         In the United States Court of Federal Claims
                                   No. 16-783C
                              Filed: August 23, 2019
           Redacted Version Issued for Publication: September 24, 20191
     * * * * * * * * * * * * * * * * **          *
    BRUHN NEWTECH, INC., et al.,                 *
                                                 *
                       Plaintiffs,               *   Liability Trial; Contract Disputes Act;
                                                 *   Breach of Contract; Copyright
    v.
                                                 *   Infringement.
    UNITED STATES,                               *
                                                 *
                     Defendant.                  *
     * * * * * * * * * * * * * * * * **          *


        Steven J. Lewicky, Lewicky, O’Connor, Hunt and Meiser, LLC, Fulton, MD, for
plaintiffs.

        Scott D. Bolden, Deputy Director, Commercial Litigation Branch, Civil Division,
Department of Justice, Washington, D.C., for defendant. With him were Arthur Samora,
Agency Counsel, Department of Navy, Nicholas Kim, Trial Attorney, Commercial
Litigation Branch, Carrie Rosato, Trial Attorney, Commercial Litigation Branch, Gary L.
Hausken, Director, Commercial Litigation Branch, and Joseph H. Hunt, Assistant
Attorney General, Civil Division, Department of Justice, Washington, D.C.

                                           OPINION

HORN, J.

       In the above-captioned case, plaintiffs Bruhn NewTech, Inc. (BNT-US) and Bruhn
NewTech, A/S (BNT-Denmark) filed a second amended complaint against the United
States. In Count I of the second amended complaint, BNT-US asserts a breach of contract
claim against the United States. In Count II of the second amended complaint, BNT-
Denmark asserts that the United States infringed two of BNT-Denmark’s copyright
registrations. The court held a trial on liability on both of plaintiffs’ counts in the second
amended complaint.

                                       FINDINGS OF FACT



1 This Opinion was issued under seal on August 23, 2019. The parties were asked to
propose redactions prior to public release of the Opinion. This Opinion is issued with
redactions that the parties proposed in response to the court’s request. Words which are
redacted are reflected with the notation: “[redacted].”
        BNT-US is a wholly-owned subsidiary of BNT-Denmark, and BNT-US was
incorporated as a Delaware corporation in 1996. BNT-Denmark is a Danish corporation
that sells computer software referred to as “NBC-Analysis,” which is software used in
military systems to track and analyze chemical, biological, radiological, and nuclear
(CBRN) agents in military and civilian environments.

       The parties have stipulated that the primary functions of NBC-Analysis software
are predicting, warning, and reporting CBRN events based on informational inputs
provided by NBC-Analysis users, as well as “other reliable sources.” The output the NBC-
Analysis software generates is consistent with the CBRN reporting standards articulated
in North Atlantic Treaty Organization (NATO) Allied Tactical Publication 45 (ATP-45).
NATO periodically revises the CBRN reporting standards set forth in ATP-45. When
NATO revises ATP-45, BNT-Denmark updates its NBC-Analysis software to ensure
compatibility with the CBRN reporting standards in ATP-45. The parties have stipulated
that BNT-Denmark “released” “versions of” NBC-Analysis software compatible with ATP-
45B from 2003 to 2005. From 2006 to 2009, the parties have stipulated that BNT-
Denmark “released” “versions of” NBC-Analysis software compatible with ATP-45C. In
2011, BNT-Denmark updated its NBC-Analysis software to be compatible with NATO’s
ATP-45D.

       During trial in the above-captioned case, the court heard testimony from Jacob
Nielsen, who described himself as being the “CEO [chief executive officer] of Bruhn
NewTech from May of 2005 until February of 2017,” and who stated that, as CEO, he was
responsible for managing the operations of BNT-Denmark, BNT-US, and a different
Bruhn NewTech subsidiary based in the United Kingdom. According to Jacob Nielsen,
Bruhn NewTech was founded in the 1980s by two software engineers who had previously
served in the Danish military. Jacob Nielsen asserted that the two software engineers
were the first individuals to create a software program used to predict the “outfall” of
nuclear weapons in accordance with established NATO standards. Jacob Nielsen
indicated that the relevant NATO standards initially only concerned nuclear weapons, but
that the NATO standards became more complex over time. Jacob Nielsen also testified
that “almost” “100 percent” of NBC-Analysis sales were to NATO countries, including,
among other countries, Denmark, Italy, Norway, the United Kingdom, and the United
States. When Jacob Nielsen began his employment with Bruhn NewTech in 2005, Bruhn
NewTech’s largest source of revenue was from contracts with the United States.
According to Mr. Nielsen’s testimony at trial, BNT-Denmark established BNT-US because
DNT-Denmark was “not able to work for the U.S. Government with engineers other than
engineers based in the U.S. for security reasons.”

      During his testimony, Jacob Nielsen described the functions of NBC-Analysis
software as:

      [A] Joint Warning and Reporting System, and that’s basically what it does.
      So it takes in information about incidents of any of the kinds of -- nuclear,
      biological, chemical incidents -- and it takes those information in, and it
      computes and predicts the outcome of this, and it will also then send out


                                           2
      information to parties that have been logged in the software, that they
      should be warned and they should do this, that, or the other.

BNT-Denmark and BNT-US sold NBC-Analysis software in either a “dongled” format or
an “undongled” format. Dongled software is protected by a hardware “dongle,” which the
parties describe as a “physical device with associated software or firmware that must be
inserted into the computer” in order to prevent “NBC-Analysis from being used on any
computer other than a computer that has a security dongle plugged into it.” Undongled
versions of NBC-Analysis software “have the physical capacity to be replicated and
copied, but the terms of the license under which the software is delivered legally restrict
the extent to which the software can be replicated and copied.” BNT-Denmark and BNT-
US also have sold NBC-Analysis software to governments under a “national license,”
which the parties have stipulated means that “NBC-Analysis may be freely used
throughout the nation’s armed forces and government, but only in a manner consistent
with the terms of the negotiated national license.” Under a national license, a government
would receive an undongled version of NBC-Analysis software. According to the parties’
joint stipulation of facts, when selling NBC-Analysis under a national license, BNT-
Denmark and BNT-US would “always offer a support and maintenance service contract
for NBC-Analysis,” which the parties indicate is known as a Software Upgrade and
Maintenance Agreement (SUMA). The parties also have stipulated that the SUMA
provides the majority of BNT-US’s and BNT-Denmark’s revenue and profit under a
national license contract.

        Jacob Nielsen testified at trial that “the U.S. engineers would be doing the U.S.
adaptations to our core” NBC-Analysis software, while the “Danish engineers would be
developing along the lines of the annual updates, new functionality and new adaptations,
to be sold throughout the world as a standard product.” Mr. Nielsen also stated that the
engineers working in Denmark for BNT-Denmark were responsible for keeping the NBC-
Analysis software current and compliant with evolving NATO ATP-45 standards. Similarly,
plaintiffs’ former employee John O’Donahue, who was offered by plaintiff as an expert
witness, and who testified at trial that he was a software engineer, as well as a manager,
for BNT-US from July 2001 to August 2006,2 stated that BNT-US customized NBC-


2 Former BNT-US employee John O’Donahue was designated as a fact witness by
defendant and originally as an expert witness by plaintiffs. Without objection from
defendant, Mr. O’Donahue was offered, and admitted, as plaintiff’s expert on software
development, software coding, software architecture, and NBC-Analysis software code.
Although originally designated as an expert witness by plaintiffs, during his direct
testimony when plaintiffs called Mr. O’Donahue as an expert witness, Mr. O’Donahue
offered fact testimony as to his employment with BNT-US, as well as fact testimony
regarding NBC-Analysis software. Mr. O’Donahue also testified that, while working for
BNT-US, “I was asked to become manager of the group, which gave me responsibility for
a large number of subsequent projects. A significant part of what I did was to develop
sensor interfaces for JWARN, the joint military -- military Joint Warning and Reporting
Network.” According to Mr. O’Donahue’s testimony, while employed by BNT-US, Mr.
O’Donahue worked to “add[] in other what’s called GOTS, Government-owned off-the-

                                            3
Analysis for the United States military, such as “the addition of these sensors” and
“deployment of the application on different platforms.” According to John O’Donahue,
BNT-Denmark was responsible for ensuring that Bruhn NewTech’s NBC-Analysis
software was current and compliant with the NATO ATP-45 standards.

         Jacob Nielsen testified that, either at the end of 2012 or the end of 2013, BNT-US
was reduced to having approximately one employee because “[t]he business went away.”
Jacob Nielsen also stated that, as CEO of Bruhn NewTech, he was the individual that
decided to limit BNT-US’ operations to approximately one employee. In plaintiffs’ post-
trial brief, plaintiffs also assert that there were insufficient business opportunities related
to NBC-Analysis to justify continuing BNT-US’ business operations as of the end of 2012.

The ‘2076 Contract

        On May 13, 1998, the United States Marine Corps (USMC) awarded Contract No.
M67854-98-C-2076 (the ‘2076 Contract) to BNT-US, which was a fixed-price contract.
According to the parties’ joint stipulations of fact, BNT-US delivered software and support
services under the ‘2076 Contract “for at least two years” after the “effective date” of the
‘2076 Contract. The parties have stipulated that, under the ‘2076 Contract, BNT-US
provided “NBC-Analysis software packages to the USMC to be used as the software
component to the Joint Warning and Reporting Network Program (JWARN).” The ‘2076
Contract required BNT-US to deliver “the NBC Analysis Software packages (license,
media, documents)” to the USMC “in accordance with the requirements listed in the
JWARN PD [Purchase Description].”3 The statement of work in the ‘2076 Contract
indicated that the JWARN software was to provide analysis of nuclear, biological, and
chemical detection information and was to automate nuclear, biological, and chemical
warning and reporting for the United States Army, United States Navy, United States Air
Force, and USMC. Section 1.1 of the statement of work stated that the scope of the ‘2076
Contract entailed “the delivery of the commercial software component of JWARN, the
NBC Analysis program, and subsequent post-fielding support.” The ‘2076 Contract’s
purchase description stated that the NBC-Analysis software must operate on the
battlefield and provide military units with an overview of the nuclear, biological, and


shelf software, to do functionality, which in the U.S. military is done by the NBC office,
which is not necessarily part of the ATP-45 documentation.”
3 According to plaintiffs’ post-trial brief, the terms NBC-Analysis and JWARN Block 1 are
sometimes used interchangeably to refer to the product provided by BNT-US to the United
States government. Plaintiffs also state: “More precisely, however, NBC-Analysis is BNT-
Denmark’s commercial product that it licenses to many nations, and JWARN Block 1 is
that commercial product integrated with adaptive add-ons created by BNT-US for use by
the U.S. Government.” The parties jointly have stipulated that Paul Moroney was an
employee of “contractor Sentek,” which Mr. Moroney testified was a “DoD contractor.” Mr.
Moroney testified that, “from the beginning,” “they” referred to the NBC-Analysis software
as JWARN and used the terms NBC-Analysis, JWARN, and JWARN Block 1
interchangeably.

                                              4
chemical situation in the area of operations. The parties have stipulated that the software
delivered under the ‘2076 Contract was commercial-off-the-shelf software.

      The ‘2076 Contract contained Federal Acquisition Regulation (FAR) clause
52.227-19, titled “COMMERCIAL COMPUTER SOFTWARE--RESTRICTED RIGHTS
(JUN 1987).” (capitalization in original). In the ‘2076 Contract, FAR clause 52.227-19 was
supplemented with the following terms:

      In accordance with FAR 52-227-19, BRUHN NewTech, Inc. will place the
      following legend on the software.

                                        NOTICE!

                       COMMERCIAL COMPUTER SOFTWARE

                                 RESTRICTED RIGHTS

      Notwithstanding any other lease or license agreement that may pertain to,
      or accompany the delivery of, this computer software, the rights of the
      Government regarding its use, reproduction and disclosure are as set forth
      in Government Contract No. M67854-98-C-2076.



                                LICENSE AGREEMENT

                            (Supplement to FAR 52.227-19)

      All software to be delivered under this contract including source codes, is
      commercial computer software subject to restricted rights specified in FAR
      52.227-19 “Commercial Computer Software - Restricted Rights” with the
      following additions to that clause:

      1. The Government may make an unlimited number of copies of the
      software and may distribute and use the software in any computers owned
      or leased by the Government and operated by the U.S. Government
      personnel working for U.S. Government departments, organizations and
      agencies.

      2. The Government’s use of the software shall be limited to use in fulfillment
      of functions of the Government of the United States.

      3. The Government shall not disclose the software and shall not give, sell,
      license or otherwise provide copies of the software or use of the software
      to any third party person or entity including but not limited to members of



                                            5
       the public, governments of foreign countries, or international agencies or
       organizations.

(capitalization and emphasis in original). The parties have stipulated that the “software
license provisions” in the ‘2076 Contract have not been amended or modified.

        BNT-US and the government executed three modifications to the ‘2076 Contract.
Modification No. P00001 to the ‘2076 Contract, which was dated July 1, 1998, stated that
the purpose of the modification was to “add modifications to the Software Delivered under
Line Item 0001.” Modification No. P0001 stated that the “NBC Analysis software is to be
modified to include NBC Battlefield Management functions from the Government owned
software Automated Nuclear, Biological, and Chemical Information System (ANBACIS);
a MICAD [Multipurpose Integrated Chemical Agent Detector] module; and Port Airbase
ACTD [Advanced Concept Technology Demonstration] module.” On January 21, 1999,
BNT-US and the USMC executed Modification No. P00002 to the ‘2076 Contract, which
added CLINs and deleted certain CLINs from the ‘2076 Contract. On September 30,
1999, BNT-US and the USMC executed a third modification which revised a CLIN to
reflect an increase in cost. The parties have stipulated that BNT-US has been
compensated in full for all work under the ‘2076 Contract as of June 3, 2004.

Joint Program Executive Office for Chemical and Biological Defense and the Joint
Program Manager Information Systems

       In 2003, the Department of Defense established the Joint Program Executive
Office for Chemical and Biological Defense. The Joint Program Executive Office for
Chemical and Biological Defense assists the United States armed forces with
development, acquisition, and maintenance of chemical and biological defense
equipment. There are several directorates within the Joint Program Executive Office for
Chemical and Biological Defense, including the Joint Program Manager Information
Systems (JPMIS).

        According to the parties’ joint stipulations of fact, in approximately 2003,
management of military operations related to JWARN was transferred from the USMC to
JPMIS. Thereafter, JPMIS administered contracts involving JWARN, including “deliveries
to the Government of JWARN software and services by BNT-US.” In the parties’ joint
stipulations of fact, the parties state that JPMIS is staffed by both uniformed military and
civilian employees, as well as “Systems Engineering and Technical Assistance (SETA)
contractors. SETA contractors are civilian employees or government contractors who are
contracted to assist the Department of Defense pursuant to FAR [Federal Acquisition
Regulation] Part 37.”

         The parties have stipulated that Scott White has been the Joint Program Manager
for Chemical and Biological Defense Program since June 2006. According to the parties’
joint stipulations of fact, “[i]n this capacity, Mr. White reports directly to the Joint Program
Executive Office for Chemical and Biological Defense (JPEO-CBD) and oversees JPMIS,
which has primary responsibility for United States military’s acquisition of products and


                                               6
services related to information systems.” According to plaintiffs’ post-trial brief,
“[c]onfusingly, the term ‘JPM-IS’ is sometimes used by the CBRN community to refer to
the joint program manager himself (Scott White, during all relevant time periods), and
sometimes to refer to the office that he leads.”

JWARN Block 1, JWARN Block 2, and BNT-US’s Other Contractual Agreements

       The parties have stipulated that the government’s JWARN Block 1 “software suite
evolved over time, as BNT-US provided periodic updates to maintain adherence to NATO
ATP-45 requirements and other Government-Off-The-Shelf (GOTS) programs were
added to the software suite, such as: Hazard Prediction and Assessment Capability
(HPAC); Vapor, Liquid, and Solid Track (VLSTRACK); and the Emergency Management
Information System (EMIS).” The parties’ joint stipulation of facts also provides that BNT-
Denmark and BNT-US developed and provided additional software components to
“incorporate features” which were developed in response to JPMIS’ requirements. The
parties have stipulated that “BNT-US identified these features in a document titled ‘GOTS
Source Code Summary’ dated January 28, 2008.”

       The government designated different versions of the JWARN Block 1 software
suite with different, progressive alphabetic designations, such as JWARN Block 1A,
JWARN Block 1B, JWARN Block 1C, etc. JWARN Block 1 software suites were further
divided based on which government computer system the JWARN Block 1 software suite
was compatible with, among others, the government’s Command and Control Personal
Computer System (C2PC) and the government’s Maneuver and Control System (MCS).
The parties have stipulated:

       Three computer system designations relevant to this case are:

       • Standalone: a version of JWARN Block 1 capable of operating in isolation
       from a network or a command and control host;
       • C2PC: a version of JWARN Block 1 capable of operating on the C2PC
       system; and
       • MCS: a version of JWARN Block 1 capable of operating on the MCS
       system.

        The government began using JWARN Block 1 software in 1998. In 2002, the
government issued Solicitation No. M67854-02-R-2056, which sought to procure a “next-
generation” version of the JWARN software, which would be designated as JWARN Block
2 Increment 1. According to the parties’ joint stipulation of facts, BNT-US “partnered” with
Lockheed Martin to submit a proposal in response to Solicitation No. M67854-02-R-2056.
In 2003, however, the government awarded a contract to Northrop Grumman under
Solicitation No. M67854-02-R-2056. Thereafter, the government designated JWARN
Block 2 Increment 1 as a “program of record.” While Northrop Grumman was developing
JWARN Block 2 Increment 1, the government continued to use JWARN Block 1 software.
The parties have stipulated that the government ceased using JWARN Block 1 software
on October 10, 2016.


                                             7
         According to the parties’ joint stipulation of facts:

         Between 1998 and 2013, BNT-US worked on a series of contracts and
         subcontracts relating to JWARN Block 1 support activities for the United
         States Government. The Government was the customer for these contracts
         and subcontracts. BNT-US provided to the Government updates,
         refinements and services related to NBC-Analysis/JWARN Block 1 during
         these years. BNT-US’s last performance as a prime contractor to the
         Government concluded on October 25, 2005. After that date, BNT-US
         always served as a subcontractor to other prime contractors under contracts
         other than the ‘2076 Contract. The collective value of BNT-US’s contracts
         and subcontracts for the government was more than $33 million. . . .

         On January 12, 2009, BNT-US began working as a subcontractor to
         Northrop Grumman Systems Corporation (Northrop). BNT-US’s
         subcontracting work related to Northrop’s prime contract with the
         Government, Contract No. N00178-04-D-4091 (Task Order NS05). Some
         of BNT-US’s subcontract work through Northrop included work on
         Northrop’s “Global Operations” project, in addition to other matters.

