41 million PS3 Systems have been sold worldwide since the product release in
21 November 2006. Russell Decl. at ¶4. There are hundreds of different video game titles
22 currently available for the PS3 System in the United States, which typically sell for retail
23 prices between $40.00 and $70.00. Id.
24 All genuine PS3 Systems are manufactured with technological protection measures
25 that effectively control access to the PS3 System and prevent unlicensed or copied software
26 from playing on the PS3 System. See Declaration of Bret Mogilefsky In Support of Ex Parte
27 Motion for Temporary Restraining Order And Order To Show Cause Re Preliminary
28 Injunction; Order for Impoundment (“Mogilefsky Decl.”), ¶4. The PS3 System is designed to
26 2
Each member of FAIL0VERFLOW has a history of circumventing TPMs and touting their
exploits. Bricker Decl. at ¶3, Exh. B; ¶¶6-7, Exhs. E-F; ¶¶10-19, Exhs. I-R; ¶28-29, Exhs.
27 AA-BB.
28
20 the PS3 System and trafficked in Circumvention Devices and SCEA’s proprietary information,
21 with full knowledge that their unlawful conduct would irreparably harm SCEA. Indeed, five
22 days prior to appearing at the Chaos Conference, Bushing echoed a fellow hacker’s
23 comment anticipating this irreparable harm: “Last chance to sell any Sony stock you may
26 Defendant Hotz is a well-known hacker who has gained notoriety for circumventing the
6 Id. at ¶21, Exh. T.3 The Root Keys, or “Metldr Keys,” that Hotz wrongfully compromised are
7 part of a TPM in the PS3 System, and are necessary to authenticate code that runs on a
8 critical level of that System. Mogilefsky Decl. ¶12. With access to this particular level, one
9 can control crucial functions and operations of the PS3 System and execute code that will
10 enable pirated video games to run on the PS3 System. Id.
11 Knowing that the “Metldr Keys” can defeat TPMs in the PS3 System, Hotz began
12 using these proprietary Keys as a component of a Circumvention Device that applies SCEA
13 signatures to any file, effectively “tricking” the PS3 System into running unauthorized
14 programs. Mogilefsky Decl. ¶23. On January 2, 2011, Hotz published the Metldr Keys on his
15 website under the banner “keys open doors.” Bricker Decl. at ¶23, Ex. V. By doing so, Hotz
16 purposefully compromised the confidentiality of those Keys and invited other software pirates
17 to incorporate the Keys into their own circumvention technology. Id. (quoting Hotz January
18 2nd post: “use this info wisely”). Hotz’s distribution of the Metldr Keys enabled software
19 pirates to create and run unauthorized copies of video games. Mogilefsky Decl. ¶20.
20 Shortly thereafter, Hotz began incorporating the Metldr Keys into other Circumvention
21 Devices and software packages that he or other hackers had built. Mogilefsky Decl. ¶23.
22 Many of these Devices and packages – including “dePKG Firmware Decrypter” – were of
23 limited use without SCEA’s proprietary Keys. Armed with some of SCEA’s Keys, however,
24
25 3
Hotz further recognized the FAIL0VERFLOW Defendants’ contribution to his circumvention
method, stating “props to fail0verflow.” Bricker Decl. ¶22, Exh. U. The FAIL0VERFLOW
26 Defendants confirmed their collaboration with Hotz by posting the following statement on
their Twitter page: “We discovered how to get the keys. . . . Geohot exploited metldr, then
27 used our trick to get its keys.” Id. at ¶3, Exh. B.
28
24 5
In a public on-line forum, FAIL0VERFLOW Defendant, Cantero, said “We didn’t release
keys due fear of legal repercussions, but we told people exactly how to calculate them, and
25 they did.” Bricker Decl. at ¶28, Exh. AA. In an earlier post, Defendant Cantero said, “we
used these techniques to obtain encryption, public, and private keys [for several fundamental
26 levels of the PS 3 System]. With these keys we could decrypt and sign our own firmware. …
The metldr key does break the console’s security even more (especially with respect to
27 newer, future firmwares – and thus also piracy of newer games) ….” Id.
28
11 SCEA has brought suit against Defendants based, inter alia, on their violations of the
12 Digital Millennium Copyright Act (“DMCA”).6 The DMCA specifically authorizes the granting
13 of "temporary and permanent injunctions" to restrain violations of the DMCA,
14 including circumvention of technological protection measures and trafficking in circumvention
15 devices. 17 U.S.C. § 1203(b)(1). Likewise, the CFAA provides “injunctive or other equitable
16 relief.” 18 U.S.C. § 1030 (g). Courts, including this one, have issued temporary and
17 preliminary injunctive relief to restrain violations of the DMCA in situations like the threat
18 posed by Defendants here. See, e.g., Realnetworks, Inc. v. DVD Copy Control Ass’n., 641
19 F. Supp. 2d 913 (N.D. Cal. 2009) (granting TRO and preliminary injunction based on
20 defendants’ sale of circumvention devices that make copies of copyrighted content);
21 SuccessFactors, Inc. v. Softscape, Inc., 544 F. Supp. 2d 975, 981 (N.D. Cal. 2008) (granting
22 preliminary injunction under the CFAA to cease unauthorized access of computer and use of
23 confidential information); YourNetDating, LLC v. Mitchell, 88 F. Supp. 2d 870, 872 (N.D. Ill.
