Sony Computer Entertainment America LLC v. Hotz et al

Filing 94

Letter from [Joint] Plaintiff SCEA and Defendant George Hotz re Proposed Order for March 10, 2011 Hearing. (Attachments: # 1 Exhibit 1, # 2 Exhibit 2, # 3 Exhibit 3, # 4 Exhibit 4, # 5 Exhibit 5, # 6 Exhibit 6, # 7 Exhibit 7, # 8 Exhibit 8, # 9 Exhibit 9, # 10 Exhibit A)(Smith, Mehrnaz) (Filed on 3/14/2011)

Download PDF
Sony Computer Entertainment America LLC v. Hotz et al Doc. 94 Att. 1 EXHIBIT 1 Dockets.Justia.com 1 KILPATRICK TOWNSEND & STOCKTON LLP JAMES G. GILLILAND, JR. (State Bar No.1 07988) 2 TIMOTHY R. CAHN (State Bar No. 162136) MEHRNAZ BOROUMAND SMITH (State Bar No. 197271) 3 HOLLY GAUDREAU (State Bar No. 209114) RYAN BRICKER (State Bar No. 269100) 4 Two Embarcadero Center Eighth Floor San Francisco, CA 94111 5 Telephone: (415) 576-0200 Facsimile: (415) 576-0300 6 Email: jgilliland~kilpatricktownsend.com tcahn~kilpatricktownsend. com 7 mboroumand~kilpatricktownsend.com hgaud reau~kilpatricktownsend. com 8 rbricker~kilpatricktownsend.com 9 Attorneys for Plaintiff SONY COMPUTER ENTERTAINMENT AMERICA LLC 10 11 UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF CALIFORNIA SAN FRANCISCO DIVISION Case No. 11-cv-00167 SI (PROPOSED) ORDER RE MARCH 10, 2011 TELEPHONIC HEARING RE JOINT LETTER ON IMPOUNDMENT ISSUES AND JOINT LETTER ON DISCOVERY 12 13 14 SONY COMPUTER ENTERTAINMENT AMERICA LLC, 15 Plaintiff, 16 v. 17 GEORGE HOTZ; HECTOR MARTIN 18 CANTERO; SVEN PETER; and DOES 1 through 100, 19 Defendants. 20 21 22 23 On March 10,2011, the Court held a hearing on the parties' February 18, 2011 and 24 February 28, 2011 joint letters (Docket Nos. 85 and 86) on discovery and impoundment 25 disputes. Having considered all the papers and arguments, the Court enters the following 26 order: 27 (1) Plaintiff SCEA is authorized to serve third party PayPal, Inc. with a subpoena 28 seeking the following limited information relating to personal jurisdiction: documents sufficient (PROPOSEDj ORDER RE MARCH 10,2011 TELEPHONIC HEARING - 1 - CASE NO. 11-cv-00167 SI 1 to identify the source of funds in California that went into any PayPal account associated with 2 geohot~gmail.com for the period of January 1, 2009 to February 1, 2011. SCEA is ordered 3 to redraft its subpoena to seek this information. SCEA is further ordered to inform PayPal, 4 Inc. and other subpoenaed parties that any information produced in response to the 5 subpoena shall be provided on an Attorneys' Eyes Only basis and that the issuance of the 6 subpoena is without prejudice to its right to file a Motion to Quash. (See Docket No. 92) 7 (2) Mr. Hotz is ordered to sign a consent for SCEA to obtain his Twitter posts from 8 January 1, 2009 to the present. 9 (3) Defendant George Hotz is ordered to appear in California for a deposition 10 relating solely to the question of personal jurisdiction. SCEA shall pay reasonable expenses 11 of Mr. Hotz to be deposed in California. The parties shall determine the date of the 12 deposition. Additionally, the parties have stipulated that Mr. Hotz cannot be served with 13 process by the parties to this action or the parties identified in SCEA's Certification of 14 Interested Entities or Person (Docket No. 16) when he appears at his personal jurisdiction 15 deposition in California. 16 (4) With regard to the impoundment, the Court orders that: 17 18 (a) The Intelligence Group ("TIG"), the third party neutral chosen by both parties, shall only take steps with regard to the impounded devices that are authorized by 19 Court order. (b) The first $7000 of TIG costs will be split equally between SCEA and Mr. Hotz. 20 21 SCEA has agreed to and shall pay any amount over the $7000. 22 (c) TIG is ordered to conduct the impoundment in the forensically sound manner as proposed in its Certification of February 27, 2011, including Exhibit A to that 23 24 25 26 27 28 certification. Attached hereto as Exhibit 1 is a true and correct copy of the February 27, 2011 Certification and Exhibit A. (d) Judge Illston's modified impoundment order requires the isolation, segregation and/or removal of information related to Defendant Hotz's circumvention of the technological protection measures in the PS3 System. The Court orders the (PROPOSEDj ORDER RE MARCH 10, 2011 TELEPHONIC HEARING CASE NO. 11-cv-00167 SI -2- 1 parties and TIG to meet and confer regarding what exactly is information related 2 3 to the circumvention of the technological protection measures in the PS3 System and a procedure to isolate, segregate and remove such information. The parties shall submit a description of the protocol to the Court for entry into an order by no later than March 28, 2011. (5) 4 5 6 With regard to jurisdictional discovery of the impounded devices, the Court 7 orders that: 8 (a) In order to avoid conducting discovery searches on original impounded devices 9 belonging to Mr. Hotz, TIG shall make an additional copy of both the encrypted and 10 unencrypted versions of the impounded hard drives and keep them in their 11 possession. 