(footnotes omitted). When discussing “Task Order NS05” in the joint stipulation of facts,
the parties cite to joint exhibit 67,4 which is a subcontract between Northrop Grumman
and BNT-US that was entered into on January 12, 2009. The “Prime Contract No.” listed
on the January 2, 2009 subcontract located at joint exhibit 67 is listed as “N00178-04-D-
4091-NS05” (the ‘4091/NS05 Task Order), while the Subcontract No. was listed as
“65762EVT9S” (the January 12, 2009 subcontract). BNT-US’ January 12, 2009
subcontract had a period of performance from January 12, 2009 to December 31, 2009.
Under the January 12, 2009 subcontract, BNT-US was to:

         [P]rovide the necessary personnel, material, and facilities, and exert its best
         efforts to do all things necessary or incidental to accomplish the effort as
         ordered by Buyer and as set forth in the Statement of Work identified and
         made a part of this Subcontract under the Subcontract Content and Order
         of Precedence article hereof.

(capitalization in original). [redacted]

         The parties included in the record at joint exhibit 78 an October 11, 2011 document
titled “[redacted] Global Ops Support,” which indicates the document was produced by
BNT-US and states on the cover page: “Proposal: NGC [Northrop Grumman Corporation]
Subcontract 7500057539, TI #16.” The “General Task Description” in the October 11,
2011 subcontract proposal states “Requested changes for JWARN Block 1F Signal Fire
support of the [redacted] Global Operations Project.” The parties also included in the
4   At the liability trial, the parties jointly moved to admit all joint exhibits into evidence.

                                                  8
record before the court joint exhibit 101, which is a June 25, 2012 bilateral change order
executed by Northrop Grumman and BNT-US. The June 25, 2012 change order indicates
that the change order was to a subcontract between Northrop Grumman and BNT-US,
Subcontract No. 7500057539, which is a different subcontract number than the
subcontract number listed on the January 31, 2009 subcontract. The Contract No. listed
on the June 25, 2012 change order, however, was the Contract No. for Northrop
Grumman’s ‘4091/NS05 Task Order discussed above. The June 25, 2012 change order
indicates that the value of Subcontract No. 7500057539 was increased by $[redacted] to
$[redacted]. The June 25, 2012 “Change Notice Title” was “Change Order to add of [sic]
funding for Signal Fire Maintenance Update,” and that BNT-US was to perform the work
for “Signal Fire Maintenance Update” between June 25, 2012 and September 23, 2012.
(capitalization in original).

      The parties also included as a joint exhibit Subcontract No. 7500112702, which is
a February 22, 2013 subcontract between Northrop Grumman and BNT-US. The
February 22, 2013 subcontract indicates that the subcontract was issued under Northrop
Grumman’s ‘4091/NS05 Task Order. The February 22, 2013 subcontract had a period of
performance from February 22, 2013 to September 23, 2013, during which period BNT-
US was to:

       [P]rovide the necessary personnel, material, and facilities, and exert its best
       efforts to do all things necessary or incidental to accomplish the effort as
       ordered by Buyer and as set forth in the Statement of Work identified and
       made a part of this Subcontract under Article XXVI- Subcontract Content
       and Order of Precedence.

Defendant contends that the software ultimately provided to the Republic of Korea and
the Kingdom of Jordan was delivered by BNT-US to the government as part of Northrop
Grumman’s “Global Operations” project under Northrop Grumman’s ‘4091/NS05
Contract, and that the software was not delivered under the ‘2076 Contract.

Deliveries of CRIDs to the United States

        BNT-Denmark and BNT-US assigned a unique Customer Release Identification
number (CRID) to each delivery BNT-US made to the government. The parties have
stipulated that, “[i]n the years after making the initial delivery of NBC-Analysis software to
the Government in 1998, BNT-Denmark and BNT-US developed and delivered to the
government additional software components” to incorporate government requests and
JPMIS requirements. As executed on May 13, 1998, the ‘2076 Contract contained five
Contract Item Line Numbers (CLINs), although additional CLINs were added to the ‘2076
Contract when the three modifications were executed, as discussed above. In May 1998,
BNT-US delivered an undongled disk operating system (DOS) version of NBC-Analysis
to the USMC. A May 19, 1998 invoice submitted by Bruce Windesheim, who, at that time,
was the vice president of BNT-US, to the USMC indicates that BNT-US billed the USMC
$[redacted] for the NBC-Analysis software, which appears to have been CLIN 0001 in the
‘2076 Contract. The May 19, 1998 invoice indicates that BNT-US was invoicing the USMC


                                              9
for the SUMA under the ‘2076 Contract, which was CLIN 0005 in the ‘2076 Contract, as
well as for training material, which was CLIN 0002. The government appears to have paid
BNT-US’ May 19, 1998 invoice on July 21, 1998. The May 19, 1998 invoice does not
include charges for a contractor training course, which was CLIN 0003 in the ‘2076
Contract, or a commercial software manual, which was CLIN 0004 in the ‘2076 Contract.
A delivery note indicates that BNT-US delivered software labeled as CRID 40 to the
USMC at Camp Pendleton in California on January 15, 1999. CRID 40 was a Windows
version of the NBC-Analysis software. The January 15, 1999 delivery note indicates that
CRID 40 was delivered under the ‘2076 Contract.

        The parties have stipulated that, as of June 3, 2004,5 the highest number CRID
BNT-US had delivered to the government was CRID 395. According to a delivery note
dated April 26, 2004, BNT-US delivered CRID 395 to the government, which was titled
“NBC-Analysis for MCS-X” and consisted of a CD-ROM containing NBC-Analysis, as well
as “MCS-X Proxy.” The description under MCS-X Proxy stated: “Contains the .NET
assemblies which represent the interface between NBC-Analysis and MCS-X.” The April
26, 2004 delivery note states that BNT-US’s delivery of CRID 395 was made to “JPM
NBC CA” at Aberdeen Proving Ground, Maryland, pursuant to “Project no” 202503.
Defendant asserts that CRID 395 was delivered under Contract No. DAAD13-03-F-A001
(the ‘A001 Contract) between the United States Army and BNT-US. The ‘A001 Contract
was awarded by “US ARMY ROBERT MORRIS ACQUISITION CENTER” at the
Aberdeen Proving Ground, Maryland, to BNT-US on January 16, 2003, with a value of
$[redacted]. The statement of work in the ‘A001 Contract stated that BNT-US “shall port,
integrate, and test the Joint Warning and Reporting Network (JWARN) Block 1 software
with the Army Battle Command System (ABCS)” and “shall upgrade and recompile the
current versions of the Nuclear, Biological & Chemical-Analysis (NBC-Analysis),
battlefield management modules, and Multipurpose Integrated Chemical Agent Alarm
(MICAD) communication modules for target ABCS systems.” (capitalization in original).

        In the ‘A001 Contract, CLIN No. 0001 states that BNT-US is to perform the
requirements in “Bruhn NewTech proposal BNI/202503/PPS/001 dated 20 Dec 02.” At
trial, Bruce Windesheim, who stated he currently was, and had been “for a while,” the
interim president of BNT-US, and whose signature block in documents from 1998
indicates he once was the vice president of BNT-US, testified that the “202503” in
“BNI/202503/PPS/001” in the April 26, 2004 delivery note associated with CRID 395 was
the “project number.” When asked whether the April 26, 2004 delivery note of CRID 395
was delivered pursuant to the ‘A001 Contract, Bruce Windesheim stated:

      I am not doubting that Exhibit 18 [the delivery described in the April 26, 2004
      delivery note] was delivered under the [‘A001] contract. What I don’t know
      with specificity is what items are covered by this document [the April 26,
      2004 delivery note] that relate to the items called for in the statement of
      work [in the ‘A001 Contract]. It may not have been the entire thing, as stated


5 As stated above, the parties have stipulated that the government had paid BNT-US for
all work performed under the ‘2076 Contract by June 3, 2004.

                                            10
       in 1.0, the statement of work in Exhibit 44 [the ‘A001 Contract]. I just don’t
       know.

Plaintiffs have not asserted that CRID 395 was delivered under the ‘2076 Contract. In
general, Mr. Windesheim struggled to recall the details of a number of relevant specifics
related to what had occurred, especially during cross-examination, and readily admitted
he was “not a software expert.”

         On October 25, 2011, BNT-US delivered “JWARN 1F Phase 2 for C2PC CRID
1414” on a “CD” to “JPM IS CM” in San Diego, California. An October 25, 2011 delivery
note states that CRID 1414 was delivered under “Our Order: Global Operations.” The
parties have stipulated that, at the time BNT-US delivered CRID 1414 to the government,
BNT-US was serving as a subcontractor to Northrop Grumman. Defendant asserts that
CRID 1414 was delivered to the government under BNT-US’ subcontract with Northrop
Grumman, not under the ‘2076 Contract. In a November 1, 2011 email message from
Ellen Billiter, an earlier employee of BNT-US, to an employee of Northrop Grumman, Ms.
Billiter stated she attached a monthly status report to her email “for the Global Operations
project.” The monthly status report, under “Schedule Status,” stated “Completed October
25, 2011 delivery to JPMIS CM,” the same date on which the parties have stipulated that
BNT-US delivered CRID 1414 to the government in San Diego, California.

       The parties also have stipulated that BNT-US delivered CRID 1489 to JPMIS on
September 28, 2012. The September 28, 2012 delivery note for “JWARN 1F Phase 2
Standalone CRID 1489” stated the BNT-US delivered CRID 1489 to JPMIS in San Diego,
California, under “order no: Global Operations.” Defendant asserts that CRID 1489 was
not delivered to the government under BNT-US’ ‘2076 Contract, but was delivered to the
government under BNT-US’ subcontract with Northrop Grumman.

       The parties further have stipulated that BNT-US delivered CRID 1490 to JPMIS on
September 28, 2012. The September 28, 2012 delivery note for “JWARN 1F Phase 2 for
C2PC CRID 1490” states that BNT-US delivered CRID 1490 to JPMIS in San Diego,
California under “order: Global Operations.” Defendant contends BNT-US delivered CRID
1490 under its subcontract with Northrop Grumman and did not deliver CRID 1490 under
the BNT-US ‘2076 Contract.

       Moreover, the parties have stipulated:

       The software object code in CRIDs 1414, 1489, and 1490 was compiled
       from a combination of COTS source code and GOTS source code. The
       software object code in all three deliveries included Government-owned
       components for Battlefield Management Functions. The software object
       code in CRIDs 1414 and 1490 included Government-owned C2PC
       integration code.




                                            11
In addition, the parties’ joint stipulation of facts states:

       Within each of the BNT-US deliveries to the Government designated as
       CRIDs 1414, 1489, and 1490, was a document titled “Software
       Administrator’s Manual for JWARN 1F Phase 2.” Within this document the
       following statement is found:

           JWARN 1F Phase 2 is an application based on a Commercial Off-
           The-Shelf (COTS) software package developed by Bruhn NewTech,
           Inc. (BNI). Additional Government Off-The-Shelf (GOTS) capabilities
           are included in the package. JWARN 1F is sponsored by the Joint
           Program Executive Officer for Chemical and Biological Defense
           (JPEO-CBD) and is managed by the JPM IS Program Management
           Office (PMO).

      The Software Administrator’s Manual for JWARN 1F Phase 2 for CRIDs 1414,
1489, and 1490 all state:




The parties have stipulated that the “software license agreement language displayed on
the screen is the same software license agreement language that is stated in the ‘2076
Contract.”




                                               12
      CRIDs 1414, 1489, and 1490 also each came with a “SOFTWARE VERSION
DESCRIPTION.” (capitalization in original). The Software Version Descriptions for CRIDs
1414, 1489, and 1490 all state:

       APPENDIX C. LICENSE AGREEMENT
       NOTICE!

       COMMERCIAL COMPUTER SOFTWARE

       RESTRICTED RIGHTS

       Notwithstanding any other lease or license agreement that may pertain to,
       or accompany the delivery of, this computer software, the rights of the
       Government regarding its use, reproduction and disclosure are as set forth
       in Government Contract No. M67854-98-C-2076.

       LICENSE AGREEMENT

       (Supplement to FAR 52.227-19)

       All software to be delivered under this contract including source codes, is
       commercial computer software subject to restricted rights specified in FAR
       52.227-19 “Commercial Computer Software - Restricted Rights” with the
       following additions to that clause:

       The Government may make an unlimited number of copies of the software
       and may distribute and use the software in any computers owned or leased
       by the Government and operated by the U.S. Government personnel
       working for U.S. Government departments, organizations and agencies.

       The Government’s use of the software shall be limited to use in fulfillment
       of functions of the Government of the United States.

       The Government shall not disclose the software and shall not give, sell,
       license or otherwise provide copies of the software or use of the software
       to any third party person or entity including but not limited to members of
       the public, governments of foreign countries, or international agencies or
       organizations.

(capitalization and emphasis in original).

         For CRIDs 40, 395, 1414, 1489, and 1490, defendant asserts that BNT-US
delivered “compiled executable software code.” Defendant asserts that BNT-US did not
deliver to the government the source code files needed to build the compiled executable
software code for CRIDs 40, 395, 1414, 1489, and 1490. According to defendant’s post-
trial brief:


                                             13
       The Federal Circuit described these concepts in Blueport [v. United States]:

          Source code is the text of a software program written in a human-
          readable programming language. Microsoft Computer Dictionary 491
          (5th ed. 2002). Once written, source code is compiled into machine-
          readable object code that runs on a computer. Id. at 372. Software
          programmers usually provide users with only the object code in
          order to prevent users from modifying the program. Theodore C.
          McCullough, Understanding the Impact of the Digital Millennium
          Copyright Act on the Open Source Model of Software Development,
          6 Marq. Intell. Prop. L. Rev. 91, 93-94 (2002).

       Blueport Co. v. United States, 533 F.3d 1374, 1377 n.1 (Fed. Cir. 2008)
       (emphasis added).

(emphasis in original).

Activities Related to the Republic of Korea

         According to the parties’ joint stipulation of facts, the United States Forces Korea
began using JWARN Block 1 in the Republic of Korea “no later than 2005.” At the liability
trial in the above-captioned case, Paul Moroney, who the parties jointly stipulated was an
employee of “SETA contractor Sentek,” testified. The parties also have jointly stipulated,
as an employee of Sentek, Paul Moroney “provided training and field support services for
all products that are acquired or managed by JPMIS, including JWARN Block 1F.” The
parties’ joint stipulation of facts also states Paul Moroney “has detailed knowledge of the
different JWARN versions, having regularly trained users over many years. [Paul]
Moroney was described as the ‘technical glue’ for the JWARN program.”

        At the liability trial, Paul Moroney testified about JWARN software and “Signal
Fire,” which was a plug-in used in the JWARN Block 1 software in the Republic of Korea,
as discussed below. The following discussion between counsel of record for plaintiffs,
Steven Lewicky, and Paul Moroney occurred:

       Mr. Lewicky: So am I understanding you that sometimes the words “NBC-
       ANALYSIS” and “JWARN Block 1” were used somewhat interchangeably?

       Mr. Moroney: Yes.

       Mr. Lewicky: Okay. And as part of your training responsibilities at Bruhn
       NewTech, were you intimately familiar with NBC-ANALYSIS and JWARN
       Block 1?

       Mr. Moroney: Yes.



                                              14
Mr. Lewicky: Have you ever -- are you familiar with the word -- with the term
“Signal Fire”?

Mr. Moroney: Yes.

Mr. Lewicky: And what does “Signal Fire” refer to?

Mr. Moroney: To sum up Signal Fire, it’s an enhanced capability added to
JWARN or NBC-ANALYSIS, if you want to call it that. Back in 2007 is when
we started the -- when the development for Signal Fire started, and it was
deployed in the Korean Peninsula. Basically it’s just some -- what we refer
to as plug-ins that were added to the JWARN program that allowed certain
capabilities to -- to allow the CBRN people and medical folks in the U.S.
military to collaborate using Signal Fire capabilities.

Mr. Lewicky: Just so we’re clear on what CBRN means, what does that refer
to?

Mr. Moroney: Chemical/biological/radiological/nuclear.

                                     ***

Mr. Lewicky: During your tenure with Bruhn NewTech and after that Sentek,
have you ever had occasion to do training in the Republic of Korea, South
Korea?

Mr. Moroney: Yes.

Mr. Lewicky: And as part of that training, did you interact -- did you train not
only on JWARN but also the Signal Fire plug-in aspect of it?

Mr. Moroney: Yes.

Mr. Lewicky: Can you tell us a little more about Signal Fire in the sense of
it -- does that have something to do with networking with the sensors related
to JWARN?

Mr. Moroney: [redacted]

Mr. Lewicky: [redacted]

Mr. Moroney: [redacted] So what Signal Fire did was it took that unclassified
took and then, basically on a secured network, and sent it up to the
CENTRIX-K network, which is a coalition network between the ROKs
[Republic of Korea] and the U.S. military. And so that data then was put
onto a map, and that’s what Signal Fire provided as a plug-in for JWARN,


                                      15
because one of the capabilities was to be able to see the sensor data on a
map for the entire peninsula and not just one installation.

Mr. Lewicky: Okay. Just so our recorded record is clear, could you spell out
the acronym CENTRIX?

Mr. Moroney: C-E-N-T-E-X-K. [sic]

Mr. Lewicky: [redacted]

Mr. Moroney: Yes.

Mr. Lewicky: [redacted]

Mr. Moroney: Correct.

Mr. Lewicky: And then the Signal Fire system essentially gave a network
capability to -- so you didn’t have to be physically next to the sensor to know
what it was assessing?

Mr. Moroney: Yes.

Mr. Lewicky: And how does the NBC-ANALYSIS/JWARN software come
into play with that?

Mr. Moroney: So basically Signal Fire -- we referred to them as Signal Fire
plug-ins. So you would -- you would have an installation of JWARN on a
computer, and then we would install the Signal Fire plug-ins, and then the
plug-ins would be configured to pull that data from the Signal Fire servers.

       So there’s -- there was two -- two servers we referred to as stage one
and stage two for Signal Fire, and basically stage one is on the unclassified
network, and then stage two is on the CENTRIX-K network. And
somewhere in there is what’s called a Radiant Mercury as a guard. So it
was a one-way traffic from unclassified to classified network.

       And so when you’re sitting at a JWARN terminal, you would be able
to see that data because of that -- that information flow from unclassified to
CENTRIX, and then from the server, it sends the data out to the plug-ins
once they’re configured on your client [laptop].

Mr. Lewicky: [redacted]

Mr. Moroney: Correct, yes.




                                      16
       Mr. Lewicky: And if I understood you correctly, then JWARN -- that -- the
       JWARN part of it allows analysis and prediction from that data?

       Mr. Moroney: Yes.

       Mr. Lewicky: And is that consistent -- was that consistent throughout your
       use of the software or teaching of the software in Korea?

       Mr. Moroney: [redacted]

               And there’s also some other plug-ins with Signal Fire, too, so medical
       surveillance reports, there was HAZMAT spot reports as well, but all that
       did was allow the medical folks in one portal to communicate with the CBRN
       side on any type of event that medical should be aware of.

       Mr. Lewicky: So these different plug-ins are basically taking data off the
       network that’s distributing the sensor data.

       Mr. Moroney: Yes.

       Mr. Lewicky: And one of those things -- one of those plug-ins taking
       information out of that sensor network is JWARN?

       Mr. Moroney: Correct.

       Mr. Lewicky: Excuse me.

       Mr. Moroney: And I just want to clarify that the sensors is just one aspect of
       Signal Fire. So the medical surveillance reports is a separate plug-in;
       HAZMAT spot reports was separate as well. So those are different
       capabilities that are included with the umbrella that we would call Signal
       Fire.

