throbber
Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 1 of 22 Page ID
`#:15692
`
`
`EVAN FINKEL (SBN 100673)
`evan.finkel@pillsburylaw.com
`MICHAEL S. HORIKAWA (SBN 267014)
`michael.horikawa@pillsburylaw.com
`CHAZ M. HALES (SBN 324321)
`chaz.hales@pillsburylaw.com
`CHLOE STEPNEY (SBN 334013)
`chloe.stepney@pillsburylaw.com
`PILLSBURY WINTHROP SHAW PITTMAN LLP
`725 South Figueroa Street, 36th Floor
`Los Angeles, CA 90017p
`Telephone: 213.488.7100
`Facsimile: 213.629.1033
`
`CALLIE A. BJURSTROM (SBN 137816)
`callie.bjurstrom@pillsburylaw.com
`MICHELLE A. HERRERA (SBN 209842)
`michelle.herrera@pillsburylaw.com
`PILLSBURY WINTHROP SHAW PITTMAN LLP
`11682 El Camino Real, Suite 200
`San Diego, CA 92130
`Telephone: 858.509.4000
`Facsimile: 619.819.4363
`
`[Additional counsel listed on last page]
`
`Attorneys for Plaintiff
`MICROVENTION, INC.
`
`UNITED STATES DISTRICT COURT
`CENTRAL DISTRICT OF CALIFORNIA
`
`
`MICROVENTION, INC., a Delaware
`corporation,
`
`
`Plaintiff,
`
`
`
`vs.
`BALT USA, LLC, a Delaware Limited
`Liability Company; DAVID FERRERA;
`NGUYEN “JAKE” LE; YOSHITAKA
`KATAYAMA; STEPHANIE GONG;
`AND MICHELLE TRAN,
`
`Defendants.
`
`Case No. 8:20-cv-02400-JLS-KES
`
`MICROVENTION, INC.’S REPLY
`BRIEF IN SUPPORT OF ITS
`MOTION FOR SANCTIONS
`AGAINST DEFENDANT BALT
`USA, LLC FOR EVIDENCE
`SPOLIATION
`Date: May 5, 2023
`Time: 10:30 a.m.
`Courtroom: 8A
`
`Pre-Trial Conf.: August 4, 2023
`Trial: To be Set
`Hon. Josephine L. Staton
`
`4856-0414-6270.v7
`
`
`
`
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 2 of 22 Page ID
`#:15693
`
`
`TABLE OF CONTENTS
`
`
`
`I. 
`II. 
`
`B. 
`
`Page
`INTRODUCTION ...................................................................................... 1 
`REPLY ARGUMENT ................................................................................ 2 
`A. 
`Balt’s False Representation Regarding Encryption Keys Caused
`the Destruction of Evidence on the Tran and Katayama Laptops ... 2 
`Balt’s False Representation to Stroz is an Affirmative Act That
`Caused the Data Loss ....................................................................... 4 
`Stroz Was Not Responsible for Managing Balt’s Encryption Keys 7 
`Balt’s Expert Is Wrong About What Triggers BitLocker Recovery 9 
`Balt’s Efforts to Search for the Encryption Keys Were Abysmal . 11 
`The Evidence Balt Destroyed is the Data Residing on the Tran and
`Katayama Laptops, Not the Encryption Keys Within Them ......... 14 
`The Court Has Inherent Power to Fashion Appropriate Sanctions
`for Evidence Spoliation .................................................................. 16 
`III.  CONCLUSION ........................................................................................ 18 
`
`
`
`
`C. 
`D. 
`E. 
`F. 
`
`G. 
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`4856-0414-6270.v7
`
`
`
`-i-
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 3 of 22 Page ID
`#:15694
`
`
`TABLE OF AUTHORITIES
`
`Cases
`
` Page(s)
`
`America Unites for Kids v. Rousseau,
`985 F.3d 1075 (9th Cir. 2021). (Op. Br. 12:19–25.) .......................................... 16
`Apple Inc. v. Samsung Elecs. Co.,
`881 F. Supp. 2d 1132 (N.D. Cal. 2012) ................................................................ 4
`Aramark Mgmt., LLC v. Borgquist,
`2021 WL 864067 (C.D. Cal. Jan. 27, 2021) ....................................................... 15
`Farella v. City of New York,
`2007 WL 193867 (S.D.N.Y. Jan. 25, 2007) ....................................................... 14
`In re Google Play Store Antitrust Litig.,
`2023 WL 2673109 (N.D. Cal. Mar. 28, 2023) ................................................. 6, 8
`Hamilton v. Signature Flight Support Corp.,
`2005 WL 3481423 (N.D. Cal. Dec. 20, 2005) ................................................... 16
`Nat’l Ass’n of Radiation Survivors v. Turnage,
`115 F.R.D. 543 (N.D. Cal. 1987) ......................................................................... 7
`Phan v. Costco Wholesale Corp.,
`2020 WL 5074349 (N.D. Cal. Aug. 24, 2020) ..................................................... 6