12 (b) TIG shall then conduct a forensically sound search of the impounded devices to 13 determine whether: (i) they contain all or portions of the development tools for the 14 PlayStation 3 System and (ii) the impounded devices have been used to access or 15 connect to the PlayStation Network. The Court orders the parties and TIG to meet 16 and confer on a protocol for TIG to perform these searches. The parties shall 17 submit a description of the protocol to the Court for entry into an order by no later 18 than March 16,2011. 19 (6) The parties shall enter a Stipulated Protective Order for all discovery matters. 20 To the extent the parties are unable to agree on the terms, they are ordered to file a joint 21 letter no longer than 10 pages to set forth the disputed terms and the parties' respective 22 positions. 23 24 IT IS SO ORDERED. 25 26 27 DATED: HON. JOSEPH C. SPERO UNITED STATES MAGISTRATE JUDGE 63207604 vi (PROPOSEDj ORDER RE MARCH 10, 2011 TELEPHONIC HEARING CASE NO. 11-cv-00167 SI 28 -3- EXHIBIT 1 '\ CERTIFICATION OIt' MICHAEL GREl'"NIER, C.FCE, EnCE 1 Michael Grennier, CFCE EnCE, of full age anù duly sworn, does hereby state as follows: I . On Februar 26th, 2011, .I lOl'¥ardcd the certification per both parties reqiiest and according to the conference calt of both parties held on Februry 251/', 2011. (See attac11ed as Exhibit A). 2. Steward Kellar, Es., Defense counsel representing Mr. George Hotz, agreed to the process listed in the attached certification, as long as the bit-stream image of the drive was wiped after the searching processes were completed. He would not agree. however to begin the process on Monday, February 28, 2011, where Mr. Hotz would provide unencrypted access to The Intellgence (')TOUP for purposes of creating an unencrypted bit-stream copy of his clients hard drives, believing that a motion would be fied in order for Plainti to maintain a preserved copy for discovery purposes. Mr. Hotz clearly stated tbat his client would never agree to ANY copy being created, which could be .retaned for puroses other fuan the impoundment order and the processes mentioned in my fir.st certification. 3. After sending my requested certification to both partes, i was advised that Mr. Hot? will not agree to any hit-stram copies of the hard drives. It was further proposed by Defèndants counsel that we use Mr. Hotz'g computer and operating system to conduct the seaches and securely delete the data. 4. According to the Cyber Security Institute, Computer Forensics is defined at the preservation, identiJ'ication, extraction, interpretation, and documentation of computer evidence, to include the rules of evidence, legal processes, integrity of evidence, factual reporting of the information tound, and providing expert opinion in a court of law or other legal and/or admistrative proceeding as to what W09 found. In hiisíc terrmi, Computer lunmsics is a science Second Certification Sony V Hotz2l27 /2011 Pagel in which fai:l bai;ed results of an cxamim;rs findings should achieve the same result of any oih~r computer forensic examiner. The use of standards and controls in scientific experiments is a fundamental axiom ofthe scientific method. No experiment can be considered "scientific" unless they are used to ensure reliable results. An important consideration is the nature of the scientific experiment itself a') it may require the use of multiple stadards and controls. Likewise, this axiom holds true in forensic science. A scientific experiment is a controlled experiment. Variahles are intentionally introduced or changed one at a time and the results .monitored. Physical evidence is analyzed using methods and procedures that have previously been verified or valídated with the use of appropriate stadards and controls. Therefore, all forensic science disciplines must document in their methods and procedures specific stadards an.d controls. They must be used when analyzing physical evidence as a memis to demonstrate that scientific principles and quality assuruce practices were followed. Their use wil also e;iisure that the methods, procedures, and instrumentation are f\ctionig correctly, and that the results obtaied are accurte, reliable, and repeatable. 1 For these reasns, we maintain a computer forensics lab where I test our hardware and softare to ensure that they are work properly and use only software and hardware which is known to me and my lab personnel. In order for TIG to isolate, segregate and/or remove the information on those devices related to Defendant's circumvention devices, I recommend these standard principles to be applied. 