(capitalization in original).

       Michael Meyer,6 who the parties have jointly stipulated was an employee of SETA
contractor “SAIC/Leidos” and who “served as the ‘de facto’ program manager for the
JWARN Block 1F Signal Fire program,” testified that CENTRIX-K, mentioned above in
the testimony of Paul Moroney, was a coalition network between the United States and
Republic of Korea operated by the United States. (emphasis in original). Michael Meyer
stated that the United States “had that [CENTRIX-K] network locked down pretty tightly.
You can’t really take a laptop from one room and plug it into a port in another room and
expect it to work. It probably wouldn’t work that -- it wouldn’t work. You couldn’t move it.”
6  The parties filed a joint motion to designate portions of Michael Meyer’s deposition
testimony in lieu of live testimony at the liability trial, which the court granted. At the liability
trial, the parties also played a video recording of Michael Meyer’s deposition.

                                                 17
According to Michael Meyer, the “JWARN 1F software only works on a CENTRIX-K
approved laptop. The government -- you know, there’s a certain image that has to be
installed. It has to be plug into a network port that only the U.S. Government allows it to
be plugged into.” Michael Meyer stated that “you could disconnect the thing -- the
computer and take it anywhere you want,” “[b]ut it wouldn’t work.” Michael Meyer also
discussed the Republic of Korea’s development of “AKJCCS,” which stands for the Allied
Korean Joint Command and Control System. Mr. Meyer described AKJCCS as “a Korean
network, Korean only network, as opposed to CENTRIX-K, which is a coalition network.”
Michael Meyer stated that the CENTRIX-K network and the AKJCCS network were
“firewalled off.”

        At the liability trial in the above-captioned case, Marvin Sikes (Marty Sikes) also
testified. According to the parties’ joint stipulation of facts, from 2010 to the middle of
2015, Marty Sikes worked as an employee of John Hopkins University Applied Physics
Laboratory, which was a SETA contractor. As an employee of John Hopkins University
Applied Physics Laboratory, Marty Sikes served as the JPEO liaison officer at the United
States Forces Korea headquarters in the Republic of Korea. Regarding the CENTRIX-K
and AKJCCS networks, Marty Sikes testified:

       As they [the Republic of Korea] continued to develop their own classified
       network, AKJCCS, I believe they employed a contractor in Korea, I believe
       it was Samsung, to work with U.S. Forces Korea to drive requirements that
       would have a capability, so AKJCCS could talk to CENTRIX-K.

       So a few years down the road, what happened was U.S. Forces Korea said
       we’re not going to go to your new system. [redacted] We feel comfortable
       using the CENTRIX-K system. But there was an effort that would develop
       bridges, they called them, so the two could talk and share information.

        At trial, Paul Moroney testified that there was a “big push” to get the Signal Fire
plug-in operational in 2007. Paul Moroney testified that the United States Forces Korea
first used JWARN Block 1 software with the Signal Fire plug-in in front of members of the
Republic of Korea military during a “Key Resolve” exercise in 2007, which is an annual
joint military exercise between the United States Forces Korea and the Republic of Korea.
During the Key Resolve exercises, as well as during other joint training exercises, officers
of the Republic of Korea would work “hand in hand with the U.S. Forces” and would see
the technology and software being used by the United States Forces Korea. According to
Paul Moroney’s testimony at trial, the officers of the Republic of Korea were interested in
obtaining access to the JWARN Block 1 software, and, in approximately 2008, “people
were asking about how can the ROKs get that software as well.”

       According to the testimony of Marty Sikes [redacted] there was an “incident”
[redacted]. In his testimony, Marty Sikes stated that the [redacted] incident “kind of made
that issue [obtaining access to JWARN Block 1 software] rise on their [the Republic of
Korea’s] priority list.” Moreover, the parties’ joint stipulation of facts in the above-captioned
case provides:


                                               18
      As of January 31, 2012, the Republic of Korea viewed JWARN/Signal Fire
      as a vital capability for CBRN-related information sharing and situational
      awareness. As of January 31, 2012, ensuring that the Republic of Korea
      had access to CBRN-related information sharing and situational awareness
      was getting high-level attention from the Pentagon. USFK [United States
      Forces Korea] wanted its ROK counterparts to have JWARN Block 1F, so
      that ROK forces would be able to use the same software that the USFK was
      using. Scott White[7] gave specific direction, on several occasions over a
      time period greater than one year, to not ever give JWARN Block 1 to the
      Republic of Korea.

      On February 1, 2012, Marty Sikes sent an email message to Joseph Cartelli,
whose signature block states that Mr. Cartelli at the time was the “Deputy JPM for Bio-
Defense.” In the February 1, 2012 email message, Marty Sikes stated “attached is the
information paper providing an executive summary, background and intent of the ROK
JCS request.” Marty Sikes’ attached information paper, which was dated February 1,
2012, stated:

      The ROK JCS [Republic of Korea Joint Chiefs of Staff] has submitted a
      written request to USFK to install the JWARN1F / Signal Fire system
      software fielded by JPM-IS and used by USFK and U.S. Component CBRN
      and Medical HQ units for situational awareness of [redacted], medical
      surveillance events and warning and reporting of other CBRN incidents in
      the ROK. USFK will endorse the request and forward to JUSMAG-K [Joint
      United States Military Affairs Group Korea] for coordination with the JPEO-
      CBD. ROK JCS has indicated their desire to further discuss this topic with
      Dr. Parker and Mr. Weber during the Able Response-12 MPC [“midplanning
      conference”] scheduled 9-10 February in Washington D.C.

The February 1, 2012 information paper further stated:

      The intent of the request is to install the JWARN/Signal Fire system
      software on ROK JCS hardware located in ROK command Posts and EOCs
      operating on the ROKUS [Republic of Korea and United States] coalition
      network “CENTRIX-K”. USFK has authorized ROK JCS access to
      CENTRIX-K and will endorse their request to install the JWARN1F / Signal
      Fire system. Although a timeline has not been formally established recent
      activity and communication from ROK JCS and CFC [Combined Forces
      Command], coupled with their intent to discuss this with Dr. Parker and Mr.
      Weber during the MPC indicate fielding this capability is a near term goal of
      the ROK JCS.


7As noted above, the parties have stipulated that Scott White has been the Joint Project
Manager for Information Systems for the Chemical and Biological Defense Program since
June 2006.

                                           19
        At the liability trial, Marty Sikes testified the “midplanning conference” referenced
in his February 1, 2012 information sheet related to a meeting involving planning for an
upcoming “Able Response” exercise. Marty Sikes testified that Able Response was an
annual joint exercise between the Republic of Korea and the United States “focused on
implementing a whole-of-government approach to biological defense on the Korean
Peninsula.” Marty Sikes also stated that “Able Response was an initiative supported and
driven by ASD Weber, Assistant Secretary of Defense Weber. Deputy Assistant Secretary
of Defense Parker was ASD Weber’s deputy, and he was primary to the person in charge
of planning it.” According to Marty Sikes, Andrew Weber, who was the “the Assistant
Secretary of Defense for Chem/Bio/Nuc Defense,” and Dr. Gerald Parker, who was “the
Deputy Assistant Secretary of Defense for Chem/Bio Defense,” attended the midplanning
conference in February 2012. During the liability trial, Marty Sikes and counsel of record
for plaintiffs had the following discussion:

       Mr. Lewicky: [S]o you say in this information paper that the ROK Joint Chiefs
       of Staff has submitted a written request to U.S. Forces Korea to install
       JWARN for situational awareness. Is that the same request that we
       discussed a few moments ago?

       Mr. Sikes: Yes, it is.

       Mr. Lewicky: And it says that the ROKs wish to further discuss with Dr.
       Parker and Assistant Secretary of Defense Weber during Able Response
       MPC February 9th and 10th. What is “MPC” in this context?

       Mr. Sikes: Midplanning conference.

       Mr. Lewicky: And so was that a planning meeting in advance of Able
       Response?

       Mr. Sikes: Yes, it is.

       Mr. Lewicky: Do you know whether the ROKs did, in fact, discuss this with
       Mr. -- with Secretary Weber or Dr. Parker during that planning meeting?

       Mr. Sikes: Yes, they did.

       Mr. Lewicky: Now, at that -- at that meeting, that planning meeting, do you
       know specifically who made the request? In other words, what -- was it a
       general officer or was it a representative of the Korean Government?

       Mr. Sikes: I don’t recall who from the Korean Government attended that
       meeting, but it would have been the most senior delegate there.




                                             20
       Mr. Lewicky: Okay. And either during or coming out of that meeting, do you
       recall whether you were directed to take further action by the official -- the
       American officials in that meeting?

       Mr. Sikes: Well, yeah, the -- the decision that was made during that meeting
       is the U.S. would provide access to the ROKs for JWARN, and I would relay
       that, yes.

In plaintiffs’ post-trial brief, plaintiffs assert that a “decision was made” during the February
2012 midplanning conference for the United States to “provide the ROK with its own
access to JWARN.”

       According to the parties’ joint stipulation of facts:

       On March 20, 2012, Marty Sikes and Paul Moroney – Government SETA
       contractors – delivered two C2PC laptop computers containing, inter alia,
       images of JWARN Block 1F Phase 2 C2PC CRID 1414 to Republic of Korea
       personnel at Republic of Korea armed forces facilities. Sometime between
       October 27, 2011 and March 20, 2012, the Government made one or more
       copies of JWARN Block 1F Phase 2 C2PC CRID 1414 in San Diego and
       transferred one or more copies from San Diego to USFK. The software was
       thereupon copied (or imaged) onto the above laptops by Mark White[8] – a
       Government SETA contractor – while he was inside his workplace in a
       building in South Korea operated and controlled by the Government.

       The JWARN Block 1F Phase 2 C2PC CRID 1414 software provided to ROK
       forces was the exact same software image that USFK was using at the time.

(capitalization and emphasis in original). The parties have stipulated that neither BNT-US
nor BNT-Denmark “expressly authorized, licensed, or g[ave] permission to the
Government” to “duplicate” the software licensed under the ‘2076 Contract or to distribute
copies of the software licensed under the ‘2076 Contract to the Republic of Korea.

       Both Marty Sikes and Paul Maroney testified at trial regarding the transfer of two
laptop computers containing CRID 1414 to the Republic of Korea on March 20, 2012, as
well as the subsequent transfer of five laptop computers containing images of CRID 1490
to the Republic of Korea, as discussed in detail below. Marty Sikes testified:



8 The parties’ joint stipulation of facts provides: “Mark White, an employee of SETA
contractor Group W, was a software engineer supporting the U.S. Forces Korea (USFK)
J35 Plans Operations Analysis Branch (J35) in the Republic of Korea (ROK), and in that
capacity provided support for JWARN Block 1F Signal Fire computers, servers and
networks.” Paul Moroney also testified that Mark White put JWARN software on the two
laptop computers delivered by Paul Moroney and Marty Sikes to the Republic of Korea in
March 2012.

                                               21
Mr. Lewicky: Okay. And following that [the midplanning conference], was
access provided in two command centers in or around February of 2012?

Mr. Sikes: I believe so, yes.

Mr. Lewicky: And, specifically, do you recall whether you personally made
delivery of laptops?

Mr. Sikes: No. I don’t deliver laptops to the Koreans.

Mr. Lewicky: Okay. My recollection is that -- well, do you recall at any point
that you and Mr. Paul Moroney visited Korean command centers?

Mr. Sikes: Yes.

                                    ***

Mr. Lewicky: Do you recall the -- whether any materials, computers, or
software was brought by either of you to that visit?

Mr. Sikes: I don’t recall whether Paul brought them over or if they were
already there. The intent of the visit was to provide training on JWARN and
Signal Fire.

Mr. Lewicky: Very well. And do you recall during that visit to the Korean
command post whether JWARN software was accessed on the computers
by the Koreans?

Mr. Sikes: I’m assuming it was, because he did provide training and
familiarity to the operators, the Korean operators.

Mr. Lewicky: And can you estimate how long that training lasted?

Mr. Sikes: An hour to two hours.

Mr. Lewicky: Okay. And was it on the functionality of JWARN and CBRN
reporting?

Mr. Sikes: Yes.

Mr. Lewicky: Okay. Do you recall whether, at the conclusion of that training
session at the Korean command post, whether any of the equipment
brought by the American side was left at the Korean command post?

Mr. Sikes: I don’t remember, because I don’t remember if there was
equipment delivered to the command post. It could have already been there,


                                     22
      and if I -- and if I can, I’ll say that the intent was to train the Koreans on
      JWARN and -- on the JWARN software and Signal Fire. So if that was the
      intent, that means that obviously they had an image or something on those
      laptops so Paul could train on.

              I don’t recall us bringing anything there or taking anything back. Paul
      could have delivered those laptops and trained on them, but, again, I don’t
      recall if they were there at the time or not.

        According to Marty Sikes, “Major Connor,” the “chief of the Countering Weapons
of Mass Destruction Office for U.S. Forces Korea,” “definitely” “would have been aware”
of the training provided by Paul Moroney to the Republic of Korea in March 2012. Marty
Sikes also testified that he understood that the “access” provided to the Republic of Korea
was to be for a temporary duration. Marty Sikes stated: “It was our understanding that at
the end of their assessment of JWARN, they would make a decision on what the -- the
Republic of Korea would make a decision on what the next step would be, whether they
would purchase it outright or go in a different direction.”

       In Paul Moroney’s testimony, regarding the same transfer of two laptop computers
containing images of CRID 1414 in March 2012 discussed by Marty Sikes above, Mr.
Moroney stated that he and Marty Sikes “hand-delivered” to the Republic of Korea “two
temp-loan laptops to two different locations.” Mr. Moroney stated that one laptop
computer was delivered to Command Center Seoul (CC Seoul), which is a joint command
bunker located at United States Army Garrison Yongsan, while the second laptop
computer was delivered to the Republic of Korea’s Ministry of Defense. According to Paul
Moroney:

      [F]irst they signed for it, so Marty had a -- I don’t know the number of the
      form, but there’s an Army form that USFK required, and so whoever we
      gave the laptop to signed for it. So it was a temporary loan; it wasn’t a
      permanent transfer. And then we connected to the network. We logged in.
      We made sure that the operator that was there at the time was able to log
      in to the machine, and then we op-checked, basically operations-checked
      on JWARN and made sure that all the Signal Fire data was coming through,
      the sensors and things like that, so we didn’t have any issue there.

            And then we kind of just walked through the creation of -- I think it
      was chem-1s, to produce a chem-2 and a chem-3, a chemical-1, 2, and 3.
      And we kind of went over the Signal Fire plug-ins, because that’s really what
      they were looking for, is that sensor data.

Paul Moroney indicated that the two laptop computers containing CRID 1414 were left at
the facilities at which the laptop computers were respectively delivered, and that he did
not know whether Republic of Korean personnel “moved” or “used” the laptop computers
after Marty Sikes and he left the facilities “because as soon as my travel’s done, I leave.



                                            23
Marty would have been able to have conversations with those individuals to see if they
were using the system or not.”

      After delivering the two laptop computers containing CRID 1414 to the Republic of
Korea, in an email dated March 21, 2012, Paul Moroney stated:

      Just a heads up.

      1. We officially have JWARN/Signal Fire up and running in the Ministry of
      National Defense Republic of Korea (MND). In one of their command
      bunkers, they have one client running C2PC/JWARN/Signal Fire. This was
      approved by JPEO. We are waiting for the ROKs to request in writing JEM
      [Joint Effect Models], which should happened later this week or next. Side
      note: Marty and I went over there yesterday and ensured the system was
      up and running. It was and we provided another two hours worth of training
      to their main operator.[9] I got to go inside one of their main bunkers, where
      a lot of white folks don’t get to see. MND [Ministry of Defense] is to the
      Koreans as the Pentagon is to the US.

      2. The ROKs will also request in writing and it will be approved by JPEO
      training on JWARN/Signal Fire and JEM. I provide Marty with dates in May
      we can conduct the training. Training will take place in here in Korea
      (Yongsang Army Garrison) is our initial guess. Details will be worked out
      once we get the request and Marty sends it over to the JPEO for his
      approval. Student count will be around 6-10 and their will provide interpreter
      for the class.

      This is big news up at the JPEO level and more will come soon...

(ellipses in original). At the trial, while looking at the immediately above March 21, 2012
email message, counsel of record for plaintiffs asked Mr. Moroney “[w]hat was your
understanding of the approval that had been given by the JPEO?” Mr. Moroney
responded: “From Marty Sikes. He was the one that told me that we can go and deliver
these laptops.” Counsel of record for plaintiffs also asked Paul Moroney about the
statement in his March 21, 2012 email message that “[t]he ROKs will also request in
writing and it will be approved by JPEO training on JWARN/Signal Fire and JEM.” Paul
Moroney testified that he anticipated the training to be approved “[b]ased upon
discussions with Marty Sikes.” Paul Moroney, however, testified that the future training
referenced in his March 21, 2012 email message did not occur.

     On April 2, 2012, Curt Wall, who Paul Moroney stated was the acquisition program
manager for the Joint Effects Model, also referred to as “JEM,” sent an email message to


9When asked at trial about the length of the training provided to the Republic of Korea,
Paul Moroney stated that the training was not two hours long, but that the “whole trip” was
about two hours long.

                                            24
Michael Bingham, which Curt Wall appears to have forwarded to Mr. Moroney. In the April
2, 2012 email message, Curt Wall stated:

       I wouldn’t touch this [transfer of laptop computers with JWARN software to
       the Republic of Korea] with a 10 foot pole until I saw the authority docs to
       do so….I’d just tell Paul to be very careful.

       The COCOM can authorize things like this. I’m not sure what they’ve done
       to effect this release. Since it was JWARN all along, I haven’t considered it
       for my concern. This is a different org that is providing JEM to the ROKs. I
       don’t know what release/authorization they’ve gone thru….

(ellipses in original). On April 3, 2012, Paul Moroney responded in an email message
stating:

       Let me break this down shotgun style.

       1. We did not give them software media, just the standard 8TH Army CBRN
       image for use on the Secret/ROK network. Joint network with US

       2. They cannot use JEM or JWARN on any other machine other than the
       one given to them from JPEO. The [sic] do not have the media to install it.

       3. The JPEO gave the approval for Marty/J35 to do this effort with the ROKs.

       Bottomline is we really didn’t give them anything they haven’t already had
       access to. The main difference is they are using our software 24/7 instead
       of just during exercise time and at different locations.

(capitalization in original).

       Paul Moroney forwarded his April 3, 2012 email message to Marty Sikes, who
responded to Mr. Moroney in an email message stating: “Send to Mike Meyer if you need
top cover.” Paul Moroney then forwarded the email message string to Michael Meyer,
stating: “For ur [your] SA [situation awareness].” At trial, Paul Moroney testified that he
understood Marty Sikes’ email message involving “top cover” to mean to “[j]ust to make
sure that the -- that the deputy program manager for JWARN1F understands what’s going
on.”

