Sony demands permission to clone geohot's hard drives, the fight continues

These days Sony is fighting on many fronts against hackers and although the other days it was announced that Sony would ask the German police to search their a hacker's house, now the company goes further and asks permission to clone geohot's hard drives. A few weeks ago geohot was forced to give his hard drives to a company to analyze the data on them, without Sony being able to take anything from there, but the company does not give up so easily and WANTS to make 2 copies of the confiscated hard disks. Geohot's lawyers claim that Sony has no right to do this for now, but you can imagine for yourself that Sony will not give up so easily.

I don't know how far the people from Sony are willing to go, but they are probably also aware of the fact that it is impossible to remove from the Internet all the copies with exploits for the PlayStation 3. From what I can see, their strategy is not to block the spread of those copies but to attack the sources that discovered the exploits and scare the hackers who are still working on discovering other exploits.

"SCEA is not entitled to inspect the impounded drives under the impoundment order, nor is it allowed to create and preserve additional copies of the impounded drives, but this is precisely what it seeks to do."

Sony's response is to ask the judge to order Hotz to comply with TIG's request.

For the foregoing reasons, SCEA requests that the Court order that Mr. Hotz comply with TIG's recommended impoundment protocols and that those protocols be supplemented to ensure that preservation requirements are met as follows:

(1) TIG create and preserve two forensically sound images (eg, bit stream images) of each impounded storage device in its encrypted form: One to be maintained by TIG in a secure vault for preservation purposes and the second to be used for decryption and /or any other necessary analysis by TIG;

(2) TIG create and preserve two forensically sound images (eg, bit stream images) of each impounded storage device in its un-encrypted form. One to be maintained by TIG in a secure vault for preservation
purposes and the second to be used for TIG's necessary analysis; and

(3) TIG maintains and preserves all of the forensically created images for the duration of the lawsuit.

SCEA further requests that the Court order Mr. Hotz to: (a) provide TIG with the tools and keys necessary to decrypt the impounded storage devices and the keys and passwords necessary to decrypt or unlock any protected files contained on the impounded storage devices;

(b) identify for TIG all virtual machines or hard disks stored or at any time run on the impounded storage devices.3 Furthermore, to verify compliance with the impoundment order, SCEA requests that the Court order Mr. Hotz to provide a declaration setting forth : (i) verification that all storage devices on which any circumvention devices or any information relating to Mr. Hotz's circumvention of the technological protection measures in the PS3 System are stored have been delivered to TIG; (ii) why the storage device used by Mr. Hotz in the January 7, 2011 YouTube video entitled "Jailbroken PS3 3.55 with Homebrew" was not delivered to TIG for impoundment; and (iii) the identity of any remote storage of the circumvention devices or any information relating to Mr. Hotz's circumvention of the technological protection measures in the PS3 System.4 Finally, SCEA seeks fees and costs in relation to this motion.