`Scalia v. County of Kern,
`2023 WL 2333542 (E.D. Cal. Mar. 2, 2023) ................................................ 16, 17
`In re Skanska USA Civ. Se. Inc.,
`340 F.R.D. 180 (N.D. Fla. 2021) ...................................................................... 4, 5
`Youngevity Int'l v. Smith,
`No. 3:16-CV-704-BTM-JLB, 2020 WL 7048687 (S.D. Cal. July 28, 2020)4, 5, 6, 8
`Rules and Regulations
`Federal Rules of Civil Procedure,
`Rule 37 ...................................................................................................... 8, 15, 16
`
`
`
`
`4856-0414-6270.v7
`
`
`
`-ii-
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 4 of 22 Page ID
`#:15695
`
`
`I.
`
`INTRODUCTION
`In its opposition, Balt deliberately confuses the issues before the Court instead of
`addressing them head on, and plays the blame game instead of facing the harsh reality
`that Balt’s conduct alone caused the destruction of evidence residing on the Tran and
`Katayama laptops. In fact, Balt places all of the blame on Stroz, whom Balt selected
`from a list of forensic analysts provided by MVI. In doing so, Balt completely ignores
`the undisputed fact that Stroz took the actions it did based on Balt’s affirmative
`representation that Balt had all necessary encryption keys for its laptops and could and
`would provide them to Stroz. That statement was false, and Balt made it without any
`legitimate basis for believing it to be true. Stroz employed industry best practices based
`on the specific representation made by Balt, and shoulders no responsibility for the data
`loss.
`
`Balt pays short shrift to the misrepresentation it made to Stroz, and only offers a
`non sequitur in response, i.e., Balt’s representation was not untrue because Balt believed
`encryption keys were not needed when it made the laptops available to Stroz. That
`makes no sense. Balt conducted no investigation and made no inquiries into whether
`or not it had the encryption keys before affirmatively misleading Stroz into believing
`that it did. Had it conducted an investigation before making its representation it would
`have discovered that it did not have the keys, and presumably would have made Stroz
`aware of that critical fact. Moreover, knowing that it did not have the encryption keys,
`Balt could have and should have retrieved them from the laptops when it booted them
`(albeit without a legitimate basis) using the process described by Balt’s forensic expert.
`Balt also deliberately misconstrues the evidence loss at issue in this motion. A
`constant refrain throughout Balt’s opposition is that it could not have lost the encryption
`keys because it never had them. But the encryption keys are not the evidence that was
`destroyed. The data on the Tran and Katayama is the evidence that was destroyed, all
`at the hands of Balt. Balt did not lose the encryption keys in any event. They are in the
`laptops, but Balt inexplicably failed to store them anywhere else.
`-1-
`
`4856-0414-6270.v7
`
`
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 5 of 22 Page ID
`#:15696
`
`
`An adverse inference instruction is warranted. Balt’s deliberate actions caused
`the data loss, period. The resulting prejudice to MVI from Balt’s actions is monumental.
`II. REPLY ARGUMENT
`A. Balt’s False Representation Regarding Encryption Keys Caused the
`Destruction of Evidence on the Tran and Katayama Laptops
`The critical fact in MVI’s motion – one that Balt does not dispute – is that before
`Stroz began the imaging process for the Tran and Katayama laptops, Balt affirmatively
`represented to Stroz that Balt had all of the encryption keys Stroz might need for the
`laptops when, in fact, Balt did not. Balt’s misrepresentation is the sole cause of the
`complete and irretrievable loss of all the evidence residing on the Tran and Katayama
`laptops.
`The first step in the preparation process for creating a forensic image of a laptop
`hard drive is to ensure that encryption keys are available for the laptop because different
`forensic imaging methods are used depending upon whether the encryption keys are