       Throughout the trial in the above-captioned case, witnesses testified as to what
actually was given to the Republic of Korea when the two laptop computers containing
JWARN Block 1F Phase 2 C2PC CRID 1414 were transferred to the Republic of Korea
on March 20, 2012. Marty Sikes testified:

       I want to say that, to my recollection and knowledge -- and maybe it’s a play
       with words -- but we didn’t give -- we, the U.S. Government -- didn’t give


                                            25
      software; we didn’t give software code to the governments. We gave them
      access to an imaged laptop that was co-owned by the U.S. Government.

According to Marty Sikes, providing the Republic of Korea with “the software and the code
versus giving them access I think are two different things.” Marty Sikes also testified:

      I didn’t give software, CDs. I’m not an IT professional, so I’m not giving
      anything to anyone on the software side. I facilitate, and I message back
      and forth, and I track, but I’m -- I’m not a mechanic, so I’m not working on
      cars and I’m not delivering laptops and software.

Marty Sikes stated that “[i]t was my understanding that we were never giving the Koreans
software or code; we were only giving them access.” Marty Sikes asserted that, to the
extent of his knowledge, no one “at USFK gave the Koreans the software or code for
JWARN,” as the Republic of Korea only was given “access so they could share
information. We didn’t give them the code so they could break it or we didn’t give them
the software to do as they pleased with it, as I understand it.”

        Moreover, in an email message dated May 8, 2012, Marty Sikes stated:
“JWARN1F/Signal Fire is releasable to the ROKs as I understand however USFK does
not have authority to ‘give’ the ROK Government the software or code. At the current time
USFK is providing ROK CFC [Combined Forces Command] and JCS [Joint Chiefs of
Staff] limited access to the system via the CENTRIX-K network.” At trial, Marty Sikes
testified that the “limited access” referenced in his May 8, 2012 email message meant
“they [the Republic of Korea] were able to log on, leverage the system, but they did not
have the software CDs to load it up and things of that nature.” Similarly, regarding the
transfer of two laptop computers containing JWARN Block 1F Phase 2 C2PC CRID 1414
to Republic of Korea personnel in March 2012, Paul Moroney testified:

      Having access to the data and physically having access to the program are
      two different things. . . . So that that should be separated, because if I’m
      working next to somebody that’s using a program and they’re briefing me
      with a slide -- with slides or whatever command brief we’re doing, I -- I can
      see the data; it’s just I don’t have access to the tool that’s producing it. But
      there has -- 2012 or ‘13 is when we -- is when we physically gave or temp-
      loaned, I should say, laptops that were -- with the standard USFK image
      that had JWARN on it. The C -- the command and control personal
      computer is what it’s called, C2PC, version of the JWARN1F.

       Paul Moroney also testified concerning the controls on the laptop computers
provided to the Republic of Korea, stating:

      If you’re referring to being able to plug, like, a USB drive or anything like
      that, there -- those computers are locked down to where you can’t copy the
      -- you can’t image the hard drives. Back then, it was -- Bitlocker was the tool



                                            26
      that the network administrators used. So you were not able to image or copy
      the hard drive.

Paul Moroney described Bitlocker as:

      [A] commercial product that a lot of U.S. Government organizations are
      using, and it prevents people from copying a hard drive. It also prevents you
      from taking that hard drive and putting it into -- and using it in another
      computer. So if you have two of the exact same computers, you take one
      hard drive out and try to put it in the other, you can’t do that. . . . It basically
      encrypts the hard drive to use on that one shell, one computer only.

       On May 23, 2012, Michael Smith, “Program Director, Critical Reagents Program,”
sent an email message to Brigadier General Jess Scarborough, in which Mr. Smith stated
that he was summarizing for Brigadier General Scarborough meetings between the
United States and Republic of Korea related to preparation for Able Response 2012. In
the May 23, 2012 email message, Mr. Smith stated:

      ROK participants communicated awareness of modeling and simulation
      tools JEM, JOEF, and HPAC. They also communicated that they had taken
      receipt of JWARN. We, USG [United States government], did not appear to
      have an awareness of the ROK capability. This observation served as the
      foundation for the following observation and recommendation presented to
      the senior leaders on the final day of the meeting. During the hot wash, Mr.
      Weber expressed concern over the ROK interest in modeling tools, which
      are identified above, that are becoming obsolete. He echoed the sentiment
      of many participants when he suggested that we work with our ROK
      counterparts in integrating tools that leverage social media into our
      collaborations resulting from AR12.

On May 23, 2012, Brigadier General Scarborough sent an email message to Mr. Smith
thanking him for his summary and asking him to forward the summary to his staff.

       On July 28, 2012, Marty Sikes sent an email message to a group of individuals Mr.
Sikes described in his testimony at trial as “leadership from JPM-IS.” In the July 28, 2012
email message, Marty Sikes stated:

      I have a good news story to share. The Chairman of the ROK Joint Chiefs
      of Staff presented Paul Moroney with a Certificate of Commendation last
      week. This was awarded to Paul based on his performance and skills
      demonstrated while assisting the ROKs with accessing and utilizing
      JWARN1F/Signal Fire in the ROK JCS B-1 Bunker at MND and inside the
      ROK CBRN Cell at the Crisis Control (CC Seoul), located in USFK/CFC
      White House on the Yongsan Garrison. For the first time the ROKs
      independently monitored JWARN1F/Signal Fire during both Key Resolve-
      12 and the Nuclear Security Summit.


                                              27
At the liability trial, Paul Moroney testified that, when a General from the Republic of Korea
provided him with the Certificate of Commendation, the General from the Republic of
Korea also gave Mr. Moroney a watch and a coin. Additionally, Paul Moroney stated that
he received from a United States General “an email letter, a generic letter basically, a
kind of fill-in-the-blank type thing that references this here, saying I did a good job and
whatnot.”

       Less than five months later, on December 11, 2012, Marty Sikes sent an email
message to Michael Meyer and two other individuals, on which Paul Moroney was copied,
stating:

       USFK will provide JWARN1F/Signal Fire access to five additional ROK HQ
       level Command Posts via CENTRIX-K C2PC clients in early January and is
       requesting Paul Moroney to support a combined ROK/US JWARN1F
       CONOPS workshop 4-8 February 2013. Provided support will include an
       onsite overview of JWARN1F/Signal Fire to ROK operators at each of the
       five CP’s [command posts] followed by a scenario driven workshop.

The parties have stipulated that Marty Sikes provided five additional laptop computers to
the Republic of Korea. The parties’ joint stipulation of facts provides:

       By January 2013, Marty Sikes delivered five additional C2PC laptop
       computers containing, inter alia, images of JWARN Block 1F Phase 2 C2PC
       CRID 1490 to Republic of Korea personnel at Republic of Korea facilities.
       Sometime between October 1, 2012 and the end of January 2013, the
       Government made one or more copies of JWARN Block 1F Phase 2 C2PC
       CRID 1490 in San Diego and transferred one or more copies from San
       Diego to USFK. The software was thereafter copied (or imaged) onto the
       above laptops by Mark White while he was inside his workplace in a building
       in South Korea operated and controlled by the Government.

(emphasis in original). Paul Moroney testified at trial that he did not recollect whether the
five additional laptop computers containing images of CRID 1490 were delivered. Paul
Moroney did, however, state that he provided a one-week training course on JWARN
“software” to soldiers from the Republic of Korea in February 2013. Thus, the following
two deliveries to the Republic of Korea appear to have been made: (1) a delivery of two
laptop computers containing “images of JWARN Block 1F Phase 2 C2PC CRID 1414” on
March 20, 2012; and (2) a delivery of five laptop computers containing “images of JWARN
Block 1F Phase 2 C2PC CRID 1490” “[b]y January 2013.”

       According to the parties’ joint stipulation of facts:

       Once the seven laptop computers containing images of JWARN Block 1F
       Phase 2 C2PC CRID 1414 and/or JWARN Block 1F Phase 2 C2PC CRID
       1490 software were delivered by Sikes and/or Moroney to Republic of Korea


                                              28
       personnel, the United States Government had no way of knowing where the
       laptops computers were, or what was being done with them.

The parties also have stipulated that BNT-US first learned that laptop computers
containing JWARN Block 1F software had been provided to the Republic of Korea on
March 12, 2013.

        During the liability trial, the following exchange between counsel of record for
plaintiffs and Mr. Moroney occurred:

       Mr. Lewicky: And do you know who authorized or directed that particular
       delivery [of two laptop computers on March 20, 2012] to those two facilities?

       Mr. Moroney: The actual person, no, I don’t.

       Mr. Lewicky: Do you know what office or part of the Government directed
       it?

       Mr. Moroney: It would have -- no, I don’t. It would -- my -- I do know that
       Marty was working with JPM-IS to get approval to -- to deliver those laptops,
       but the actual inner workings of who said yes and when, I wasn’t privy to
       that.

At the liability trial, however, Marty Sikes testified that, “as a contractor, I didn’t have the
authority to tell the Republic of Korea they could purchase JWARN or not,” that he did not
“have authority to tell the Government to sell” JWARN, and that he did not have
“contracting authority” while in the Republic of Korea. At the liability trial, Nicholas Kim, a
Department of Justice trial attorney, asked Marty Sikes about his “authorization” to
“facilitate” the transfer of laptop computers containing JWARN software to Republic of
Korea personnel, as follows:

       Mr. Kim: [D]o you have any written authorization from JPM-IS to provide the
       Koreans access to JWARN?

       Mr. Sikes: Not that I can recollect.

       Mr. Kim: Okay. So no documents supporting or no documents authorizing
       access to the Koreans?

       Mr. Sikes: No.

On redirect examination, the following colloquy between counsel of record for plaintiffs
and Marty Sikes occurred:

       Mr. Lewicky: You were being asked about some monthly reports where it
       discussed discussions and that sort of thing, and the questions were along


                                              29
       the lines of you never had any written authorization for the Koreans to
       provide access.

       Mr. Sikes: I don’t recall seeing written acquisition.

       Mr. Lewicky: Is there any doubt in your mind that you had actual
       authorization from JPM-IS and JPEO to give the level of access to JWARN
       that the Koreans were given?

       Mr. Sikes: Well, I wouldn’t be given authorization, because I didn’t have the
       authority to direct or give anything to anyone. The authorization would have
       began -- would have been, okay, we’re going to give the Koreans access,
       so execute. I would communicate that message across all the players.

       Mr. Lewicky: And that message that you’re summarizing as we are going to
       give access to the Koreans, please execute, did that message come down
       the chain of command?

       Mr. Sikes: Yes, it did.

       Mr. Lewicky: And how do you know it came down the chain of command?

       Mr. Sikes: In discussions, my monthly reports. I mean, often, people would
       come over to Korea and they could observe what’s -- what’s taken place.
       They can see for themselves who’s using JWARN and who’s not.

        In the above-captioned case, defendant contends that the United States did not
authorize the transfer of laptop computers containing JWANR software to the Republic of
Korea. According to defendant’s post-trial brief, “[a]t best, BNT-US established only that
Government contractors took actions contrary to unilateral terms that BNT-US included
in its deliveries years after the end of the ‘2076 Contract. BNT-US’s breach of contract
claim is deficient.” According to plaintiffs, the “Government is responsible for its actions,
even when undertaken by its contractors,” because “employees of the Government
directed the transfers, and knew they were taking place.”

Activities Related to Jordan10

       The parties have jointly stipulated:

       In 2013, in response to the collapse of the Syrian government, the United
       States Government, through the Defense Threat Reduction Agency
       (DTRA), along with US-CENTCOM [United States Central Command] and
       with assistance from JPEO-CBD, provided the Jordanian military with
10At trial, the parties presented significantly more testimony about the Republic of Korea
than was presented about the Kingdom of Jordan.


                                              30
       millions of dollars in CBRN equipment, including the provision of ten[11]
       laptop computers containing JWARN Block 1F software.

At the liability trial, Paul Moroney testified that DTRA and US-CENTCOM provided the
Kingdom of Jordan with CBRN-related equipment in order for the Kingdom of Jordan to
be able to respond to a CBRN-related incident in Syria. As stated by counsel of record
for defendant at the closing argument, “with respect to the Jordanian transfer, we actually
do agree that that aspect was authorized by the Government, but with respect to the
Korean transfers, that’s where we have a fundamental disagreement as to whether that
was authorized by the Government.”

       The parties have jointly stipulated that Paul Moroney imaged the hard drives of the
ten laptop computers with images of JWARN Block 1F software, which BNT-US originally
had delivered to JPMIS in San Diego, California, on September 28, 2012. The parties
further jointly stipulated:

       Sometime between October 1, 2012 and October 2013, the Government
       made one or more copies in San Diego of JWARN Block 1F Phase 2
       Standalone CRID 1489. Sometime between October 1, 2012 and October
       2013, Moroney loaded JWARN Block 1F Phase 2 Standalone software on
       these ten laptop computers at a Leidos facility in San Diego, California,
       configured the program, and shipped the computers to DTRA for re-
       shipment to Jordan. In October 2013, the ten laptop computers were
       delivered to Jordan.

As noted above, “Standalone” JWARN Block 1 software is “a version of JWARN Block 1
capable of operating in isolation from a network or a command and control host.” Although
the parties stipulated that the ten laptop computers were delivered to Jordan in October
2013, both parties state in the post-trial briefs that the laptop computers were shipped to
Jordan in August 2013 and were received by Jordanian armed forces on or before
September 4, 2013. Indeed, in a July 31, 2013 email message from Mike Skinner, whose
email message signature block indicates he worked in product support and property
control at JPMIS, Mr. Skinner stated that the ten laptop computers were to be shipped to
Jordan on August 1, 2013.

       According to the parties’ joint stipulation of facts, as well as the testimony of Paul
Moroney, Paul Moroney visited Jordan and provided training to Jordanian armed forces
in March 2013, October 2013, and during the spring of 2014. During the liability trial in the
above-captioned case, Paul Moroney testified that, during the March 2013 training
session, which occurred before the ten laptop computers were shipped to Jordanian
11 At the liability trial, Paul Moroney testified that “we were tasked to purchase 11
Panasonic Toughbook laptops and provide the joint warning reporting capability or
warning capability to the Jordanians through the JPO.” An attachment in a string of email
messages between Paul Moroney and individuals associated with JPMIS, however, lists
ten Panasonic Toughbook laptops as being included in the government’s transfer of
laptop computers to the Kingdom of Jordan.

                                             31
armed forces in August 2013, Paul Moroney provided a training session using laptop
computers from Mr. Moroney’s “set from my normal training inventory” at a Jordanian
“compound” called “KASOTC.” (capitalization in original). Mr. Moroney stated that, when
the March 2013 training session concluded, he brought his “set” of laptop computers back
to the United States.

       At the liability trial, Paul Moroney testified as to what actually was provided to the
Kingdom of Jordan. According to Paul Moroney, the Kingdom of Jordan received laptop
computers with JWARN Block 1F standalone installed. Paul Moroney testified that he did
not provide the “software disk” or JWARN Block 1F standalone source code to the
Jordanians. Paul Moroney also testified that he removed all “installation files” from the
laptop computer provided to the Kingdom of Jordan. In between training sessions, Paul
Moroney testified that the laptop computers were stored at Jordanian controlled facility,
which Mr. Moroney described as being a facility that “was bought and purchased by
DTRA, built for them [the Jordanians] specifically, and then the actual facility was turned
over to the Jordanians from DTRA.” The parties’ joint stipulation of facts also provides
that, in between training sessions administered by Paul Moroney, the ten laptop
computers were stored in “locked cases” in a “warehouse” in Zarqa, Jordan, which was
controlled by Jordanian armed forces. Mr. Moroney stated that the laptop computers were
stored in “Pelican cases, hard-sided cases that you can ship laptops in.” Paul Moroney
further testified:

       So the laptops themselves were stored and locked in the Pelican case. So
       when I -- when I show up for training, the day before, I -- usually it’s a
       Saturday. I come in Saturday, go into the storage area, grab the Pelican
       case out, get -- there’s -- the XO [executive officer] of the Chemical Support
       Unit has the key most of the time. He would unlock it, bring it into the
       classroom, and we would set everything up and then start training on
       Sunday. And then when we’re done, we would simply put everything back
       in the box, lock it back up.

Paul Moroney stated that the executive officer was an officer in the Jordanian military,
and that the Jordanian executive officer maintained a key for the locked boxes containing
the laptop computers.

        Paul Moroney also testified regarding the Jordanians’ use of the laptop computers,
stating, “[o]ther than the training products that we did jointly in a classroom environment,
no, I didn’t see any evidence of JWARN being used at all.” According to Paul Moroney:

       When we set up the classroom prior to training, we took the laptops out, set
       them out, and then they were either brought back to the hotel the night
       before training, and I’d connect them to the commercial network at the hotel
       to update Windows, Internet Explorer, that type stuff. And then I would take
       the laptops back the next day, set up the classroom.




                                             32
       So the -- every time that I was able to do that, which was every trip basically,
       there was no evidence -- and I hate saying this, because we spent a lot of
       money on them, DTRA spent a lot of money -- but there was no evidence
       that they were being used other than us conducting training.

When asked by Nicholas Kim of the Department of Justice what Paul Moroney meant by
“no evidence,” Mr. Moroney responded:

       Data products that are produced from JEM or JWARN. If you open the
       program, you can -- you’ll see the data or the output results in a PowerPoint
       slide or something like that. The only data that I saw literally from every trip
       was the data we left behind when we conducted training.

       So there was no new -- no new introduction of data that was on those
       laptops from the time that I left to the next time that we trained . . . .

       Paul Moroney, however, testified that the ten laptop computers provided to the
Kingdom of Jordan did not contain Bitlocker or a similar type of “protective software.” Paul
Moroney stated that the Jordanians “can copy the hard drive. Yeah, they can copy the
hard drive, yes. If they took it out and put it into another machine, they could do that.”
Paul Moroney also testified that he would not know whether the Jordanians turned the
ten laptop computers on or off in between training session and would not know “whether
software was copied off of those laptops to another location.”

        Paul Moroney stated that, after the conclusion of the training session he provided
to the Kingdom of Jordan in March 2013, he attempted to build a map to be used in the
JWARN software, but the JWARN software “crashed” each time Paul Moroney attempted
to import the map. According to Paul Moroney’s testimony at the liability trial, the map Mr.
Moroney was attempting to create was a map of “Syria, Iraq, Jordan, and some other
places, Israel and Lebanon.” In an email dated May 6, 2013, Paul Moroney stated that he
had put in a request with the “Help Desk” in an attempt to get BNT-US to address the
mapping issue Mr. Moroney had been experiencing. (capitalization in original). Mr.
Moroney also stated in the May 6, 2013 email message that “[w]e sent the files over to
BNI [BNT-US] a while ago but still haven’t gotten any work back from them. Sean [who
has a “navy.mil” email address] has tried to follow up with BNI but hasn’t gotten any thing
[sic] back as of late last week.”

       In a May 21, 2013 email message from Michael Meyer, who the parties stipulated
was a contractor and the de facto program manager of the JWARN Block 1F Signal Fire
program, to Josh Rohrback, who, at that time, was an employee of BNT-US, Michael
Meyer asked whether Mr. Rohrback had an opportunity to speak with Lisa Dunham of
JPMIS regarding the Jordan-related mapping issue experienced by Paul Moroney. Also
on May 21, 2013, Michael Meyer sent an email message to Paul Moroney stating: “When
you went to Jordan, which JWARN did you set up for them - Block 1 or INCR [increment]
1? I’m assuming it was JWARN 1F. I got some backlash from BNI, since evidently their



                                             33
license to the government doesn’t cover giving it to the Jordanians. What have you
heard?” That same day, Paul Moroney responded stating:

      It’s 1F SA [JWARN Block 1F standalone] and we haven’t gave it to them.
      We are giving them systems with it installed, not the actual software disc.