5. BaSed upon the above explanations, it would be completely improper for The Intelligence Group to lise a client's computer for anything other than makng a bit-stream image of the hard drive. TIG's recommended procedures are: 1 ;rohnJ. Barbara _ Autlior. deneral Editor fbi the "Handbook of Digital & Multiedia IMdence".!!'!fuli.tL!? J:f.lll!)j!na Pr= in 2007Pu,ql1~ti~il.9ll.E()ri"'3"iL' J...('tm'il1~ (lJ.t12:/.iwww.foi.ci\skmali.cOi\Ù - Coniputer POJ"enic!l S\;indurds and Controls Second Certificati.oIl Sony V Hotz 2/27/2011 Page 2 a. Photograph and document the hardware and remove the hard drive. b. Create a bit-stream image using a hardware device or software created and tested for thispmpose in our lab. In this case, where the drives are encrypted we may need to boot the OS and then create the bit-stream image (using our software) using what is temicd a "Iìve acquisition". The bit-steam image is placed on a hard drive purchased by TIG, wiped and Iormatted in our lab prior to starng the image procedure. This way 'we know that the hard drive is working and blan prior to staing. The Intellgence Group maintains control of the imaging process by entering all commands, passwords durg this process. c. We then create a backup copy ofthe bit-stream image on a second drive to be used in the event that the onginallab drive malfunctions. d. We then .connect the lab drive containing the biHtream image to one of our lab computers, where we know the operating system and programs that have been instaled. All our forensic processes work with the bit-stream image, but do not change that image in any way. All the results and information from the processes are stored in a separate directory on the same drive. To restate, the bit-stream copy we star with is not changed in any manner. durng any of our forensic processes. e, We thenrn some pre-processes, which is a computer automated search for fies that have been deleted and expand compressed files into different evidence files. Compressed files such as ZIP, docx, and ta are :fles which li~w be'òu tompr"'~Lied Lv lJUW liPU\:1l un the hurd drive. 'Tm¡o fioH need to be : . _.~ ..'_ø ,", .j ..._.... '. __ aç 9' "" . ..~_L Page Second Certification Sony V Hotz 2i27/2011 3 expanded so that we can conduct searches of their contents. We also search for files and folders which are password protected. 6. In thh case, we have been provided with two hard drves and a calculator. The hard drives, according to Mr. Ho~ are encryted. When an encrypted drive is provided our procedure would .be to create a bit-stream copy of the had drives prior to any other actions or imaging and then create a duplicate of each drive to be utilzed tor the un-encryption step. This ensures that we always have an "original" bit-stream image of the drives. 7. It is importnt to explain that a bit-stream image of the hard drive represents a snap shot in time of exactly what was on that hard drive at the time the image was created. This bit-stream image is normally created by a Computer Forensic firm or e-discovery tìrm when looking for deleted data or providing discovery. However The Intelligence Group was not tasked with providing discovery requests or preservation of data with the exception of documenting and maintaining a copy of any circumvention devices related to a Sony PS3 on the hard drives. 8. The hitellgence Group is only tasked wìth finding specific data, copying that data into an evidence file and then deleting it from the onginal hard dnve and returg that drve the Mr. Hotz.. Nothng in the order states that we need to maintain a copy of the entire hard dnve for discovery or future processing of evidence. During our conference calls Mi, Hotz;s attorney ha stated several times that there is no reason to keep the bit-stream image of the had drive as his client is fully capable of maintaining the computer as required in the discovery order. In addition, 'I1e Intellgence Group has offered to hold either hold in our evidence an encrypted copy of the bit-steam imae or allow Mr. Hotz's attorney to secure 'ts copy of the had drive in his offce as long a.,, wmild nul ullow 1ù:; c1icni access to that drhre. Siiii:ei Mr. Hotz's atturney Second CertifcÐ.tíon Sony V Botz 2/27/2011 Page 4 has clearly stated that his client is capable of keeping the original hard drive in a manner that does not violate the discovery order, it seemed to me to out of my jurisdiction since I was not tasked with any discovery issues beyond the documentation and storage of circumvention devices related to a Sony PS3. 