`available. (Declaration of Michael Bandemer (“Bandemer”), ¶¶7–9.) To that end,
`Sergio Kopelev, the principal for Stroz, stated in multiple planning calls with both MVI
`and Balt that encryption keys were needed for the laptops. (Declaration of Chaz Hales
`(“Hales”), ¶¶2–3.) In a final confirmation email four days before the scheduled
`imaging, Mr. Kopelev asked Balt to “[l]et us know if you have the information
`regarding any encryption keys and/or user name / passwords.” (Dkt. 385-6, p. 27.) Balt
`confirmed via email that same day that it had the encryption keys, and promised it would
`“also have a representative from Balt’s IT department on hand who will be able to
`unlock any encryption and provide user names and passwords.” (Id. (emphasis
`added).)
`Based on Balt’s affirmative representation that it had the encryption keys for the
`laptops to be imaged, Stroz used industry standard techniques—techniques endorsed by
`Balt’s own forensics expert, Ashraf Massoud—to image all of the laptops Balt provided
`
`
`4856-0414-6270.v7
`
`
`
`-2-
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 6 of 22 Page ID
`#:15697
`
`
`for imaging, including the Tran and Katayama laptops.1 (Bandemer, ¶¶6–8; Dkt. 386-
`3, p. 34.) Mr. Kopelev explained that Stroz “changed a setting in the computer firmware
`to allow booting from an external device,” which is a standard step taken “when the
`necessary decryption information (PIN, recovery key, etc.) is known.” (Dkt. 386-3, p.
`34.) Only after Stroz took that step, however, did Balt IT inform Stroz “that they did
`not have decryption information for the [Tran and Katayama] systems.” Mr. Kopelev
`responded “there was no indication that this was even a concern prior” to that time.
`(Id. (emphasis added).) Stroz proceeded to image the Tran and Katayama laptops using
`an alternate method “with the understanding that while Balt IT didn’t have the particular
`keys on hand, that they could be located at a later date for decryption.” (Id.)
`Stroz successfully analyzed all of the other encrypted laptop images it made that
`day, as well as the other encrypted laptop images Balt provided to Stroz. (Dkt. 385-6,
`pp. 22–24.) This is because Balt located the encryption keys for those devices, as it had
`represented it would to Stroz. (Id.) Only the Tran and Katayama laptops remained
`locked—not because Stroz used inappropriate methods as Balt now speculates, but
`because Balt did not have those encryption keys. Had Stroz known that the encryption
`keys were missing, it could have used other methods to image the laptops, including
`booting the laptops to create a live (rather than forensic) image and/or attempting to
`retrieve the encryption keys from the laptop first. (Bandemer, ¶¶4, 9.) For Stroz, Balt’s
`affirmative representation that “the necessary decryption information [was] known”
`indicated one path of a decision tree for imaging rather than another.
`The complete loss of data on the Tran and Katayama’s laptops is Balt’s failing,
`not Stroz’s.
`
`
`
`
`
`
`
`1 Stroz imaged seven laptops provided by Balt and took receipt of five additional laptop
`images that Balt had previously created. (Dkt. 386-3, pp. 23–24, 28.)
`-3-
`
`
`4856-0414-6270.v7
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 7 of 22 Page ID
`#:15698
`
`
`B.
`
`Balt’s False Representation to Stroz is an Affirmative Act That
`Caused the Data Loss
`When Balt represented to Stroz on April 15, 2022, that it had the encryption keys
`for all laptops Balt provided to Stroz for imaging, Balt had taken no steps to verify
`whether that representation was true. (Hales, ¶7, Ex. 2, 104:19–23.) Balt did not even
`look for the encryption keys before making this sweeping affirmative statement, and
`instead blindly assumed they would magically appear when needed. Had Balt properly
`investigated the matter, it would have easily determined that it did not, in fact, have the
`encryption keys for the Tran and Katayama laptops and could have alerted Stroz who
`would have responded accordingly. (Dkt. 385-6, p. 19.) Balt acted with conscious