      Nobody really knows what we can or cannot do with it as in FMS. JPEO
      doesn’t seem to care and they want it done to support the AOR [area of
      responsibility]. I believe Mike N was looking at contract infromation [sic] for
      BNI and what we can do with the software.

      Who is telling them we do? They should keep a tight lid on that information.

Mr. Moroney sent another email message to Michael Meyer nine minutes later, stating:
“not sure but it could cause problems I am guessing. how come they haven’t said anything
about us giving it to the Koreans?” Michael Meyer responded in an email message stating:

      Actually they have said stuff...at least the guys in Maryland did. But they
      have kind of looked the other way since there were small numbers of
      workstations involved, and because JPMIS didn’t provide SW
      media/manuals/training.

      Actually JCISA [Joint Command Information Systems Activity] was more
      perturbed (than BNI) in Korea, because we don’t have any kind of foreign
      releaseability [sic] statement in effect currently for JWARN or JEM.

      But now that this strategy seems to be proliferating, I think the head shed
      at Bruhn (the Denmark guys) see this as a way for the US Gov’t to
      circumvent FMS, with the end result being loss of revenue for BNI.

       At the liability trial, when asked whether he had taken any action after learning of
the provision of laptop computers to the Kingdom of Jordan, Josh Rohrback, who was a
BNT-US employee, responded:

      I can’t recall specifically. I would have imagined I bubbled it up within our
      leadership to Bruce [Windesheim]. I don’t -- I don’t recall that we took any
      specific action or -- with JPM-IS or with the JPEO in any way, but certainly
      within our own company, we would have made -- certainly would have made
      that awareness known.

In a December 17, 2013 email message from Josh Rohrback to Bruce Windesheim, who
at the time of the trial was the interim president of BNT-US, and Jacob Nielsen, former
CEO of Bruhn NewTech, Mr. Rohrback stated: “I have on a few occasions brought up the
fact that JPM IS was basically pirating Bruhn NewTech’s software to Mr. Meyer while he
was still the DAPM for JWARN 1F. His only response on those occasions was to wonder
what Bruhn NewTech was going to do about it.” Bruce Windesheim testified at the liability


                                            34
trial that BNT-US did not retain counsel until January 2014, and that there was “obviously
the time from when we learned about it to when we -- and when we went to the -- we went
to the Government.”

       The parties stipulated that, “[a]t the direction of JPMIS, Moroney removed the
JWARN Block 1F Phase 2 images from the ten laptop computers in December 2014.”
Paul Moroney also testified that he removed the JWARN Block 1F images from the ten
laptop computers in Jordan in 2014.

Copyright Registrations

       BNT-Denmark has two copyright registrations that are at issue in the above-
captioned case, which are United States Copyright Registration No. TX 7-836-500 (the
‘500 Registration) and United States Copyright Registration No. TX 7-836-490 (the ‘490
Registration). The ‘500 Registration is titled “NBC Analysis - CRID 0040.” The ‘500
Registration indicates that the “Year of Completion” was 1998, that the “Date of 1st
Publication” was January 12, 1999, and that the “Nation of 1st Publication” was Denmark.
(capitalization in original). The ‘500 Registration also indicates that attorney Mary Beth
Tung certified the copyright application on April 24, 2014. The effective date of the ‘500
Registration is April 28, 2014.

        BNT-Denmark’s second copyright at issue in this case, the ‘490 Registration, is
titled “NBC Analysis JWARN 1F PHASE 2, CRID 1489, 1490, and 1491.” The ‘490
Registration indicates that the “Year of Completion” was 2008, that the “Date of 1st
Publication” was September 28, 2012, and that the “Nation of 1st Publication” was
Denmark. (capitalization in original). The ‘490 Registration also indicates that attorney
Mary Beth Tung certified the copyright application on April 24, 2014. The effective date
of the ‘490 Registration is April 28, 2014.

Procedural History

       On March 10, 2015, BNT-US and BNT-Denmark filed a complaint in the United
States District Court for the District of Maryland (Maryland District Court) against Johns
Hopkins University Applied Physics Laboratory, LLC (JHU) asserting that JHU had
violated the Copyright Act, as well as the “Maryland Uniform Trade Secrets Act,” by
improperly transferring BNT-Denmark’s software to third parties. See Complaint at 2-3,
9, 11, Bruhn NewTech A/S v. Johns Hopkins Applied Physics Lab., LLC, No. 15-671 (D.
Md. Mar. 10, 2015). On April 10, 2015, BNT-US and BNT-Denmark filed an amended
complaint in the Maryland District Court, in which BNT-US and BNT-Denmark added
Leidos, Inc. (Leidos) as a defendant. See First Amended Complaint, Bruhn NewTech A/S
v. Johns Hopkins Applied Physics Lab., LLC, No. 15-671 (D. Md. Apr. 10, 2015). As
stipulated by the parties, Marty Sikes was an employee of JHU and Michael Meyer was
an employee of SAIC/Leidos. On January 21, 2016, JHU and Leidos jointly filed a motion
to dismiss for lack of jurisdiction and for failure to state a claim in the Maryland District
Court. See Motion to Dismiss, Bruhn NewTech A/S v. Johns Hopkins Applied Physics
Lab., LLC, No. 15-671 (D. Md. Jan. 21, 2016). On February 4, 2016, BNT-US and BNT-


                                             35
Denmark filed an opposition to JHU’s and Leidos’ joint motion to dismiss. See Opposition
to Motion to Dismiss, Bruhn NewTech A/S v. Johns Hopkins Applied Physics Lab., LLC,
No. 15-671 (D. Md. Feb. 4, 2016). On June 4, 2016, while the joint motion to dismiss still
was pending before the Maryland District Court, BNT-US and BNT-Denmark voluntarily
filed a notice of dismissal, without prejudice, which the Maryland District Court granted on
June 6, 2016. See Notice of Dismissal, Bruhn NewTech A/S v. Johns Hopkins Applied
Physics Lab., LLC, No. 15-671 (D. Md. June 4, 2016).

        While BNT-US’s and BNT-Denmark’s case was pending before the Maryland
District Court, on August 27, 2015, BNT-US submitted a certified claim for a contracting
officer’s final decision regarding the ‘2076 Contract. In the August 27, 2015 certified claim,
BNT-US asserted a breach of the ‘2076 Contract, infringement of BNT-Denmark’s
copyrights, and a violation of the “Uniform Trade Secrets Act.” On January 8, 2016, a
contracting officer for the USMC issued a contracting officer’s final decision denying BNT-
US’ August 27, 2015 claim in full.

       Prior to when BNT-US and BNT-Denmark filed the June 4, 2016 voluntary notice
of dismissal in the Maryland District Court, BNT-US had filed a complaint against the
United States in the United States Court of Federal Claims on January 19, 2016, which
was Case No. 16-92C and was assigned to the undersigned. In Case No. 16-92C, BNT-
Denmark was not listed as a party. On March 21, 2016, the United States filed a motion
to dismiss Case No. 16-92C, in part because, according to the United States, 28 U.S.C.
§ 1500 (2012) barred some of BNT-US’ claims in Case No. 16-92C based on BNT-US’
and BNT-Denmark’s case pending before the Maryland District Court. On June 15, 2016,
BNT-US filed a notice of dismissal, without prejudice, in Case No. 16-92C, which the court
granted. On June 24, 2016, the Clerk’s Office of the United States Court of Federal Claims
closed Case No. 16-92C.

        Six days later, on June 30, 2016, BNT-US filed a complaint in the above-captioned
case, Case No. 16-783C. BNT-Denmark was not listed as a plaintiff in the June 30, 2016
original complaint filed by BNT-US. On August 8, 2016, defendant filed a motion to
dismiss pursuant to Rule 12(b)(1) (2016) of the Rules of the United States Court of
Federal Claims (RCFC), as well as pursuant to RCFC 12(b)(6). In a December 2, 2016
Opinion, the court denied defendant’s motion to dismiss BNT-US’ breach of contract
claim. See Bruhn NewTech, Inc. v. United States, 129 Fed. Cl. 656, 668 (2016).
Regarding BNT-US’ copyright claims, the court determined that BNT-US was not the
legal, or the beneficial owner, of the copyrights at issue in the above-captioned case and
dismissed BNT-US’ copyright claims for lack of subject-matter jurisdiction. See id. at 671.
The court also dismissed BNT-US’ trade secrets claim because “the Uniform Trade
Secrets Act is not binding law as it is not incorporated into the United States Code, but
instead it is a model statute proposed for general consideration and must be enacted by
individual jurisdictions to become law.” See id.

       On January 23, 2017, BNT-Denmark filed a motion to intervene in the above-
captioned case, Case No. 16-783C, and to file a second amended complaint that would
relate back to the date on which BNT-US’ original June 30, 2016 complaint was filed,


                                             36
which defendant opposed. On February 15, 2017, the court issued an Order permitting
the filing of a second amended complaint, granting BNT-Denmark’s motion to intervene,
and stating that the second amended complaint was to be filed with a date relating back
to the original August 30, 2016 complaint.

        The second amended complaint in the above-captioned case lists both BNT-US
and BNT-Denmark as plaintiffs. In Count I of plaintiffs’ second amended complaint,
plaintiffs’ assert that, “[w]hen the United States Government provided un-protected copies
of the Software to the ROK and Jordan in breach of the terms of the Software License,
these non-dongled copies of the Software did not include technical means of preventing
further copying and distribution.” Plaintiffs’ second amended complaint indicates that the
“Software License” was contained in Contract No. M67854-98-C-2076, which is the ‘2076
Contract the USMC awarded to BNT-US on May 13, 1998. Plaintiffs’ breach of contract
action in Count I of the second amended complaint seeks $21,752,227.00 in damages.
Count I of plaintiffs’ second amended complaint is labeled as brought “[b]y BNT-US
against Defendant.”

       Count II of plaintiffs’ second amended complaint in this court is listed as brought
“[b]y BNT-Denmark against Defendant” and asserts that defendant violated the United
States Copyright Act. According to plaintiffs’ second amended complaint, the United
States’

       unauthorized transfer of the original software code (U.S. Copyright Reg. No.
       TX0007836490), and the updates and improvements to that code (U.S.
       Copyright Reg. No. TX0007836500), to ROK and Jordanian armed forces
       resulted in loss of revenue and profit to BNT-Denmark from licensing fees,
       loss of control of the copying and distribution of the Software, and inability
       to stop further damages from occurring due to further copying and
       distribution of the Software.

Count II also seeks $21,752,227.00 in damages.

       After the court issued an Order setting a trial date on the issues of liability,
defendant filed a motion to refer the copyright registration questions to the Register of
Copyrights12 pursuant to 17 U.S.C. § 411(b) (2018). The statute at 17 U.S.C. § 411(b)(2)
states that, “[i]n any case in which inaccurate information” related to a copyright
registration “is alleged, the court shall request the Register of Copyrights to advise the
court whether the inaccurate information, if known, would have caused the Register of
Copyrights to refuse registration.” Id. Plaintiffs filed an opposition to defendant’s motion
to refer copyright questions to the Register of Copyrights. The court, however, granted
defendant’s motion to refer copyright questions to the Register of Copyrights pursuant to

12 “The Register of Copyrights is the ‘director of the Copyright Office of the Library of
Congress’ and is appointed by the Librarian of Congress.” Fourth Estate Pub. Benefit
Corp. v. Wall-Street.com, LLC, 139 S. Ct. 881, 887 n.1 (2019) (quoting 17 U.S.C.
§ 701(a)).


                                            37
17 U.S.C. § 411(b)(2), as defendant had “alleged” plaintiffs had included “inaccurate
information” in BNT-Denmark’s copyrights registration. See id. On February 8, 2019, the
court issued an Order referring the copyright registration questions to the Register of
Copyrights, which included questions jointly agreed-upon by plaintiffs and defendant, as
well as relevant documents in the above-captioned case. On March 18, 2019, Karyn A.
Temple, the Acting Register of Copyrights, submitted a response to the court’s referral
pursuant to 17 U.S.C. § 411(b), which is discussed below.

       A trial on the issues of liability in the above-captioned case was held, and the
parties submitted post-trial briefs, as well as supplemental briefs which addressed the
Register of Copyright’s March 18, 2019 response.

      The following chart summarizes the CRIDs discussed above and below:

     CRID                 Date of Delivery to the United         Contract Associated with
                                      States                             Delivery

    CRID 40                      January 15, 1999                    The ‘2076 Contract

   CRID 395                        April 26, 2004                    The ‘A001 Contract

   CRID 1414                     October 25, 2011                  Disputed by the Parties

   CRID 1489                    September 28, 2012                 Disputed by the Parties

   CRID 1490                    September 28, 2012                 Disputed by the Parties



The chart below summarizes the transfer of laptop computers containing images of
CRIDs:

    CRID                        Details of Transfer                   Date of Transfer

  CRID 1414              Two laptop computers containing               March 20, 2012
                        images of CRID 1414 transferred to
                              the Republic of Korea

  CRID 1489              Ten laptop computers containing         Shipped to the Kingdom of
                        images of CRID 1489 were shipped          Jordan in August 2013
                            to the Kingdom of Jordan


  CRID 1490              Five laptop computers containing      After March 20, 2012 and “[b]y
                        images of CRID 1490 transferred to             January 2013”
                               the Republic of Korea



                                          38
                                       DISCUSSION

Count I: BNT-US’ Breach of Contract Claim

        In Count I of plaintiffs’ second amended complaint, BNT-US asserts that the United
States breached the ‘2076 Contract “by breaching the Software License by misusing the
Software in a manner that would subject the United States to liability if it were a private
party.” In order “[t]o recover for breach of contract, a party must allege and establish: (1)
a valid contract between the parties, (2) an obligation or duty arising out of the contract,
(3) a breach of that duty, and (4) damages caused by the breach.” San Carlos Irr. &
Drainage Dist. v. United States, 877 F.2d 957, 959 (Fed. Cir.), reh’g denied (Fed. Cir.
1989); see also Shell Oil v. United States, 130 Fed. Cl. 8, 34 (2017) (quoting San Carlos
Irr. & Drainage Dist. v. United States, 877 F.2d at 959), aff’d, 896 F.3d 1299 (Fed. Cir.
2018). “‘The plaintiff or party alleging the breach has the burden of proof on all of its
breach of contract claims.’” Stockton E. Water Dist. v. United States, 583 F.3d 1344, 1360
(Fed. Cir. 2009) (quoting 23 RICHARD A. LORD, W ILLISTON ON CONTRACTS § 63:14 (4th ed.
1999)), reh’g granted in part, 638 F.3d 781 (Fed. Cir. 2011); see also Beard v. United
States, 125 Fed. Cl. 148, 157 (2016) (“To prevail on a breach-of-contract claim, the
plaintiff bears the burden of proving: (1) the existence of a valid contract between the
parties; (2) a duty arising from the contract; (3) a breach in duty; and (4) damages caused
by the breach.” (internal quotation marks and citations omitted)).

       Whether defendant breached the ‘2076 Contract involves interpretation of the
terms in the ‘2076 Contract. “Contract interpretation starts with the language of the
contract.” SUFI Network Servs., Inc. v. United States, 785 F.3d 585, 593 (Fed. Cir. 2015);
see also Premier Office Complex of Parma, LLC v. United States, 916 F.3d 1006, 1011
(Fed. Cir. 2019) (citing NVT Techs., Inc. v. United States, 370 F.3d 1153, 1159 (Fed. Cir.
2004)); Precision Pine & Timber, Inc. v. United States, 596 F.3d 817, 824 (Fed. Cir. 2010),
cert. denied, 562 U.S. 1178 (2011); Bell/Heery v. United States, 739 F.3d 1324, 1331
(Fed. Cir.), reh’g and reh’g en banc denied (Fed. Cir. 2014); LAI Servs., Inc. v. Gates,
573 F.3d 1306, 1314 (Fed. Cir.), reh’g denied (Fed. Cir. 2009); Barron Bancshares, Inc.
v. United States, 366 F.3d 1360, 1375 (Fed. Cir. 2004); Foley Co. v. United States, 11
F.3d 1032, 1034 (Fed. Cir. 1993); Nw. Title Agency, Inc. v. United States, 126 Fed. Cl.
55, 57-58 (2016) (citing Foley Co. v. United States, 11 F.3d 1032, 1034 (Fed. Cir. 1993))
(“The starting point for any contract interpretation is the plain language of the
agreement.”), aff’d, 855 F.3d 1344 (Fed. Cir. 2017); Beard v. United States, 125 Fed. Cl.
at 158; Eden Isle Marina, Inc. v. United States, 113 Fed. Cl. 372, 483-84 (2013).

        “‘“In contract interpretation, the plain and unambiguous meaning of a written
agreement controls.”’” Arko Exec. Servs., Inc. v. United States, 553 F.3d 1375, 1379 (Fed.
Cir. 2009) (quoting Hercules Inc. v. United States, 292 F.3d 1378, 1380-81 (Fed. Cir.),
reh’g and reh’g en banc denied (Fed. Cir. 2002) (quoting Craft Mach. Works, Inc. v. United
States, 926 F.2d 1110, 1113 (Fed. Cir. 1991))). “Terms must be given their plain meaning
if the language of the contract is clear and unambiguous.” SUFI Network Servs., Inc. v.
United States, 785 F.3d at 593 (citing Coast Fed. Bank, FSB v. United States, 323 F.3d


                                             39
1035, 1038 (Fed. Cir. 2003)); see also Canpro Invs. Ltd. v. United States, 130 Fed. Cl.
320, 347, recons. denied, 131 Fed. Cl. 528 (2017); Beard v. United States, 125 Fed. Cl.
at 158 (“If the contract language is unambiguous, then it must be given its plain and
ordinary meaning . . . .”). The United States Court of Appeals for the Federal Circuit stated
in Massie v. United States:

       In interpreting a contract, “[w]e begin with the plain language.” “We give the
       words of the agreement their ordinary meaning unless the parties mutually
       intended and agreed to an alternative meaning.” In addition, “[w]e must
       interpret the contract in a manner that gives meaning to all of its provisions
       and makes sense.”