9. As our role is to be neutral, we had the paries agree to the creating ofa bit-stream image after the origina drives were placed in the original computer and allowing Mr. Hotz to enter the password so thai it would not be known to any pary. We would then nu the proper processes on out bit'-stream image in our lab, create the appropriate copies of the data relating to a circumvention Devices related to a PS3 and finally delete that data off the original hard drive. Onc.e completed we would wipe our bit-stream image ofile hard drive. Mr. Hotz's attorney was agreeable to the process but could not allow us to sta because a motion was going to be filed requiring The Intelligence Group to preserve the bit-stream image and he knew ilat Mr. Hotz would not provide his password if any copies were going to be maintained. 10. On Februar 25i1, 2011, we were advised that Mr. Hotz wìl not agee to allow us to creating any bit-stream image and in addition, we must use his computer for searchig and processing. 1 i. For this forensic examination, I need to confirm that the hard drive does not contain any password protected files. In addition, i need to expand compressed fies in order to conduct searches for the circumvention devices related to a PS3. Both of these processes will resut in the alteration of data on the original hard drive and even overwrite data that has been previously deleted if ran on the original hard drive. My actions would cause changes and destrction of data to the origial had dnve. Sci.nd Certification Sony VHotz 2/27/2011 PageS 12. While we have been told that Mr. Hotz used Linux as the Operating system, I do not how the operating system has been contìgured, changed or modified. 1 furthennore do not have any prior knowledge of any traps that may be on the system. While 1 believe Mr. Hotz to be an honest person and have no reason to suspect that he has made any changes, I 'Will be held accountable if such changes occur. Therefore I am required to assume that all operating systems contain traps and hence must use my lab computers for processing. As an example in one of my forensic classes taught by the White Collar Cnme Center, 1 was able to change the operating syste:r so that when a user typed in the command "copy" it was understood by the system as "format". When any user typed in "Copy C: D:" (which would copy.fies from dnve C to D), the they operating system actually ran '~Fonnat C:" in such a manner that it would not ask the user if were sure that they wanted to format the hard drive. Formating a hard dnve overwite." at least the first twenty percent of a 20GB bard drive and removes all files and folders. 13. Therefore, i cannat conduct the searches using .the suspect's computer system. and operating system. In a perfect world, 1 would 'have the complete computer system with the copies of the onginal hard drives installed along with the password so that I could un-encryted the drive. However in .this case, Mr. Hotz only provided the hard drives, not the computer system and reses to provide any passwords. Without the origin computer system and/or password it is very doubtfl that 1 can un-encrypt the hard drive and proceed as .indicated in the cour order. I would have been able to proceed with just the hard drives if they were not encrypted. 14. According to Defense counsel, Mr. Hotz is only willng to bnng his computer to he can enter the password and TIG will NOT m.e a copy of our location if the hard dove. Mr. HOt7., "'''11 the.n point out tOLl that arc circumvention devices related to a PS3 uid then l.Upy Second Certification Sony V Hotz 2/27/2011. lage6 them off to another drive. Lastly, we must use his computer system and operating system and special tools he has to delete that data off of his hard drive. According to the court order, both pares did agree to have an independent third party conducts tbe tasks of locatig, isolating, segregating and/or removing the information related to Circumvention Devices specific to the Sony PS3 console. In order to accomplish these tasks, TIG will need access to the data, the password and original computer and work in our tested, verified and secure environment. 15. If TIG is not allowed by Mr. Hotz to create a bit-stream image of the hard drive and I am required to use his computer tor processing, I will be unable to testify in court that my searches were conducted properly and completely. 16. 1 am available to testify in person or by phone as requested by either pary or the cour. I hereby ccrtifythat tle foregoing statements made by me are tre. I am aware the if any of the foregoing statements made by me are willfully false, I .aI subject to punishment. By: Michael Grennier, CFCE. EnCE iJ¿JiL--- Dated: c2 I). Î! :L C( Second Certification Sony V Hotz 2/27/2011 Page 7 EXHIBIT A. CERTIFICAITON of Michael Grennier Second Certification Sony V Hotz 2/27/2011 Page 8 CERTIFICATION OF MICHAL GRENNIER, CFCE, EnCE I Michael Grennier, CFCE EnCE, offì.l1 age and duly sworn, does hereby state as follows: 1. i. am the Director of Forensics and Security at The Intelligence Group (TIG), 1545 Route 206, Bedminster, NJ 07921. I have been employed with TIG since January 2008. 