`disregard of its discovery obligations when it made this unequivocal representation to
`Stroz about a critical issue without conducting any due diligence whatsoever regarding
`the accuracy of the representation. See Apple Inc. v. Samsung Elecs. Co., 881 F. Supp.
`2d 1132, 1146–47 (N.D. Cal. 2012) (defendant’s conscious disregard of its obligations
`to preserve evidence was “more than sufficient to show willfulness” necessary for
`adverse inference instruction); Youngevity Int'l v. Smith, No. 3:16-CV-704-BTM-JLB,
`2020 WL 7048687, at *2–3 (S.D. Cal. July 28, 2020) (defendants would not be excused
`from taking affirmative action to prevent destruction even if unaware deletion functions
`were in place on devices).
`Balt tries to distinguish the facts of the present case from In re Skanska USA Civ.
`Se. Inc., 340 F.R.D. 180 (N.D. Fla. 2021), cited by MVI in its moving papers, by arguing
`that it “engaged in no affirmative act causing evidence to be lost.” (Balt Opposition
`Brief, Dkt. 409 (“Op. Br.”), 10:5–6.) That is simply not true. Balt made an affirmative
`representation to Stroz, in writing, that it had the encryption keys for the laptops to be
`imaged. This affirmative representation led directly to the imaging method selected by
`Stroz. To the extent the chosen imaging method may have caused the locking of the
`laptops and loss of data, Stroz selected its chosen method in reliance on Balt’s
`affirmative yet demonstrably false representation. (Dkt. 386-3, p. 34.) Balt’s failure to
`
`
`4856-0414-6270.v7
`
`
`
`-4-
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 8 of 22 Page ID
`#:15699
`
`
`do anything to preserve the data on its encrypted laptops, and specifically its failure at
`any point to secure the encryption keys needed to provide access to the laptops,
`constitutes an affirmative act.
`Balt claims it “has provided a credible explanation for the locking of the
`laptops[,]” and that Balt should therefore be off the hook for its destruction of key
`evidence in this case.. (Op. Br., 10:11–12.) But Balt’s explanation is misplaced.
`Skanska requires a credible explanation of the affirmative act—in this case Balt’s
`affirmative false representation to Stroz that it possessed the encryption keys. Balt
`provides no explanation at all, much less a credible one, for the misrepresentation it
`made to Stroz.
`Further, “[t]he existence of reasonable explanations for why deletions occurred
`does not suggest that reasonable steps were taken to prevent deletions.” Youngevity,
`2020 WL 7048687, at *2. This important distinction is lost on Balt. Balt’s purported
`“innocent” belief that there was no encryption on the laptops because Balt IT personnel
`had successfully logged into the laptops the day before they were imaged does not stand
`up to scrutiny. As a preliminary matter, Balt should not have booted the laptops;
`booting the laptops is itself an act of evidence destruction. (Bandemer, ¶¶4–5.) Booting
`a laptop alters the evidence stored on that laptop and is to be avoided in creating a
`forensic image so as to not “risk[] modification or deletion of data present on the
`[laptop].” (Hales (Sergio email).) (Id., Dkt. 386-3, p. 34.)
`Moreover, logging into a laptop does not reveal whether BitLocker encryption,
`which is part of the Windows operating system, is enabled or not. (Bandemer, ¶16.)
`Balt’s own expert explains that logging into an encrypted laptop is the first step in the
`“easy” process of exporting the encryption keys from encrypted laptops. (Declaration
`of Ashraf Massoud, Dkt. 411 (“Massoud”), ¶8.) And, Balt’s IT Director for Global
`Operations testified that he (1) knew many of Balt’s laptops were encrypted, (2) had
`debriefed a departing IT employee only a month prior to the imaging on topics including
`how Balt sets up BitLocker encryption on its laptops and stores encryption keys, and
`-5-
`
`
`4856-0414-6270.v7
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 9 of 22 Page ID
`#:15700
`
`
`(3) was leading efforts to improve the way Balt stores laptop encryption keys. (Ex. 1