Massie v. United States, 166 F.3d 1184, 1189 (Fed. Cir. 1999) (quoting McAbee Constr.,
Inc. v. United States, 97 F.3d 1431, 1435, reh’g denied and en banc suggestion declined
(Fed. Cir. 1996) (internal citations omitted)); Jowett, Inc. v. United States, 234 F.3d 1365,
1368 (Fed. Cir. 2000) (quoting McAbee Constr., Inc. v. United States, 97 F.3d at 1435;
and Harris v. Dep’t of Veterans Affairs, 142 F.3d 1463, 1467 (Fed. Cir. 1998)); Harris v.
Dep’t of Veterans Affairs, 142 F.3d at 1467; see also Coast Prof’l, Inc. v. United States,
828 F.3d 1349, 1354 (Fed. Cir. 2016); Shell Oil Co. v. United States, 751 F.3d 1282, 1305
(Fed. Cir.), reh’g en banc denied (Fed. Cir. 2014); McHugh v. DLT Sols., Inc., 618 F.3d
1375, 1380 (Fed. Cir. 2010); Giove v. Dep’t of Transp., 230 F.3d 1333, 1340-41 (Fed. Cir.
2000) (“In addition, we must interpret the contract in a manner that gives meaning to all
of its provisions and makes sense. Further, business contracts must be construed with
business sense, as they naturally would be understood by intelligent men of affairs.”
(citations omitted)); Gould, Inc. v. United States, 935 F.2d 1271, 1274 (Fed. Cir. 1991)
(indicating that a preferable interpretation of a contract is one that gives meaning to all
parts of the contract rather than one that leaves a portion of the contract “useless,
inexplicable, void, or superfluous”). A Judge of the United States Court of Federal Claims
has explained:

       “The words of a contract are deemed to have their ordinary meaning
       appropriate to the subject matter, unless a special or unusual meaning of a
       particular term or usage was intended, and was so understood by the
       parties.” Lockheed Martin IR Imaging Sys., Inc. v. West, 108 F.3d 319, 322
       (Fed. Cir. 1997). “Under general rules of contract law we are to interpret
       provisions of a contract so as to make them consistent.” Abraham v.
       Rockwell Int’l Corp., 326 F.3d 1242, 1251 (Fed. Cir. 2003). “[A]n agreement
       is not to be read in a way that places its provisions in conflict, when it is
       reasonable to read the provisions in harmony. . . . [T]he provisions must be
       read together in order to implement the substance and purpose of the entire
       agreement.” Air-Sea Forwarders, Inc. v. United States, 166 F.3d 1170, 1172
       (Fed. Cir. 1999). “A reasonable interpretation must assure that no contract
       provision is made inconsistent, superfluous, or redundant.” Medlin Const.
       Grp., Ltd. v. Harvey, 449 F.3d 1195, 1200 (Fed. Cir. 2006) (internal
       quotation marks omitted).



                                             40
Dynetics, Inc. v. United States, 121 Fed. Cl. 492, 512 (2015); see also Marquardt Co. v.
United States, 101 Fed. Cl. 265, 269 (2011) (“In interpreting contractual language, the
court must give reasonable meaning to all parts of the contract and avoid rendering
portions of the contract meaningless.” (citation omitted)).

        The United States Court of Appeals for the Federal Circuit also has indicated that
“‘[t]he contract must be construed to effectuate its spirit and purpose giving reasonable
meaning to all parts of the contract.’” Arko Exec. Servs., Inc. v. United States, 553 F.3d
at 1379 (quoting Hercules Inc. v. United States, 292 F.3d at 1380-81); see also LAI Servs.,
Inc. v. Gates, 573 F.3d at 1314; Gardiner, Kamya & Assocs., P.C. v. Jackson, 467 F.3d
1348, 1353 (Fed. Cir. 2006) (citations omitted); Medlin Constr. Grp., Ltd. v. Harvey, 449
F.3d at 1200; Hunt Constr. Grp., Inc. v. United States, 281 F.3d 1369, 1372 (Fed. Cir.
2002) (“We begin with the plain language when interpreting a contract . . . . The contract
must be considered as a whole and interpreted to effectuate its spirit and purpose, giving
reasonable meaning to all parts.” (citations omitted)); Beard v. United States, 125 Fed.
Cl. at 158 (“In construing the meaning of a contractual provision, the court does not
interpret the disputed term or phrase in isolation, but ‘construes contract terms in the
context of the entire contract, avoiding any meaning that renders some part of the contract
inoperative.’” (quoting Pac. Gas & Elec. Co. v. United States, 536 F.3d 1282, 1288 (Fed.
Cir. 2008))).

        It has been “‘a fundamental precept of common law that the intention of the parties
to a contract controls its interpretation.’” Tri-Star Elecs. Int’l, Inc. v. Preci-Dip Durtal SA,
619 F.3d 1364, 1367 (Fed. Cir. 2010) (quoting Beta Sys., Inc. v. United States, 838 F.2d
1179, 1185 (Fed. Cir. 1988) (quoting Firestone Tire & Rubber Co. v. United States, 195
Ct. Cl. 21, 30 (1971))); Alvin, Ltd. v. U.S. Postal Serv., 816 F.2d 1562, 1565 (Fed. Cir.
1987) (“In the case of contracts, the avowed purpose and primary function of the court is
the ascertainment of the intent of the parties.”); see also Flexfab, LLC v. United States,
424 F.3d 1254, 1262 (Fed. Cir. 2005) (“[I]ntent is determined by looking to the contract
and, if necessary, other objective evidence. In the absence of clear guidance from the
contract language, the requisite intent on the part of the government can be inferred from
the actions of the contracting officer . . . .”); LaBatte v. United States, 142 Fed. Cl. 425,
433 (2019) (citations omitted); Canpro Invs. Ltd. v. United States, 130 Fed. Cl. at 347
(“Contract interpretation requires determining the intention of the parties.”).

       Plaintiffs and defendant do not dispute that the ‘2076 Contract was a valid contract
between the United States government and BNT-US. Defendant, however, argues that
the United States did not breach the ‘2076 Contract when two laptop computers
containing JWARN Block 1F Phase 2 C2PC CRID 1414 were delivered to the Republic
of Korea, when five additional laptop computers containing JWARN Block 1F Phase 2
C2PC CRID 1490 were delivered to the Republic of Korea, or when ten laptop computers
containing JWARN Block 1F Phase 2 Standalone CRID 1489 were delivered to the
Kingdom of Jordan. According to defendant, BNT-US did not deliver CRIDs 1414, 1489,
or 1490 under the ‘2076 Contract, and the terms of the ‘2076 Contract, therefore, do not
apply to CRIDs 1414, 1489, or 1490. Defendant argues that the USMC “administratively
closed” the ‘2076 Contract on June 3, 2004, and that CRID 1414 was not delivered to the


                                              41
United States government until 2011, while CRIDs 1489 and 1490 were not delivered to
the United States government until 2012. Because CRIDs 1414, 1489, and 1490 allegedly
were not delivered to the United States government pursuant to BNT-US’ ‘2076 Contract,
defendant contends that the terms and software licenses in the ‘2076 Contract do not
apply to CRIDs 1414, 1489, and 1490.

      Defendant asserts that BNT-US delivered CRIDs 1414, 1489, and 1490 under
Northrop Grumman’s ‘4091/NS05 Contract involving Northrop Grumman’s “Global
Operations” project, on which BNT-US served as a subcontractor. In an attempt to
support its position that CRIDs 1414, 1489, and 1490 were not delivered under the ‘2076
Contract, defendant included the following figure in its post-trial brief:




Defendant argues that Northrop Grumman’s ‘4091/NS05 Contract, which is the contract
relating to the Northrop Grumman’s “Global Operations” project, “has different terms than
those identified by BNT-US in its certified contract claim and in this lawsuit. With respect
to these computer program deliverables [CRIDs 1414, 1489, and 1490], BNT-US did not
submit a certified claim that identified the proper contract that pertained to their delivery,
nor did it identify the relevant contractual terms.” Thus, defendant contends: “The
Government’s alleged transfer of the CRIDs 1414, 1489, and 1490 software acquired
under the ‘4091/NS05 Contract could not have breached the software licensing terms of
the ‘2076 Contract because the terms of that contract do not apply to the subcontracted
deliverables under the Northrop Grumman ‘4091/NS05 Contract.” Defendant also argues
that BNT-US lacks privity with the government for claims arising under the Northrop
Grumman ‘4091/NS05 Contract because BNT-US served as a subcontractor under
Northrop Grumman’s ‘4091/NS05 Contract.

       Despite defendant’s assertions, plaintiffs argue that defendant breached the ‘2076
Contract when the United States allegedly transferred CRIDs 1414 and 1490 to the
Republic of Korea, as well as when the United States allegedly transferred CRID 1489 to
the Kingdom of Jordan. According to plaintiffs’ post-trial brief:

       Since BNT-US consistently made the Government aware that the core
       NBC-Analysis COTS software within deliveries remained subject to the
       license terms of the ‘2076 Contract, and those license terms on their face
       are perpetual in duration, the Government is not relieved of its obligation to

                                             42
      comply with these simply because the core software was re-delivered to the
      Government numerous times along with integration software developed by
      BNT-US under other subcontracts.

Plaintiffs argue that the ‘4091/NS05 Contract “was for BNT-US to perform system
engineering, testing, troubleshooting, and certification services to the Government
(through general contractor Northrop Grumman), on a time and material basis, with
options to renew year to year.” Plaintiffs further argue:

      Provision of system engineering, testing, and troubleshooting services to
      make NBC-Analysis compatible with evolving weapons systems and
      equipment (pursuant to the ’4091/NS05 subcontract) necessarily required
      those systems to integrate with something. That “something” was the core-
      NBC-Analysis software that the Government licensed through the ‘2076
      Contract – a license that expressly allowed the Government to modify NBC-
      Analysis for its internal purposes, and to combine the software with other
      software, provided the license restrictions remain.

       In the above-captioned case, on May 13, 1998, BNT-US and the USMC entered
into the ‘2076 Contract, which contained Federal Acquisition Regulation (FAR) clause
52.227-19, titled “COMMERCIAL COMPUTER SOFTWARE--RESTRICTED RIGHTS
(JUN 1987).” (capitalization in original). In the ‘2076 Contract, FAR clause 52.227-19
stated:

      (a) As used in this clause, “restricted computer software” means any
      computer program, computer data base, or documentation thereof, that has
      been developed at private expense and either is a trade secret, is
      commercial or financial and confidential or privileged, or is published and
      copyrighted.

      (b) Notwithstanding any provisions to the contrary contained in any
      Contractor’s standard commercial license or lease agreement pertaining to
      any restricted computer software delivered under this purchase
      order/contract, and irrespective of whether any such agreement has been
      proposed prior to or after issuance of this purchase order/contract or of the
      fact that such agreement may be affixed to or accompany the restricted
      computer software upon delivery, vendor agrees that the Government shall
      have the rights that are set forth in paragraph (c) of this clause to use,
      duplicate or disclose any restricted computer software delivered under this
      purchase order/contract. The terms and provisions of this contract,
      including any commercial lease or license agreement, shall be subject to
      paragraph (c) of this clause and shall comply with Federal laws and the
      Federal Acquisition Regulation.




                                           43
Subparagraphs (c)(1) and (c)(2) of FAR clause 52.227-19 in the ‘2076 Contract stated:

      (c)(1) The restricted computer software delivered under this contract may
      not be used, reproduced or disclosed by the Government except as
      provided in subparagraph (c)(2) of this clause or as expressly stated
      otherwise in this contract.

      (2) The restricted computer software may be--

      (i) Used or copied for use in or with the computer or computers for which it
      was acquired, including use at any Government installation to which such
      computer or computers may be transferred;

      (ii) Used or copied for use in or with backup computer if any computer for
      which it was acquired is inoperative;

      (iii) Reproduced for safekeeping (archives) or backup purposes;

      (iv) Modified, adapted, or combined with other computer software, provided
      that the modified, combined, or adapted portions of the derivative software
      incorporating any of the delivered, restricted computer software shall be
      subject to same restrictions set forth in this purchase order/contract;

      (v) Disclosed to and reproduced for use by support service Contractors or
      their subcontractors, subject to the same restrictions set forth in this
      purchase order/contract; and

      (vi) Used or copied for use in or transferred to a replacement computer.

      The ‘2076 Contract also contained a “Supplement to Terms & Conditions.” The
“Supplement to Terms & Conditions” in the ‘2076 Contract provided:

      In accordance with FAR 52-227-19, BRUHN NewTech, Inc. will place the
      following legend on the software.

                                       NOTICE!

                      COMMERCIAL COMPUTER SOFTWARE

                               RESTRICTED RIGHTS

      Notwithstanding any other lease or license agreement that may pertain to,
      or accompany the delivery of, this computer software, the rights of the
      Government regarding its use, reproduction and disclosure are as set forth
      in Government Contract No. M67854-98-C-2076.



                                          44
                                 LICENSE AGREEMENT

                             (Supplement to FAR 52.227-19)

       All software to be delivered under this contract including source codes, is
       commercial computer software subject to restricted rights specified in FAR
       52.227-19 “Commercial Computer Software - Restricted Rights” with the
       following additions to that clause:

       1. The Government may make an unlimited number of copies of the
       software and may distribute and use the software in any computers owned
       or leased by the Government and operated by the U.S. Government
       personnel working for U.S. Government departments, organizations and
       agencies.

       2. The Government’s use of the software shall be limited to use in fulfillment
       of functions of the Government of the United States.

       3. The Government shall not disclose the software and shall not give, sell,
       license or otherwise provide copies of the software or use of the software
       to any third party person or entity including but not limited to members of
       the public, governments of foreign countries, or international agencies or
       organizations.

(capitalization and emphasis in original). As noted above, the parties have stipulated that
the “software license provisions” in the ‘2076 Contract have not been amended or
modified.

        Under the ‘2076 Contract, BNT-US delivered to the government a DOS version of
the NBC-Analysis software on May 14, 1998, as well as a Windows version of NBC-
Analysis software on January 15, 1999, the latter of which was labeled as CRID 40. The
delivery note BNT-US provided when delivering CRID 40 specifically identified the ‘2076
Contract as the “order no” under which CRID 40 was being delivered. As stated in the
parties’ joint stipulation of facts, pursuant to the statement of work for the ‘2076 Contract,
“BNT-US delivered the NBC-Analysis software to the USMC to be used as the
‘Commercial-Off-The-Shelf’ (COTS) software component to the Joint Warning and
Reporting Network Program (JWARN).” As such, under the ‘2076 Contract, the United
States government was granted “the rights that are set forth in paragraph (c) of this clause
to use, duplicate or disclose any restricted computer software delivered under this
purchase order/contract [the ‘2076 Contract].” In the referenced paragraph (c) in the ‘2076
Contract, subparagraph (c)(1) stated that the “restricted computer software delivered
under this contract may not be used, reproduced or disclosed by the Government except
as provided in subparagraph (c)(2) of this clause or as expressly stated otherwise in this
contract.” The referenced subparagraph (c)(2) in the ‘2076 Contract stated that the NBC-
Analysis software delivered under the ‘2076 Contract could be “[u]sed or copied for use


                                             45
in or with the computer or computers for which it was acquired,” and could be “[m]odified,
adapted, or combined with other computer software, provided that the modified,
combined, or adapted portions of the derivative software incorporating any of the
delivered, restricted computer software shall be subject to same restrictions set forth in
this purchase order/contract.” The “Supplement to Terms & Conditions” in the ‘2076
Contract further stated that the United States government could not “disclose” or “provide
copies of the software or use of the software” delivered under the ‘2076 Contract to “any
third party person or entity including but not limited to members of the public, governments
of foreign countries, or international agencies or organizations.” Thus, under the terms of
the ‘2076 Contract, restricted computer software delivered by BNT-US under the ‘2076
Contract, such as the 1998 DOS version of NBC-Analysis and CRID 40, could be
“modified,” subject to the terms of the ‘2076 Contract, but could not be provided to a third
party, entity, or foreign government.

        According to the parties’ joint stipulation of facts, under the ‘2076 Contract, BNT-
US continued to deliver software and support services to the United States government
until “at least” May 13, 2000. The parties further have stipulated that the government had
paid BNT-US “in full for all work accomplished and deliverables under the ‘2076 Contract”
as of June 3, 2004. The parties stipulated that, thereafter, “BNT-US worked on a series
of contracts and subcontracts relating to JWARN Block 1 support activities for the United
States Government,” providing “updates, refinements and services related to NBC-
Analysis/JWARN Block 1 during these years.”

       On January 12, 2009, BNT-US began working as a subcontractor to Northrop
Grumman under Northrop Grumman’s ‘4091/NS05 Contract, which included work on
Northrop Grumman’s “Global Operations” project. On October 25, 2011, BNT-US
delivered CRID 1414 on a “CD” to “JPM IS CM,” which indicates that delivery was made
to the Joint Project Manager for Information Systems, in San Diego, California.
(capitalization in original). BNT-US’ October 25, 2011 delivery note accompanying CRID
1414 indicates that CRID 1414 was delivered under “Our Order: Global Operations.”
(capitalization in original). On September 28, 2012, BNT-US delivered CRID 1489 to “JPM
IS CM” on a “CD” in San Diego, California. (capitalization in original). BNT-US’ September
28, 2012 delivery note accompanying CRID 1489 indicates that CRID 1489 was delivered
under “Our order no: Global Operations.” (capitalization in original). Also on September
28, 2012, BNT-US delivered CRID 1490 to “JPM IS CM” on a “CD” in San Diego,
California. (capitalization in original). BNT-US’ September 28, 2012 delivery note
accompanying CRID 1490 indicates that CRID 1490 was delivered under “Our order:
Global Operations.” (capitalization in original).

       The version of FAR clause 52.227-19 in the ‘2076 Contract, which was discussed
above, pertains to “restricted computer software delivered under this purchase
order/contract,” which was the ‘2076 Contract. Paragraph (c) of FAR clause 52.227-19 in
the ‘2076 Contract limits the government’s use of “restricted computer software delivered
under this contract” to the articulated uses in subparagraph (c)(2) of FAR clause 52.227-
19 in the ‘2076 Contract. The “Supplement to Terms & Conditions” in the ‘2076 Contract
provides “additions” to FAR clause 52.227-19, which apply to “[a]ll software to be


                                            46
delivered under this contract.” The terms in the ‘2076 Contract, therefore, apply to
software delivered under the ‘2076 Contract, such as CRID 40, which was delivered to
the United States government on January 15, 1999.

         BNT-US’ delivery notes associated with CRIDs 1414, 1489, and 1490 all identified
“Global Operations” as the “order” under which CRIDs 1414, 1489, and 1490 were being
delivered. “Global Operations” was a Northrop Grumman project related to Northrop
Grumman’s ‘4091/NS05 Contract, under which the parties have stipulated BNT-US
served as a subcontractor supporting Northrop Grumman’s “Global Operations” project.
The parties also have stipulated that, at the time when BNT-US delivered CRIDs 1414,
1489, and 1490 to the United States government, BNT-US was serving as a
subcontractor to Northrop Grumman.13 Moreover, the government had paid BNT-US “in
full for all work accomplished and deliverables under the ‘2076 Contract” as of June 3,
2004. CRID 1414 was not delivered to the government until October 21, 2011, more than
seven years after June 3, 2004. CRIDs 1489 and 1490 were not delivered to the
government until September 28, 2012, more than eight years after June 3, 2004. The
2011 and 2012 dates when CRIDs 1414, 1489, and 1490 were delivered to the
government, as well as the associated delivery notes, indicate that CRIDs 1414, 1489,
and 1490 were delivered under Northrop Grumman’s ‘4091/NS05 Contract. Moreover,
the delivery dates and notes indicate that BNT-US was not delivering CRIDs 1414, 1489,
and 1490 under BNT-US’ earlier ‘2076 Contract, for which, according to the parties’ joint
stipulation of facts, BNT-US already had been paid “in full for all work accomplished and
deliverables under the ‘2076 Contract.” The terms of FAR clause 52.227-19 in the ‘2076
Contract, which apply to “any restricted computer software delivered under this purchase
order/contract [the ‘2076 Contract],” and the “Supplement to Terms & Conditions” in the
‘2076 Contract, which apply to “[a]ll software to be delivered under this contract [the ‘2076
Contract],” therefore, are not contractual terms which apply to deliveries of software BNT-
US made under Northrop Grumman’s ‘4091/NS05 Contract, including CRIDs 1414, 1489,
and 1490.