2. Prior to my tenure at TIG, I was employed by a computer forensic tìrm in Princeton, NJ. I stared in May 2005 as a Senior Forensic Examiner. Prior to that, 1 retired as a Police Captain with twenty-five (25) year of service at the South Plainfeld Police Departent in NJ. Prior to my retirement I had the additional l'esponsibility of maintaining the local governent's computer network. As a Police Officer, I worked as a computer forensic examiner on cases involving fraud, theft, and internal aílairs, investigations, as well as murder, rape, and child pornography. I have received traiing from Guidance Software, The National White Collar Crime Center and the International Association of Computers Investigative Specialists (IACIS) which include Certified Forensic Computer Examiner (CFCE), Electronic Evidence Collection Specialist (CRECS) and EnCase Certified Examiner (EnCE), Access Data, and Dan Mares Inc. I hold both a Certified Forensic Computer Examner (eFCE) with .lAClS and Encase Certified Examiner (EnCE) certification from Guidance Software. Over the past 12 months I have conducted well over eighty (80) digital fòrensic examinations. 3. TIG is a digital forensics fi servicing its client's needs in systematically identifying, preserving, extracting, analyzing, and interpeting digita evidence. The finn can uncover e-mail communcations, account information, fie copying, attempted data destruction, account usage, and other activities performed on computers. 4. tIG has asisted clients in a wide variety of lawsuits, raging from cases involving fraud, intellectual propert theft wroiigIì.l termination, forgery, matrimonial disputes initial Certifcation Sony V Hotz 2/26/2011 Pagel including child custody and other matters that involve electronically stored intòrmation. TIG complies with all computer forensics standards as set fort by the U.S. Federal Bureau of Investigation (FBI) and Guidance Software's Incident Response Forensic Analysis and Discovery (JRF AD) program. The forensic technicians and examiners at TlG employ a number of digital forensc software packages and analysis technques which include, but ar not limted to Guidance Softares EnCase, Access Data's FTK (Forensic Toolkit) and Paraben Software's E-Mail Examner to complete a comprehensive search of both active and deleted :files, as well as to provide an unbiased report of the res1.ts. These softvl'are products are also utilized by the law enforceinerit communty worldwide. Extensive coursework in the digital forensics field along with. hands-on, prodnct-specific training is necessar in order to use these products correctly. Additionally, specialized knowledge and training in chain of custody and evidence handling procedures in the field of digital forensics is necessar in order to perform imagig and analysis up to indllst and legal stadards Tl G' s 5. Forensic examinations are never conducted on an original media, device or drve. TIG does not turn on a suspect computer and then search it the way a person sittg in front of the computer might attempt. Our forensic examinations are always undertaken using a "hit- strea" copy. A bit-stream is a copy oflle hard drve that captures every bit and byte of data without regard to programs or applications. 6. The Defendat has agreed to bring the same computer which contaned and worked with the hard drives that he provided to TIG so that they could be held in evidence as specified in the court order. The importce of this deals with the encrypted hard drives and the operation system drivers which must match the computer hardware for the bootíngprocess to successfully occur. Initial Certifi.cation Sony V Hotz 2/26/2011 Page 2 7. In this case, the defendant has represented the hard drives contain a Linux based File and Operating System which he has encrypted by the username and password. In order for the computer to hoot and provide TlG access, the defendant will need to either provide TIG the encryption password or enter the password during the boot process. Once the proper password is entered, the data from the hard drive passes to the operating system as unencryted data. As previously mentioned, the stadard procedure would be to create a "bi.t.stream" image of the hard drive at this time in order for 110 to cost effectively isolate, segregate and/or remove the .infonnation on thòse devices related to Defendant's circumvention devices. For ths process to continue, TIG requires a bit-stream image that is verified. For ths case, the veriticatíon process checks the MD5 hash value ofthe bit-stream image file to ensure that the data is intact. Whie it is extremely unlikely that the verification process fails, it does occur in a small percentage of image creations (less tha 5%) and requires the process has to be restaed. If the Defendant chooses to enter the password rather than provide that password to TIG, he will, be required to slay on~site until the process iias been completed and verified because that password may be needed again in the event his computer crashes dunng thi.s process. 