`to Hales, 61:17–62:10, 86:10–88:14, 63:11–66:6.) It is not reasonable to conclude from
`simply booting a laptop that it is not encrypted, and the statements by Kheng Ang in his
`declaration are inconsistent with his deposition testimony given in this case.
`(Bandemer, ¶16.)
`In addition, Balt arrived at its erroneous conclusion after booting the laptops on
`April 18—three days after it made its representation to Stroz that it had the encryption
`keys yet before the imaging process began. (Dkt. 385-6, pp. 2, 23, 27.) At no point did
`Balt provide any update to Stroz about what it had done with the laptops or the erroneous
`conclusion it had reached regarding the encryption keys. (Hales, ¶4.) Had Balt
`promptly shared this information with Stroz, standard practices dictate that alternative
`means for imaging the laptops would have been undertaken. (Bandemer, ¶¶7–9.) Balt’s
`decision to keep this important information to itself on the eve of imaging the laptops
`was deliberately reckless, at the very minimum. See Phan v. Costco Wholesale Corp.,
`2020 WL 5074349, at *3 (N.D. Cal. Aug. 24, 2020) (finding the “absence of evidence
`of a proper process for preserving [] important evidence indicates, at a minimum, that
`defendant was careless”); In re Google Play Store Antitrust Litig., 2023 WL 2673109,
`at *9 (N.D. Cal. Mar. 28, 2023) (concluding defendant’s poor management of efforts to
`preserve relevant chat messages “fell strikingly short” of its discovery obligations);
`Youngevity, 2020 WL 7048687, at *2 (finding defendants’ “ignorance” of automatic
`message deletion and failure to back up devices was “no defense because their
`preservation obligation necessarily entailed learning of these systems to prevent
`destruction”). None of Balt’s actions, and deliberate failure to act, are innocent or
`inconsequential, and all of it led directly to the loss of the critical evidence on these key
`laptops.
`Of significance, having booted the laptops the day before the imaging was to take
`place, Balt failed to do any of the things that would have preserved the encryption keys.
`(Bandemer, ¶¶5, 9.) Balt failed to follow its expert’s “easy” instructions to export the
`-6-
`
`
`4856-0414-6270.v7
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 10 of 22 Page ID
`#:15701
`
`
`encryption keys from the BitLocker control panel. Balt also failed to use the control
`panel to “suspend” BitLocker operation, which is a step recommended by Microsoft
`prior to engaging in planned activities that could trigger a BitLocker recovery mode.
`(Bandemer, ¶14.) Had Balt undertaken either of these measures, the evidence would
`not have been lost.
`C.
`Stroz Was Not Responsible for Managing Balt’s Encryption Keys
`Balt blatantly attempts to shift the blame for its data loss to Stroz and tries to
`distance itself from Stroz by characterizing it as the firm that “MVI proposed.” (Op.
`Br., 2:27–3:1.) The record is clear that MVI proposed three acceptable vendors, and
`Balt selected Stroz from that list.2 (Exs. 1–2 to Declaration of Paul Stewart, Dkt. 410-
`1, pp. 2, 6.) Regardless, Balt completely ignores the affirmative representation it made
`to Stroz that it had the encryption keys for all laptops Stroz was tasked with imaging,
`and fails to meaningfully address it in its Opposition Brief.
`Instead, Balt incredulously argues that Stroz—not Balt—was responsible for
`managing Balt’s encryption keys. According to Balt’s forensics expert, the encryption
`keys are stored in the laptops themselves and can be easily retrieved by “logging into
`the computer [with local admin rights], opening the Control Panel, and clicking on the
`BitLocker icon.” (Massoud, ¶¶ 5, 8.) He opines that Stroz “should have logged onto
`the [laptops] using the administrative user name and password provided by Balt” and
`“easily retrieved [the encryption keys] from the Windows Control Panel.” (Massoud, ¶
`15.) In fact, after Balt later informed Stroz that it could not locate any other copies of
`the encryption keys, it sent the laptops to Stroz’s lab in Boston, and Stroz did attempt