24 2000) (granting TRO against computer hacker under the CFAA).
25
6
In its Complaint, SCEA has also alleged claims for contributory copyright infringement
26 under the Copyright Act, the California Comprehensive Computer Data Access and Fraud
Act, breach of contract, tortious interference with contractual relations, trespass and common
27 law misappropriation. SCEA is basing its request for TRO only on its DMCA and CFAA
claims.
28
3 The DMCA was enacted to prohibit, inter alia, circumvention of effective technological
4 protection measures and the trafficking of devices that circumvent the technological
5 measures used by copyright owners to restrict access to their copyrighted works. See 17
6 U.S.C. § 1201 et seq. Liability under the DMCA for circumventing a technological protection
7 measure is established by showing that: (1) plaintiff’s TPMs, in the ordinary course of
8 operation, prevent access to a work protected under the Copyright Act; and (2) defendant
9 has circumvented those TPMs. See 17 U.S.C. § 1201(a)(1)(A); 321 Studios v. Metro
10 Goldwyn Major Studios, Inc., 307 F. Supp. 2d 1085, 1095 (N.D. Cal. 2004). Liability under
11 the DMCA for trafficking in circumvention devices is established by showing that: (1)
13 copyrighted work (or protects a right of the copyright owner in the work); and (2) defendant
15 See 17 U.S.C. §§ 1201(a)(2) and 1201(b)(1); 321 Studios, 307 F. Supp. 2d at 1097-99.
16 SCEA easily satisfies the elements to prove that Defendants have both circumvented the
17 TPMs that prevent access to SCEA’s copyrighted works and trafficked in circumvention
20 control access to the PS3 System, the works therein, and other copyrighted SCEA works and
21 the in violation of the DMCA, insofar as Defendants decrypted, avoided, bypassed, removed,
23 Defendants and George Hotz circumvented multiple encryption and access controls in order
24 to retrieve and compromise various Keys used by SCEA to prevent individuals from running
25 unauthorized code on the PS3 System. Bricker Decl. at ¶28, Exh. AA (Canton, a member of
26 FAIL0VERFLOW, noting that the group “deserve[s] a little more credit than we're getting for
27 [Hotz’s 3.55 Firmware Jailbreak]” because “he used our key recovery attack verbatim”);
28 Bricker Decl. at ¶5, Exh. D (explaining the “recovery attack” used by the FAIL0VERFLOW
23 7
“Fair use” is no defense even if there were a conceivable noninfringing use for these
devices. As this Court explained in Divineo, “downstream customers’ lawful or fair use of
24 circumvention devices does not relieve [defendant] from liability for trafficking in such devices
under the DMCA.” 457 F. Supp. at 965. See, e.g., Realnetworks, 641 F. Supp. 2d at 942
25 (any limited “fair use” exception does not apply to manufacturers or traffickers of the
circumvention devices); 321 Studios, 307 F. Supp. 2d at 1097 (“the downstream uses of the
26 software by the customers of [defendant], whether legal or illegal, are not relevant to
determining whether [defendant] itself is violating the statute.”); Universal City Studios v.
27 Reimerdes, 111 F. Supp. 2d 294, 318 (S.D.N.Y. 2000).
28
15 To prove a violation under 18 U.S.C. § 1030(a)(5)(B) and (C), SCEA must show that
16 Defendants “intentionally accessed a protected computer without authorization, and, as a
17 result of such conduct, recklessly causes damage” or “recklessly causes damage or loss.”
18 As established above, Defendants intentionally accessed the PS3 System without SCEA’s
19 authorization. There is no doubt that Defendants’ unlawful access of the PS3 Systems has
20 caused and will continue to cause great damage and loss to SCEA unless enjoined. Russell
21 Decl. at ¶10. By accessing the PS3 Systems, Defendants have impaired the TPMs in the
22 PS3 Systems, which protect fundamental levels of the PS3 System, and they are illegally
23 running unauthorized software at those levels. Mogilefsky Decl. at ¶¶23-24. See Black &
24 Decker (US), Inc. v. Smith, 568 F. Supp. 2d 929, 937 (W.D. Tenn. 2008) (“intentionally
25 rendering a computer system less secure should be considered ‘damage” even when no
26 data, program or system is damaged or destroyed.”). Unless Defendants are enjoined,
27 SCEA will continue to sustain great loss, including lost video game software sales for SCEA
28 and other game publishers, as a result of Defendants’ unauthorized access to the PS3
24 PS3 System allow copyright infringement to occur unchecked. Unless Defendants are
25 enjoined, SCEA will be irreparably harmed. See e.g., Universal City Studios, Inc. v.