8. Based upon the requested effort, 'fIG wil need to search for and "retrieve" any the hard Circumvention Devicesorrelated information which may include the following areas of drives such as; a. Active files b. Deleted fies (unallocated space) c. Slack space (the area between the end of the file and the star of the next cluster or sector) d. Compressed files including but not limited to TAR, ZIP, TZ etc Initial Certification Sony V Hotz 2/26/2011 Page 3 e. Password protected files or areas ofthe hard dnve 9. In order to properly conduct the searches and as the rules of evidence provide tor, a forensic examiner must be in control of the environment in which the examnation is to occur. They must use tàniliar hardware and softare which has been tested and validated. Failure to use properly tested equipment may allow changes to occur to the data and therefore may alter the results. For this reason, the Defendants had drives can bensed to create the bitstream image only and it should not be used for keyword searches and processing of data. 10. The above explanations were reviewed on a conference call with attorneys and the following protocols were agreed to as stipulated: a. The Detendant shall bring his computer to TIG offces for the purposes of unencrypting the hard drives. b. Once the hard drives are installed, the Defendant wil enter his password which "unen(,'rpts the hard drves. c. TIG wiU be allowed to create a bit-stream image of the hard drive tor purposes of locating, jsolating, segregating and/or removing the information related to Circumvention Devices specific to the Sony 1'$3 console.. d. After completion of the bit-stream image, the Defendant prior to leaving the offices of TIG, wil show 11G the Circumvention Devices and .related fies specific to the Sony PS3 console so that a file listing can be created. e. In addition, the Defendant wil identify any and aU of the following items: 1. Any files, folders or data areas that are encrypted or require a password. Examples would include but not be limited to truecryt, zip, orrar W." Initial Certification Sony V Hatz 2/26/2011 Page 4 II. Identify if he used or accessed or modified any of the following drve areas ; 1. volume slack 2. Master Boot Record f Superblock 3. Parition table 4. Hosted Protected Area 5. Drive Configution Overlay 6.Partítion slack 7. Sectors or blocks marked as Bad but used to store data 8. Disk slack 9. Unused space in the block group i O. Directory entries :t The original hard drive wil remain in evidence until the Circumvention Devices and related data bas been removed. g. TIO wìl use po.rtons of data from the Circumvention Devices relating to a SonyPS3 console to search for these devices and/or additional references of circumvention devices across the entire hard drve space. h. Any Circumvention Devices relating to a Sony PS3 wí1 be documented and stored in a separate evidence fie on a hard drive that TIG provides for ths purpose. I. Any code which is questionable as being a Circumvention Device relating to a Sony PS3 console wil be reviewed by a TIG sub-contractor that has no conficts to Sony Corporation. If after this review the code appears to be a Initial Certifcation Sony V Hotz 2/26/2011 PageS Circumvention Device relating to a Sony PS3 Console, the code v.ill be sent to Mr. Hotz's attorney. Mr. Hotz's attorney wil always maintain possession of the code and not allow it to be copied or transferred in any manner. Mr. Hotz is being provided the code so that he can show the code to his client and determine if they want to object to the code being designated as a Circumvention Device. Any objections after a second review by TIG wil be brought before th,e Judge in-camera for the purose of inaking a final deterniination. J. Once the process of locatig the Circumvention Devices relating to a Sony PS3 console have been completed, TIG shall remove the identified data from the original hard drves of Mr. Botz. k. Once the identified data has been properly removed from the original hard drives, they shall be. returned to Mr. Hotz. .once the process of removing the data from Mr. Hotz's hard drves has been completed tl¡e bit-streani image of the hard drive shall be wiped. This process wil remove all data from that hard drive. . I hereby certify that the foregoing statements made by me are tre. I am aware the if any of the foregoing statements made by me are wílfuUy false, I am subject to punishment. BY'~. Michael Grennier, CFCE, EnCE D"oo J-FCt (,?l/ Initial Certifcation Sony V Hotz 2/26/2011 Page 6

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?