`to log into the laptop with the admin credentials. (Dkt. 385-6, p. 5.) Only then, on May
`2, 2022, did Stroz and the parties learn that the laptops were completely inaccessible
`
`
`2 Balt liberally misstates facts in its brief. For example, MVI did not ask previously ask
`Judge Scott to find Balt “guilty of spoliation.” (Op. Br., 3:6.) MVI mentioned spoliation
`within the context of its motion to compel Balt to provide information regarding its
`litigation hold memorandum (Dkt. 229-1), which Judge Scott granted. Judge Scott
`made no finding on spoliation. (See Ex. 4 to Stewart, 13:10–14:4.)
`-7-
`
`
`4856-0414-6270.v7
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 11 of 22 Page ID
`#:15702
`
`
`unless Balt could find a copy of the encryption key stored some other place.
`This begs the obvious question: If Stroz could have retrieved the encryption keys
`so easily, why didn’t Balt do so before it provided the laptops to Stroz? These are Balt
`laptops, issued to Balt employees, managed by the Balt IT department, and for which
`Balt is under an obligation to preserve the evidence (i.e., documents and files) stored
`on the laptops for use in this litigation. Nat’l Ass’n of Radiation Survivors v. Turnage,
`115 F.R.D. 543, 557–58 (N.D. Cal. 1987) (“The obligation to retain discoverable
`materials is an affirmative one.”). Moreover, just three days after Balt told Stroz that it
`had all encryption keys and one day before Balt made the laptops available to Stroz for
`imaging, Balt booted the laptops and had every opportunity at that time to “simply”
`retrieve the encryption keys. That would have been the prudent and expected course of
`action by Balt to (1) ensure the integrity and accessibility of the laptops and (2) confirm
`that Balt’s representation about having all encryption keys necessary to access the
`laptop contents was accurate. (Bandemer, ¶¶5, 9, 17.) Balt did neither and its attempt
`to pass off its own IT failures as Stroz’s fault is an act of desperation.
`Lastly, Balt’s expert does not address the fact that Balt failed to store the
`encryption keys for its employee laptops in a safe location—somewhere other than on
`the laptops themselves—or secure the encryption keys when its duty to preserve
`evidence arose. (Bandemer, ¶15.) “As Rule 37 indicates, the duty to preserve relevant
`evidence is an unqualified obligation in all cases.” In re Google Play Store Antitrust
`Litig., 2023 WL 2673109, at *8 (N.D. Cal. Mar. 28, 2023). The record shows that Balt
`did not have a consistent or effective procedure in place to track and store laptop
`encryption keys before MVI filed this lawsuit. (Hales, ¶7, Ex. 1, 63:11–66:6.)
`However, Balt cannot now rely on its inadequate IT practices as an excuse for its failure
`to preserve evidence on its employee laptops. See Fed. R. Civ. P. 37, Advisory
`Committee Notes to the 2006 Amendment (“[A] party is not permitted to exploit the
`routine operation of an information system to thwart discovery obligations by allowing
`that operation to continue.”); Youngevity, 2020 WL 7048687, at *2 (S.D. Cal. July 28,
`-8-
`
`
`4856-0414-6270.v7
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 12 of 22 Page ID
`#:15703
`
`
`2020) (“Although perfection is often impossible in preserving ESI within complex
`electronic systems because it may be ‘lost as a result of the routine good faith operation’
`of the system, this does not excuse the party from preventing destruction within their
`control.”). Balt’s conduct destroyed evidence that was clearly within its control.
`D. Balt’s Expert Is Wrong About What Triggers BitLocker Recovery
`Balt’s attempt to shift blame to Stroz is built on a house of cards. Balt’s expert
`explains that sometimes a forensic examiner must modify the computer’s BIOS
`program “so that the computer starts up by accessing a drive attached to a USB port”
`rather than its internal hard drive, which allows the examiner to then boot from a USB
`device containing forensic software that is used to image the hard drive in an “off” state.