26 Reimerdes, 82 F. Supp. 2d 211, 215 (S.D.N.Y. 2000) (technology that circumvents copy
27
28
23 10
There is a split of authority among the courts in the Northern District of California on
whether a presumption of irreparable harm based on likelihood of success on the merits in
24 copyright actions exists after the U.S. Supreme Court’s decision in Winter v. Natural Res.
Def. Council, Inc., 129 S. Ct. 365, 374 (2008). Realnetworks, Inc. v. DVD Copy Control
25 Ass’n, Inc.,555 U.S. 7, 641 F. Supp. 2d 913, 953 (N.D. Cal. 2009) (recognizing presumption
of irreparable harm in copyright infringement case). But see Jacobsen v. Katzer, 609 F.
26 Supp. 2d. 925, 936 (N.D. Cal. 2009) (rejecting any presumption of irreparable harm in
copyright cases). However, even if irreparable injury is not presumed, SCEA has established
27 such harm.
28
7 Nintendo of America, Inc. v. Bung Enterprises, Ltd., 1999 U.S. Dist. LEXIS 23588 at *36,
8 1999 WL 34975007, *13 (emphasis added). Unless enjoined, the proliferation of PS3 video
9 game piracy will irreparably harm SCEA by: (1) undermining SCEA’s monumental investment
10 in the PS3 System; (2) eliminating SCEA’s control over distribution of its copyrighted works;
11 (3) harming SCEA’s reputation with third party game developers; and (4) diminishing the
12 sales of legitimate PS3 video games by SCEA and its authorized retailers. Russell Decl. at
13 ¶¶10-12.
14 SCEA’s affiliates invested hundreds of millions of dollars developing the PS3 System,
15 including the PS3 System’s security measures. Id. at ¶12. The widespread distribution of
16 devices that disable or circumvent these measures, however, eradicates the investment in
17 the technology and undermines the values that these TPMs are meant to preserve. Id.
18 Primary among these values is SCEA’s ability to control distribution of its copyrighted video
19 games, as well as those video games owned by third party licensees. Id. For each new
20 consumer that gains access to Defendants’ circumvention devices, SCEA loses the ability to
21 prevent that consumer from copying and playing copied SCEA-copyrighted video games. Id.
22 Once these devices are in the hands of consumers, the loss of control over SCEA’s
23 copyrighted material is permanent and irreparable. Id. Equally serious is the damage to
24 SCEA’s reputation and goodwill with third party game developers, whose own copyrighted
25 video games are pirated for use with the PS3 System as well. Id. All of this piracy adds up
26 ultimately to lost sales for SCEA and other video game publishers as an enormous number of
27 consumers naturally prefer free copies of video games over spending money to purchase the
28 originals. Id.
8 SCEA has complied fully with Fed. R. Civ. P. 65, Local Rules 65-1 and 7-10 for
9 issuance of an ex parte TRO and an Order to Show Cause why a preliminary injunction
10 should not issue. SCEA has submitted declarations and other evidence showing that it will
11 be irreparably harmed without an Order restraining Defendants from any further distribution
12 of Circumvention Devices. SCEA has submitted the required documentation in compliance
13 with Local Rule 65-1(a). Bricker Decl. at ¶32.
14 Fed. R. Civ. P. 65 (c) provides that a bond be posted “in an amount that the court
15 considers proper to pay the costs and damages sustained by any party found to have been
16 wrongfully enjoined or restrained.” A bond “may not be required, or may be minimal, when
17 the harm to the enjoined party is slight or where the movant has demonstrated a likelihood of
18 success.” Ticketmaster L.L.C. v. RMG Techs., Inc., 507 F. Supp. 2d 1096, 1116 (C.D. Cal.
19 2007); see also Connecticut Gen. Life Ins. Co. v. New Images of Beverly Hills, 321 F.3d 878,
20 882 (9th Cir. 2003) (“bond amount may be zero if there is no evidence the party will suffer
21 damages from the injunction.”); YourNetDating, LLC, 88 F. Supp. 2d at 872 (no bond
22 required for TRO against hacker who violated the CFAA). Here, there is virtually no prospect
23 that any of Defendants’ legitimate interests would be impinged by an order requiring them to
24 cease distribution of the Circumvention Devices. However, if the Court requires that a bond
25 be posted, SCEA submits that the bond should not exceed $5,000 since that amount is more
26 than sufficient to account for the unlikely possibility that Defendants would be “wrongfully
27 enjoined or restrained,” from distributing the Circumvention Devices. Fed. R. Civ. P. 65 (c)
28
24
25 11
Section 503(a) of the Copyright Act also provides that “at any time while an action under
this title is pending, the court may order the impounding, on such terms as it may deem
26 reasonable, of all copies. . . . claimed to have been made or used in violation of the copyright
owner’s exclusive rights. . .or other articles by means of which such copies. . . may be
27 reproduced.”
28
25 By:
JAMES G. GILLILAND, JR.
26
Attorneys for Plaintiff
27 SONY COMPUTER ENTERTAINMENT AMERICA LLC
28
63092926 v1
PLAINTIFF'S EX PARTE MOTION FOR TEMPORARY RESTRAINING ORDER; ORDER OF IMPOUNDMENT 25
Case No. ______________________