        Moreover, the NBC-Analysis software delivered by BNT-US was updated and
changed between 1999, when CRID 40 was delivered, and 2011 and 2012, when CRIDs
1414, 1489, and 1490 were delivered. The parties’ joint stipulation of facts provides that,
“[i]n the years after making the initial delivery of NBC-Analysis software to the
Government in 1998, BNT-Denmark and BNT-US developed and delivered to the
Government additional software components to incorporate features developed
specifically in response to JPMIS requirements.” In the report of plaintiffs’ expert and fact
witness, John O’Donahue,14 a former employee of BNT-US, Mr. O’Donahue states that
13When CRIDs 1414, 1489, and 1490 were delivered in 2011 and 2012, BNT-US was no
longer serving as a prime contractor on a contract issued by the United States
government. The parties have stipulated that BNT-US’ “last performance” as a prime
contractor on a contract issued by the United States government concluded on October
25, 2005.
14As discussed earlier, although originally designated as an expert witness by plaintiffs,
John O’Donahue offered both expert testimony and fact testimony when called as a

                                             47
CRID 40 was compatible with the CBRN reporting standards in NATO’s ATP-45A and
was on a “Bruhn Newtech Baseline” of “NBC-Analysis 2.1.” According to John
O’Donahue’s expert report, CRIDs 1414, 1489, and 1490 all were compatible with the
CBRN reporting standards in NATO’s ATP-45C and were on a “Bruhn Newtech Baseline”
of “NBC Analysis 10.” CRIDs 1414, 1489, and 1490, therefore, were revised to be
compatible with a version of NATO’s ATP-45 standards which was first published after
CRID 40 was delivered in 1999. In John O’Donahue’s expert report, John O’Donahue
provides the following chart:




(capitalization in original). As indicated in the image directly above, only 11.01% to
12.70% percent of the source code files in CRID 40 were in CRIDs 1414, 1489, and
1490.15 CRIDs 1414, 1489, and 1490 also contained considerably more total files than
CRID 40, as indicated in John O’Donahue’s chart below:



witness by plaintiffs. When called as a witness by plaintiffs, John O’Donahue offered fact
testimony regarding his employment with BNT-US and work with NBC-Analysis software.
Consequently, much of John O’Donahue’s purported expert testimony consisted of a mix
between factual testimony and testimony offered as expert testimony. Defendant also
called John O’Donahue as a fact witness regarding Mr. O’Donahue’s employment with
BNT-US and work with NBC-Analysis software. John O’Donahue worked as a software
engineer before becoming a manager for BNT-US, during which period of time a
“significant part of what” Mr. O’Donahue “did was to develop sensor interfaces for
JWARN, the joint military -- military Joint Warning and Reporting Network.” Mr.
O’Donahue also stated that his “supervising was around 24 or something like that, and
these people were doing C and C++ coding and Java coding on versions of NBC-
ANALYSIS in order to make it run on these different platforms.” (capitalization in original).
15 John O’Donahue’s report indicates that approximately eighty percent of the files in
CRID 395 were present in CRIDs 1414, 1489, and 1490, but CRID 395 was not “restricted
computer software” delivered under the ‘2076 Contract, as the delivery note associated
with CRID 395 indicates that BNT-US delivered CRID 395 under the ‘A001 Contract to
“JPM NBC CA” at Aberdeen Proving Ground, Maryland. (capitalization in original).

                                             48
BNT-US and BNT-Denmark were revising and adding to the source code files in the NBC-
Analysis software between 1999, when CRID 40 was delivered, and 2011 and 2012,
when CRIDs 1414, 1489, and 1490 were delivered, which further indicates that CRIDs
1414, 1489, and 1490 were not “restricted computer software” delivered under the ‘2076
Contract.

        Plaintiffs further argue that “BNT-US consistently made clear, with
contemporaneous written notices, that the core NBC-Analysis software sold to the
Government in the ‘2076 Contract remained subject to the perpetual software license
terms of the ‘2076 Contract.” In the Software Version Descriptions BNT-US provided to
the government for CRIDs 1414, 1489, and 1490, the Software Version Descriptions
stated that “the rights of the Government regarding its use, reproduction and disclosure
are as set forth in Government Contract No. M67854-98-C-2076.” The parties have
stipulated that, within the Software Administrator’s Manual for JWARN Phase 2 provided
with CRIDs 1414, 1489, and 1490, “the instructions for installation state that, before the
software installation may be completed, the installer must ‘[a]ccept the license agreement’
by clicking ‘next’ after the software license agreement is displayed on the screen.”
(alterations in original). The software license agreement in the Software Administrator’s
Manual for JWARN Phase 2 identifies the ‘2076 Contract. Although BNT-US manuals
accompanying CRIDs 1414, 1489, and 1490 reference the ‘2076 Contract, the references
to the ‘2076 Contract do not lead to the conclusion that the 2011 and 2012 deliveries of
CRIDs 1414, 1489, and 1490 occurred under the earlier ‘2076 Contract. CRIDs 1414,
1489, and 1490 were delivered pursuant to the Northrop Grumman’s ‘4091/NS05
Contract, and, consequently, CRIDs 1414, 1489, and 1490 were not “software” delivered
under the ‘2076 Contract and subject to the terms of the ‘2076 Contract. Moreover, John
O’Donahue, when testifying as a fact witness, testified that he “believe[d]” the statement
in the Software Version Descriptions that “the rights of the Government regarding its use,
reproduction and disclosure are as set forth in Government Contract No. M67854-98-C-
2076” “was something that we always added to deliverables.” Further, the impact, if any,
of BNT-US’ statements in the Software Version Descriptions and Software Administrator’s
Manuals for JWARN Phase 2 for CRIDs 1414, 1489, and 1490 would need to be
evaluated in light of the terms of Northrop Grumman’s ‘4091/NS05 Contract, which
Northrop Grumman contract was not offered for admission during the liability trial and is
not in the record before the court, and which would relate to whether there was a potential
breach of the ‘4091/NS05 Contract, not the ‘2076 Contract.

                                            49
        Plaintiffs also cite to the ‘2076 Contract and argue that “[n]othing in the software
license suggests that the Government’s obligations would sunset or expire, for as long as
the Government used or deployed the NBC-Analysis software.” The court’s above
analysis and conclusion that the transfer of laptop computers containing CRIDs 1414,
1489, and 1490 did not breach the terms of the ‘2076 Contract because CRIDs 1414,
1489, and 1490 were not delivered under the ‘2076 Contract does not suggest that the
terms of the ‘2076 Contract expired. The terms of FAR clause 52.227-19 in the ‘2076
Contract apply to “any restricted computer software delivered under this purchase
order/contract,” and the “Supplement to Terms & Conditions” in the ‘2076 Contract apply
to “[a]ll software to be delivered under this contract.” Although the terms in the ‘2076
Contract remain applicable to deliveries of software that occurred under the ‘2076
Contract, such as CRID 40, the terms in the ‘2076 Contract do not automatically apply to
deliveries of software made pursuant to the other contracts, such as Northrop Grumman’s
‘4091/NS05 Contract, under which BNT-US, as Northrop Grumman’s subcontractor,
delivered CRIDs 1414, 1489, and 1490. And plaintiffs have not demonstrated that the
terms and restrictions were included in the Northrop Grumman ‘4091/NS05 Contract.
Thus, the court concludes that the government did not breach the terms of the ‘2076
Contract, and that Count I of the second amended complaint, in which BNT-US asserts a
breach of the ‘2076 Contract, fails.

Count II: BNT-Denmark’s Copyright Infringement Claim

       In Count II of the second amended complaint, BNT-Denmark asserts that the
United States engaged in actions infringing on two of BNT-Denmark’s copyright
registrations, which are the ‘500 Registration and the ‘490 Registration. The ‘500
Registration is titled “NBC Analysis - CRID 0040.” The ‘490 Registration, is titled “NBC
Analysis JWARN 1F PHASE 2, CRID 1489, 1490, and 1491.” In discussing the elements
of a copyright infringement claim, in the post-trial briefs, plaintiffs and defendant cite to
the United States Supreme Court’s decision in Feist Publications, Inc. v. Rural Telephone
Service Co., 499 U.S. 340 (1991), in which the United States Supreme Court stated: “Not
all copying, however, is copyright infringement. To establish infringement, two elements
must be proven: (1) ownership of a valid copyright, and (2) copying of constituent
elements of the work that are original.” Id. at 361 (citing Harper & Row Publishers, Inc. v.
Nation Enters., 471 U.S. 539, 547 (1985)). The United States Court of Appeals for the
Federal Circuit similarly has stated that copyright “[i]nfringement requires two elements:
‘(1) ownership of a valid copyright, and (2) copying of constituent elements of the work
that are original.’” Gaylord v. United States, 595 F.3d 1364, 1372 (Fed. Cir. 2010) (quoting
Feist Publ’ns, Inc. v. Rural Tel. Serv. Co., 499 U.S. at 361). The party asserting a
copyright infringement claim bears the burden of establishing both elements of a copyright
infringement claim. See Chamberlain Grp., Inc. v. Skylink Techs., Inc., 381 F.3d 1178,
1193 (Fed. Cir.), reh’g and reh’g en banc denied (Fed. Cir. 2004), cert. denied, 544 U.S.
923 (2005); see also Guzman v. Hacienda Records & Recording Studio, Inc., 808 F.3d
1031, 1037 (5th Cir. 2015).




                                             50
Standards for Invalidating a Copyright Registration

        In the above-captioned case, the parties dispute whether BNT-Denmark’s ‘500
Registration, relating to CRID 40, and ‘490 Registration, relating to CRIDs 1489, 1490,
and 1491, are valid copyright registrations. The parties disagree as to the applicable
standard regarding what is required to invalidate a copyright registration under 17 U.S.C.
§ 411(b). BNT-Denmark asserts that the certificates of registration for the ‘500
Registration and the ‘490 Registration, which are included as joint exhibits in the record
before the court, constitute “‘prima facie evidence of the validity of the copyright and of
the facts stated in the certificate.’” (quoting 17 U.S.C. § 410(c)). According to plaintiffs, in
order to show that the ‘500 and ‘490 Registrations are invalid, defendant bears a “heavy
burden” of proving that “the application for registration was factually inaccurate, that the
inaccuracies were willful and deliberate, and that the Copyright Office relied on those
misrepresentations.” Plaintiffs argue that “[a]n innocent misstatement or a clerical error in
the affidavit and certificate of registration, unaccompanied by fraud or intent to extend the
statutory period of copyright protection, does not invalidate the copyright, nor is it thereby
rendered incapable of supporting an infringement action.” Plaintiffs contend that
defendant bears the burden of showing that plaintiffs submitted the copyright applications
with knowledge of the inaccuracies allegedly contained in the applications, and that the
alleged inaccuracies were intended to defraud the Register of Copyrights.

        Defendant, however, argues that “a registration with known, material inaccuracies
cannot satisfy the prerequisite or establish ownership” of a valid copyright registration
under 17 U.S.C. § 411(a). Defendant argues that, “contrary to Plaintiffs’ assertion, 17
U.S.C. § 411(b) does not require a showing of ‘fraud,’ ‘intent,’ or ‘willful[ness].’ The
express language of the statutory provision requires none of those common-law-fraud-
like elements.” (alterations in original). Defendant also asserts that the legislative history
of 17 U.S.C. § 411(b) does not reference fraud or indicate that a showing of fraud is
required to invalidate a copyright registration. Defendant argues that plaintiffs in this case
are attempting to introduce a scienter requirement related to fraud into the statute at 17
U.S.C. § 411(b) by citing to cases that predate the October 13, 2008 revision of 17 U.S.C.
§ 411(b) or cases that “fail to apply the statute.”

      Regarding the interpretation of a statute, the United States Court of Appeals for
the Federal Circuit has stated:

       When interpreting a statute, we start with the language of the statute itself.
       Williams v. Taylor, 529 U.S. 420, 431, 120 S.Ct. 1479, 146 L.Ed.2d 435
       (2000). We search for Congress’s intent using both the text and structure of
       the statute. Alexander v. Sandoval, 532 U.S. 275, 288, 121 S.Ct. 1511, 149
       L.Ed.2d 517 (2001). In reviewing the statute’s text, we give the words “their
       ‘ordinary, contemporary, common meaning,’ absent an indication Congress
       intended them to bear some different import.” Williams, 529 U.S. at 431,
       120 S.Ct. 1479 (quoting Walters v. Metro. Educ. Enters., Inc., 519 U.S. 202,
       207, 117 S.Ct. 660, 136 L.Ed.2d 644 (1997)); see also Moskal v. United
       States, 498 U.S. 103, 108, 111 S.Ct. 461, 112 L.Ed.2d 449 (1990) (“In


                                              51
      determining the scope of a statute, we look first to its language, giving the
      words used their ordinary meaning.” (citations and internal quotation marks
      omitted)). If the statute is clear and unambiguous, then the plain meaning
      of the statute is generally conclusive, and we give effect to the
      unambiguously expressed intent of Congress. Sullivan v. Stroop, 496 U.S.
      478, 482, 110 S.Ct. 2499, 110 L.Ed.2d 438 (1990). When the statutory
      language is ambiguous, legislative history can be useful in determining
      Congressional intent. See In re Swanson, 540 F.3d 1368, 1376 (Fed. Cir.
      2008).

Indian Harbor Ins. Co. v. United States, 704 F.3d 949, 954 (Fed. Cir. 2013); see also
White v. United States, 543 F.3d 1330, 1337 (Fed. Cir. 2008) (“First and foremost, it is a
bedrock canon of statutory construction that our judicial inquiry ends where statutory
language is plain and unambiguous.” (citations omitted)), reh’g and reh’g en banc denied
(Fed. Cir. 2009); Texaco Marine Servs., Inc. v. United States, 44 F.3d 1539, 1543 (Fed.
Cir. 1994) (“Our interpretation of the statute begins with the language employed by
Congress.” (citations omitted)).

       According to 17 U.S.C. § 410(a), when the Register of Copyrights determines that
“the material deposited constitutes copyrightable subject matter and that the other legal
and formal requirements of this title have been met, the Register shall register the claim
and issue to the applicant a certificate of registration under the seal of the Copyright
Office.” Id. In a judicial proceeding, a certificate of copyright registration

      made before or within five years after first publication of the work shall
      constitute prima facie evidence of the validity of the copyright and of the
      facts stated in the certificate. The evidentiary weight to be accorded the
      certificate of a registration made thereafter shall be within the discretion of
      the court.

17 U.S.C. § 410(c).

      The relevant language in the currently in effect version of 17 U.S.C. § 411 provides:

      (a) Except for an action brought for a violation of the rights of the author
      under section 106A(a), and subject to the provisions of subsection (b), no
      civil action for infringement of the copyright in any United States work shall
      be instituted until preregistration or registration of the copyright claim has
      been made in accordance with this title. In any case, however, where the
      deposit, application, and fee required for registration have been delivered
      to the Copyright Office in proper form and registration has been refused, the
      applicant is entitled to institute a civil action for infringement if notice thereof,
      with a copy of the complaint, is served on the Register of Copyrights. The
      Register may, at his or her option, become a party to the action with respect
      to the issue of registrability of the copyright claim by entering an appearance



                                               52
       within sixty days after such service, but the Register’s failure to become a
       party shall not deprive the court of jurisdiction to determine that issue.

       (b)(1) A certificate of registration satisfies the requirements of this section
       and section 412, regardless of whether the certificate contains any
       inaccurate information, unless--

          (A) the inaccurate information was included on the application for
          copyright registration with knowledge that it was inaccurate; and

          (B) the inaccuracy of the information, if known, would have caused
          the Register of Copyrights to refuse registration.

       (2) In any case in which inaccurate information described under paragraph
       (1) is alleged, the court shall request the Register of Copyrights to advise
       the court whether the inaccurate information, if known, would have caused
       the Register of Copyrights to refuse registration.

       (3) Nothing in this subsection shall affect any rights, obligations, or
       requirements of a person related to information contained in a registration
       certificate, except for the institution of and remedies in infringement actions
       under this section and section 412.

17 U.S.C. § 411(a)-(b). The above-language of 17 U.S.C. § 411(b) was added into the
currently in effect statute at 17 U.S.C. § 411 when 17 U.S.C. § 411 was amended on
October 13, 2008, as part of the Prioritizing Resources and Organization for Intellectual
Property Act of 2008 (the 2008 PRO IP Act), Pub. L. No. 110-403, 122 Stat. 4256 (Oct.
13, 2008). See also Archie MD, Inc. v. Elsevier, Inc., 261 F. Supp. 3d 512, 515 (S.D.N.Y.
2017) (noting that the 2008 PRO IP Act amended 17 U.S.C. § 411 to provide the currently
in effect version of 17 U.S.C. § 411(b)). Prior to October 13, 2008, 17 U.S.C. § 411 did
not include language similar to the current version of 17 U.S.C. § 411(b).

        As indicated above, the statute at 17 U.S.C. § 411(a) states that, “subject to the
provisions of subsection (b), no civil action for infringement of the copyright in any United
States work shall be instituted until preregistration or registration of the copyright claim
has been made in accordance with this title.” 17 U.S.C. § 411(a); see also Fourth Estate
Pub. Benefit Corp. v. Wall-Street.com, LLC, 139 S. Ct. at 886-87 (“[R]egistration occurs,
and a copyright claimant may commence an infringement suit, when the Copyright Office
registers a copyright. Upon registration of the copyright, however, a copyright owner can
recover for infringement that occurred both before and after registration.”). The statute at
“subsection (b),” i.e., 17 U.S.C. § 411(b), states that a certificate of copyright registration
“satisfies the requirements of this section and section 412, regardless of whether the
certificate contains any inaccurate information, unless” the following circumstances are
present: “inaccurate information was included on the application for copyright registration
with knowledge that it was inaccurate;” and “the inaccuracy of the information, if known,
would have caused the Register of Copyrights to refuse registration.” See 17 U.S.C.


                                              53
§ 411(b)(1). The statute at 17 U.S.C. § 411(b), therefore, states that a copyright
registration does not satisfy the registration requirements of 17 U.S.C. § 411(a) for filing
a copyright infringement claim if: (1) inaccurate information was included on a copyright
registration application “with knowledge that it was inaccurate;” and (2) the Register of
Copyrights would have “refuse[d] registration” of the copyright registration application if
the Register of Copyrights knew that the copyright registration application included the
inaccurate information. See id. § 411(a). Although plaintiffs in the above-captioned case
argue that 17 U.S.C. § 411(b) requires that “the inaccuracies [in the copyright application]
were willful and deliberate,” the language of 17 U.S.C. § 411(b) does not prescribe a
requirement that inaccurate information be willfully or deliberately included in a copyright
registration application. Rather, the language in the statute at 17 U.S.C. § 411(b) only
requires that inaccurate information be included on a copyright registration application
“with knowledge that it was inaccurate,” as well as a showing that the inaccurate
information, if known by the Register of Copyrights, would have caused the Register of
Copyrights to refuse the copyright registration application.