`(Massoud, ¶¶ 10–12; Bandemer, ¶11.) Mr. Massoud then incorrectly guarantees that
`“[a]ltering the BIOS/UEFI program instructions in this manner will not cause the
`computer to lock.” (Massoud, ¶ 12 (emphasis added).)
`This is simply not true. In direct contrast, Microsoft’s “BitLocker recovery
`guide” lists changing the BIOS in order to boot from “something other than the hard
`drive” among a list of 30 “specific events that will cause BitLocker to enter recovery
`mode when attempting to start the operating system drive.” (Bandemer, ¶¶12–14, Ex.
`1, p. 5.) In fact, Mr. Kopelev’s description of the steps Stroz took match Mr. Massoud’s
`recommended “safe” procedure exactly. Stroz “changed a setting in the computer
`firmware [BIOS/UEFI program instructions] to allow booting from external media [a
`drive attached to a USB port].” (Compare Dkt. 386-3, p. 34, with Massoud, ¶12.)
`Unlike Mr. Massoud, who incorrectly stated that such a procedure “will not” trigger the
`BitLocker recovery mode, Mr. Kopelev acknowledged that this process could, indeed,
`have triggered BitLocker and explained that the process is standard “when the
`necessary decryption information . . . is known.” (Dkt. 386-3, p. 34 (emphasis added).)
`Mr. Massoud compounds his error by blindly surmising that “[b]ecause the
`laptops were locked by BitLocker,” Stroz clearly “did something” that BitLocker
`interpreted as “tampering.” (Massoud, ¶17.) Mr. Massoud further speculates that Stroz
`-9-
`
`
`4856-0414-6270.v7
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 13 of 22 Page ID
`#:15704
`
`
`“may have” turned off a feature called Secure Boot, and claims that if someone turns
`off Secure Boot, the computer “will require the BitLocker key.” (Massoud, ¶¶13, 17.)
`Mr. Massoud then continues his proclivity to read minds by proffering, without any
`foundation whatsoever, that Stroz “apparently believe[d] incorrectly that [turning off
`Secure Boot] was necessary” before confidently declaring that “this step was not
`necessary” and fingering the disabling of Secure Boot as the “likely” reason the Tran
`and Katayama laptops were locked. (Massoud, ¶17.)
`Mr. Massoud’s speculative hypotheses are riddled with problems. First, as has
`been stated, there is no need to look for an alternate explanation. Mr. Massoud’s own
`recommended method of imaging laptops that Stroz employed is on Microsoft’s list of
`things that can trigger BitLocker. (Bandemer, ¶13, Ex. 1.) Second, the list is not short,
`and it is unclear why “disabling Secure Boot,” which does not appear on the list,
`catches Mr. Massoud’s attention. (Id.) Third, there has been no evidence or testimony
`proffered at any point indicating that Secure Boot was enabled on any Balt laptop such
`that Stroz could have disabled it. Fourth, there is likewise no evidence that Stroz
`disabled the Secure Boot setting or modified it in any way. Mr. Kopelev’s explanation
`does not mention Secure Boot and, instead, straightforwardly explains that the BIOS
`was modified to allow booting from an external [USB] device. (Dkt. 386-3, p. 34;
`Hales, ¶5.)
`Nevertheless, Balt attempts to capitalize on Mr. Massoud’s flawed conclusion by
`converting Mr. Massoud’s qualified and speculative opinions to unqualified and
`absolute conclusions. (Op. Br., 2:3 (“Stroz Friedberg took an extra and unnecessary
`step”); 4:21–23 (“due to a mistake [Stroz] made in the process”); 5:1 (Stroz “took an
`extra and unnecessary step relating to the BIOS”); 5:23 (“If Stroz Friedberg had not
`turned off the ‘Secure Boot’ setting”); 8:16–17 (Stroz “apparently chose to turn off the
`‘Secure Boot’ setting in the BIOS program”); 8:19–21 (Stroz “unnecessarily triggered
`the BitLocker encryption software by apparently turning off the ‘Secure Boot’ setting”);
`10:8–10 (Stroz “chose to take the unnecessary step of turning off the laptop’s ‘Secure
`-10-
`
`
`4856-0414-6270.v7
`
`MEMORANDUM OF POINTS AND AUTHORITIES
`Case No. 8:20-cv-02400-JLS-KES
`
`
`
`
`
`1 2 3 4 5 6 7 8 9
`
`10
`11
`12
`13
`14
`15
`16
`17
`18
`19
`20
`21
`22
`23
`24
`25
`26
`27
`28
`
`

`

`Case 8:20-cv-02400-JLS-KES Document 424 Filed 04/21/23 Page 14 of 22 Page ID
`#:15705
`
`
`Boot’ setting in the BIOS program”); 11:5–6 (Stroz could have accessed the encryption
`keys “if [it] had followed best practices”); 13:3–5 (Balt “had no way of knowing[] that
`Stroz Friedberg would turn off the ‘Secure Boot’ setting”); 13:19–20 (“if [Stroz] did
`not make the mistake of turning off [Secure Boot]”); 14: 18–19 (“Stroz Friedberg made
`a mistake”).
`Lost in the din is an admission that Balt cannot escape: “Balt is not privy to the
`specific technique Stroz Friedberg used.” (Op. Br., 4:25–26.) Balt does not know
`because it did not ask Stroz for any information about the steps Stroz took when imaging
`the laptops after receiving Stroz’s explanation on May 13, 2022. (Hales, ¶5.) MVI is
`unaware of any communications between Balt and Stroz discussing Secure Boot or any
`other details of how Stroz imaged the laptops aside from Mr. Kopelev’s email. (Id.)
`Anything further that Balt attributes to Stroz is unfounded, based only on self-serving
`speculation, and premised on an incorrect understanding of how BitLocker works.
`Balt’s “could have, should have, would have” scenarios are part of Balt’s overarching
`smoke and mirrors game designed to obfuscate the issues and distract the Court’s
`attention away from Balt’s egregious and irremediable errors and should be given no
`weight.
`E.
`Balt’s Efforts to Search for the Encryption Keys Were Abysmal
`Balt paints itself not only as Stroz’s innocent victim, but also as the model of
`cooperation, pointing to examples of its purported benevolent efforts to locate the
`missing encryption keys and crying, “This is not the conduct of a party trying to conceal
`or destroy evidence.” (Op. Br. 2:22–23.) This is yet another smokescreen Balt erects
`to distract the Court from its disregard for its obligation to preserve electronic evidence.
`First, Balt claims that it “voluntarily turned over” to MVI more 55,000 of MVI’s
`own confidential and propriety documents in the related patent case that Balt had found
`on its employ

This document is available on Docket Alarm but you must sign up to view it.


Or .

Accessing this document will incur an additional charge of $.

After purchase, you can access this document again without charge.

Accept $ Charge
throbber

Still Working On It

This document is taking longer than usual to download. This can happen if we need to contact the court directly to obtain the document and their servers are running slowly.

Give it another minute or two to complete, and then try the refresh button.

throbber

A few More Minutes ... Still Working

It can take up to 5 minutes for us to download a document if the court servers are running slowly.

Thank you for your continued patience.

This document could not be displayed.

We could not find this document within its docket. Please go back to the docket page and check the link. If that does not work, go back to the docket and refresh it to pull the newest information.

Your account does not support viewing this document.

You need a Paid Account to view this document. Click here to change your account type.

Your account does not support viewing this document.

Set your membership status to view this document.

With a Docket Alarm membership, you'll get a whole lot more, including:

  • Up-to-date information for this case.
  • Email alerts whenever there is an update.
  • Full text search for other cases.
  • Get email alerts whenever a new case matches your search.

Become a Member

One Moment Please

The filing “” is large (MB) and is being downloaded.

Please refresh this page in a few minutes to see if the filing has been downloaded. The filing will also be emailed to you when the download completes.

Your document is on its way!

If you do not receive the document in five minutes, contact support at support@docketalarm.com.

Sealed Document

We are unable to display this document, it may be under a court ordered seal.

If you have proper credentials to access the file, you may proceed directly to the court's system using your government issued username and password.


Access Government Site

We are redirecting you
to a mobile optimized page.





Document Unreadable or Corrupt

Refresh this Document
Go to the Docket

We are unable to display this document.

Refresh this Document
Go to the Docket