        The language in 17 U.S.C. § 411(b) does not require a showing of willfulness or
fraud. Therefore, the court need not resort to the legislative history to interpret 17 U.S.C.
§ 411(b) because the language in 17 U.S.C. § 411(b) is unambiguous.16 Notwithstanding
that the language in the statute at 17 U.S.C. § 411(b) does not require a showing of fraud
or willfulness to find a copyright registration to be invalid for purposes of 17 U.S.C. §
411(a), plaintiffs attempt to put forth several arguments as to why fraud or willfulness is
required to invalidate a copyright for purposes of filing a civil action for copyright

16The court also notes, however, that the legislative history of the 2008 PRO IP Act also
does not appear to indicate that a showing of fraud or willfulness is required under 17
U.S.C. § 411(b). In a May 5, 2008 report from the United States House Committee on the
Judiciary, the United States House Committee on the Judiciary stated:

       It has also been argued in litigation that a mistake in the registration
       documents, such as checking the wrong box on the registration form,
       renders a registration invalid and thus forecloses the availability of statutory
       damages. To prevent intellectual property thieves from exploiting this
       potential loophole, the Act makes clear that a registration containing
       inaccuracies will satisfy the registration requirements of the Copyright Act
       unless the mistake was knowingly made and the inaccuracy, if known,
       would have caused the Register of Copyrights to refuse the registration.
       And in cases where mistakes in a copyright registration are alleged, courts
       will be required to seek the advice of the Register of Copyrights as to
       whether the asserted mistake, if known at the time of application, would
       have caused the Copyright Office to refuse registration.

H.R. Rep. 110-617, at 24 (2008) (footnote omitted). The above-quoted United States
House Committee on the Judiciary report does not mention any requirement of fraud or
willfulness, and plaintiffs have not cited to any legislative history indicating that a showing
of fraud or willfulness is required under 17 U.S.C. § 411(b).


                                              54
infringement. Prior to the amendment of 17 U.S.C. § 411(b) on October 13, 2008, when
analyzing whether to invalidate a copyright registration, certain courts had stated that “an
innocent misstatement, or a clerical error, in the affidavit and certificate of registration,
unaccompanied by fraud or intent to extend the statutory period of copyright protection,
does not invalidate the copyright, nor is it thereby rendered incapable of supporting an
infringement action.” See Advisers, Inc. v. Wiesen-Hart, Inc., 238 F.2d 706, 708 (6th Cir.
1956) (citing Ziegelheim v. Flohr, 119 F. Supp. 324 (E.D.N.Y. 1954)); see also Eckes v.
Card Prices Update, 736 F.2d 859, 861-62 (2d Cir. 1984) (“Only the ‘knowing failure to
advise the Copyright Office of facts which might have occasioned a rejection of the
application constitute[s] reason for holding the registration invalid and thus incapable of
supporting an infringement action . . . or denying enforcement on the ground of unclean
hands . . . .’” (alterations and omissions in original) (quoting Russ Berrie & Co. v. Jerry
Elsner Co., 482 F. Supp. 980, 988 (S.D.N.Y. 1980))). Other courts, prior to the
amendment of 17 U.S.C. § 411(b) on October 13, 2008, also had made similar statements
regarding the validity of copyright registrations, such as “inadvertent mistakes on
registration certificates do not invalidate a copyright and thus do not bar infringement
actions, unless the alleged infringer has relied to its detriment on the mistake, or the
claimant intended to defraud the Copyright Office by making the misstatement.” See
Urantia Found. v. Maaherra, 114 F.3d 955, 963 (9th Cir. 1997); see also S.O.S., Inc. v.
Payday, Inc., 886 F.2d 1081, 1086 (9th Cir. 1989) (“‘Absent intent to defraud and
prejudice, inaccuracies in copyright registration do not bar actions for infringement.’”
(quoting Harris v. Emus Records Corp., 734 F.2d 1329, 1335 (9th Cir. 1984))). As stated
above, prior to October 13, 2008, 17 U.S.C. § 411 did not include language similar to the
current version of 17 U.S.C. § 411(b) nor a standard regarding invalidation of a copyright
registration for purposes of filing a copyright infringement claim. See 2 MELVILLE NIMMER
AND DAVID NIMMER, NIMMER ON COPYRIGHT § 7.20[B][2] (Rev. ed. 2019) (“When it enacted
the Prioritizing Resources and Organization for Intellectual Property Act of 2008,
Congress for the first time took the court-made standards underlying the previous
discussion and articulated the applicable standards directly in the Copyright Act.”
(footnotes omitted)).

       Many of the cases cited in plaintiffs’ post-trial filings regarding what is required to
invalidate a copyright registration under 17 U.S.C. § 411(b) for purposes of filing a civil
copyright infringement claim predate the current version of 17 U.S.C. § 411(b), which
went into effect on October 13, 2008, including: Advisers, Inc. v. Wiesen-Hart, Inc., 238
F.2d 706 (6th Cir. 1956); Thornton v. J Jargon Co., 580 F. Supp. 2d 1261 (M.D. Fla.
2008);17 Shady Records, Inc. v. Source Enterprises, Inc., No. 03 Civ. 9944(GEL), 2005
WL 14920 (S.D.N.Y. Jan. 3, 2005); Tuff-N-Rumble Management, Inc. v. Sugarhill Music
Publishing Inc., 99 F. Supp. 2d 450 (S.D.N.Y. 2000); Lennon v. Seaman, 84 F. Supp. 2d
522 (S.D.N.Y. 2000); Testa v. Janssen, 492 F. Supp. 198 (W.D. Pa. 1980). The cases
predating the October 13, 2008 amendment of 17 U.S.C. § 411(b) do not apply the
standard for invalidating a copyright registration under the current version of 17 U.S.C. §
17 The United States District Court for the Middle District of Florida’s decision in Thornton
v. J Jargon Co., 580 F. Supp. 2d 1261, was issued on July 8, 2008, approximately three
months before the current version of 17 U.S.C. § 411 went into effect on October 13,
2008.

                                             55
411(b) because, prior to October 13, 2008, 17 U.S.C. § 411 did not include the standard
in the current version of 17 U.S.C. § 411(b).

       Since the amendment of 17 U.S.C. § 411(b), several United States Courts of
Appeals have tried to address whether a showing of fraud on the Register of Copyrights
is necessary to invalidate a copyright registration under 17 U.S.C. § 411(b).18 See Gold
Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d 1140, 1146-48 (9th Cir.
2019); Roberts v. Gordy, 877 F.3d 1024, 1029-30 (11th Cir. 2017). In Roberts v. Gordy,
the United States Court of Appeals for the Eleventh Circuit quoted the language in the
current version of 17 U.S.C. § 411(b) and stated:

      This statute [17 U.S.C. § 411(b)], which Congress modified in 2008, codifies
      the defense of Fraud on the Copyright Office.[n.5] Appellees assert that the
      2008 amendment to the Copyright Act “precludes reading ‘fraud’ into the
      statute,” see Appellees Br. at 20, and they averred at oral argument that the
      2008 amendment served as a ‘sea change’ in copyright policy that
      superseded this Court’s precedent (even though the amendment was
      enacted between the Original Appalachian [v. Toy Loft, Inc., 684 F.2d 821
      (11th Cir. 1985)] and St. Luke’s [Cataract & Laser Inst., P.A. v. Sanderson,
      573 F.3d 1186 (11th Cir. 2009)] decisions). They are wrong. This Court’s
      analysis in St. Luke’s directly cites to the post-2008 amendment statutory
      language and reaffirmed the finding from Original Appalachian that the
      “intentional or purposeful concealment of relevant information” is required
      to invalidate a copyright registration. See St. Luke’s, 573 F.3d at 1201.

      [n.5] See generally, e.g., U.S. Copyright Office, Annual Report of the
      Register of Copyrights, Fiscal Year Ending September 30, 2008 12-13
      (2008), https://www.copyright.gov/reports/annual/2008/ar2008.pdf (“The
      Prioritizing Resources and Organization for Intellectual Property Act (Pub.
      L. No. 110-403), also known as the PRO-IP Act, strengthens the intellectual
      property laws of the United States in several respects. For example, it
      amends section 411 of the copyright law to codify the doctrine of fraud on
      the Copyright Office in the registration process.”).

Roberts v. Gordy, 877 F.3d at 1029. The Eleventh Circuit’s determination in Roberts v.
Gordy that “[t]hey [the appellees in Roberts v. Gordy] are wrong” and that the current
version of 17 U.S.C. § 411(b) requires a showing that of “intentional or purposeful
concealment of relevant information” to invalidate a copyright registration appears to be
primarily based on the language in the Annual Report of the Register of Copyrights, Fiscal
Year Ending September 30, 2008 (the 2008 Annual Report of the Register of Copyrights),
and the United States Court of Appeals for the Eleventh Circuit’s post-October 13, 2008


18Following the amendment of 17 U.S.C. § 411 on October 13, 2008, the United States
Court of Appeals for the Federal Circuit has not directly addressed in a copyright case
whether a showing of fraud on the Register of Copyrights is necessary to invalidate a
copyright registration under the current version of 17 U.S.C. § 411(b).

                                           56
decision in St. Luke’s Cataract & Laser Institute, P.A. See Roberts v. Gordy, 877 F.3d at
1029 (internal quotation mark and citation omitted).

       In the 2008 Annual Report of the Register of Copyrights, the Register of Copyrights
provided a brief summary of the 2008 PRO IP Act, stating:

       The Prioritizing Resources and Organization for Intellectual Property Act
       (Pub. L. No. 110-403), also known as the PRO-IP Act, strengthens the
       intellectual property laws of the United States in several respects. For
       example, it amends section 411 of the copyright law to codify the doctrine
       of fraud on the Copyright Office in the registration process. The law also
       clarifies that registration is not a prerequisite for a criminal copyright
       prosecution and makes it unlawful (civilly and criminally) to export
       unauthorized copies or phonorecords of protected works from the United
       States. In addition, the law amends section 506 of the law to provide for the
       forfeiture to the U.S. government of any property used to commit or facilitate
       the commission of a criminal offense involving copyrighted works.

See U.S. COPYRIGHT OFFICE, ANNUAL REPORT OF THE REGISTER OF COPYRIGHTS, FISCAL
YEAR ENDING SEPTEMBER 30, 2008 12-13 (2008). In the 2008 Annual Report of the
Register of Copyrights, the Register of Copyrights did not explain how the statement in
the current version of 17 U.S.C. § 411(b) that “a certificate of registration satisfies the
requirements of this section and section 412” unless “inaccurate information was included
on the application for copyright registration with knowledge that it was inaccurate” and
“the inaccuracy of the information, if known, would have caused the Register of
Copyrights to refuse registration” codified “the doctrine of fraud on the Copyright Office.”
See U.S. COPYRIGHT OFFICE, ANNUAL REPORT OF THE REGISTER OF COPYRIGHTS, FISCAL
YEAR ENDING SEPTEMBER 30, 2008 12-13. Nor did the Register of Copyrights cite to any
legislative material to support its statement in its 2008 Annual Report of the Register of
Copyrights that the 2008 PRO IP Act “amends section 411 of the copyright law to codify
the doctrine of fraud on the Copyright Office in the registration process.” See id. Moreover,
the Register of Copyrights also did not define its understanding of “the doctrine of fraud
on the Copyright Office” and did not cite to any cases applying what the Register of
Copyrights considered to be “the doctrine of fraud on the Copyright Office.” See id.

       In St. Luke’s Cataract & Laser Institute, P.A., which the Eleventh Circuit relied upon
in Roberts v. Gordy, the United States Court of Appeals for the Eleventh Circuit was
reviewing a district court’s denial of a motion for a new trial involving a copyright
infringement claim. See St. Luke’s Cataract & Laser Inst., P.A. v. Sanderson, 573 F.3d at
1200. Regarding what was required to invalidate a copyright registration, the United
States Court of Appeals for the Eleventh Circuit stated:

       A certificate of registration satisfies the registration requirement in § 411(a)
       “regardless of whether the certificate contains any inaccurate information,
       unless . . . (A) the inaccurate information was included on the application
       for copyright registration with knowledge that it was inaccurate; and (B) the


                                             57
       inaccuracy of the information, if known, would have caused the Register of
       Copyrights to refuse registration.” Id. § 411(b)(1). “[O]missions or
       misrepresentations in a copyright application can render the registration
       invalid” where there has been “intentional or purposeful concealment of
       relevant information.” Original Appalachian Artworks, Inc. v. Toy Loft, Inc.,
       684 F.2d 821, 828 (11th Cir. 1982). Thus, there must be a showing of
       “scienter” in order to invalidate a copyright registration. Id. “In general, an
       error is immaterial if its discovery is not likely to have led the Copyright
       Office to refuse the application.” Data Gen. Corp. v. Grumman Sys. Support
       Corp., 36 F.3d 1147, 1161 (1st Cir. 1994).

St. Luke’s Cataract & Laser Inst., P.A. v. Sanderson, 573 F.3d at 1201 (omission in
original). Although the Eleventh Circuit in St. Luke’s Cataract & Laser Institute, P.A. does
quote the current language of 17 U.S.C. § 411(b), the St. Luke’s Cataract & Laser
Institute, P.A. court, nevertheless, relies on precedent predating the October 13, 2008
amendment of 17 U.S.C. § 411(b). See St. Luke’s Cataract & Laser Inst., P.A. v.
Sanderson, 573 F.3d at 1201 (quoting Original Appalachian Artworks, Inc. v. Toy Loft,
Inc., 684 F.2d at 828). The St. Luke’s Cataract & Laser Institute, P.A. court does not
explain why pre-October 13, 2008 precedent involving a requirement of intentional or
purpose concealment of information in order to invalidate a copyright registration still
applies or how the October 13, 2008 amendment of 17 U.S.C. § 411(b) impacts the earlier
precedent cited by the St. Luke’s Cataract & Laser Institute, P.A. court. See St. Luke’s
Cataract & Laser Inst., P.A. v. Sanderson, 573 F.3d at 1201. Moreover, the St. Luke’s
Cataract & Laser Institute, P.A. court does not discuss why or how the plain language of
17 U.S.C. § 411(b) requires intentional or purposeful concealment of information in order
to invalidate a copyright registration.

        Thus, the authorities relied upon in Roberts v. Gordy, 877 F.3d at 1029, namely
the 2008 Annual Report of the Register of Copyrights and St. Luke’s Cataract & Laser
Institute, P.A., 573 F.3d at 1201, contain limited analysis of the language in the post-
October 13, 2008 version of 17 U.S.C. § 411(b). The United States Court of Appeals for
the Eleventh Circuit in Roberts v. Gordy, 877 F.3d at 1029, stated that St. Luke’s Cataract
& Laser Institute, P.A. “reaffirmed the finding from Original Appalachian that the
‘intentional or purposeful concealment of relevant information’ is required to invalidate a
copyright registration,” but neither Roberts v. Gordy nor St. Luke’s Cataract & Laser
Institute, P.A. contain persuasive reasoning as to why intentional or purposeful
concealment is required to invalidate a copyright registration in light of the explicit words
in the October 13, 2008 amendment to 17 U.S.C. § 411(b).

       In Gold Value International Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d at
1146-48, the United States Court of Appeals for the Ninth Circuit, in 2019, addressed the
requirements for invalidating a copyright registration under the current version of 17
U.S.C. § 411(b). According to the Ninth Circuit:

       An inaccuracy in the application does not necessarily invalidate a copyright
       registration, however. See 17 U.S.C. § 411(b)(1). Rather, the inaccurate


                                             58
      information must have been included in the application for copyright
      registration “with knowledge that it was inaccurate” and “the inaccuracy of
      the information, if known, would have caused the Register of Copyrights to
      refuse registration.” Id.; see also L.A. Printex [Indus., Inc. v. Aeropostale,
      Inc.], 676 F.3d [841,] at 852-53 [(9th Cir. 2012)].

Gold Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d at 1146. The United
States Court of Appeals for the Ninth Circuit further stated:

      Fiesta [the appellant] claims that L.A. Printex requires a showing of fraud
      on the part of the claimant in order to invalidate a copyright registration. L.A.
      Printex did not address this issue, however. Although we stated that there
      was no evidence that the claimant intended to defraud the Copyright Office,
      we did not consider the issue of whether a showing of fraud is required to
      invalidate a registration pursuant to § 411(b). L.A. Printex, 676 F.3d at 853-
      54. We hold that Fiesta’s argument is foreclosed by the plain language of
      § 411(b), which does not require a showing of fraud, but only that the
      claimant included inaccurate information on the application “with knowledge
      that it was inaccurate.” 17 U.S.C. § 411(b)(1)(A); see also Lamie v. United
      States Tr., 540 U.S. 526, 534 (2004) (“It is well established that ‘when the
      statute’s language is plain, the sole function of the courts—at least where
      the disposition required by the text is not absurd—is to enforce it according
      to its terms.’” (citation omitted)).

      Fiesta was admittedly aware of the facts regarding its fabric sales; its
      inclusion of designs that it knew had been sold, and therefore published, in
      an unpublished collection cannot be characterized as an inadvertent or
      good faith mistake. Thus, Fiesta included inaccurate information on its
      application with knowledge that it was inaccurate.

Gold Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d at 1147-48 (footnote
omitted).

       In Gold Value International Textile, Inc., the Ninth Circuit also addressed the
Eleventh Circuit’s Opinion in Roberts v. Gordy. See Gold Value Int’l Textile, Inc. v.
Sanctuary Clothing, LLC, 925 F.3d at 1147 n.4. In a footnote, the Gold Value International
Textile, Inc. court stated:

      The Eleventh Circuit held in Roberts v. Gordy that a showing of “intentional
      or purposeful concealment of relevant information” is required to render a
      registration invalid. 877 F.3d 1024, 1029 (11th Cir. 2017) (citation omitted).
      The court relied upon its prior precedent, however, without attention to the
      plain language of § 411(b). Section 411(b) does not mention intentional
      concealment or fraud, but only that the information was included “with
      knowledge that it was inaccurate.” 17 U.S.C. § 411(b)(1).



                                             59
Gold Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d at 1147 n.4. The United
States Court of Appeals for the Ninth Circuit, therefore, concluded that a showing of fraud
or intentional concealment is not required under the current version of 17 U.S.C. § 411(b).
See id. at 1147.

        Plaintiffs cite, multiple times, to Jedson Engineering, Inc. v. Spirit Construction
Services, Inc., 720 F. Supp. 2d 904 (S.D. Ohio 2010), which was issued two years after
the 2008 PRO IP Act and the amendment of 17 U.S.C. § 411(b). In Jedson Engineering,
Inc., the Jedson Engineering, Inc. defendants argued before the United States District
Court for the Southern District of Ohio that “Jedson is not entitled to a presumption of
validity because of irregularities in the registration of Jedson’s copyrights.” Jedson Eng’g,
Inc. v. Spirit Constr. Servs., Inc., 720 F. Supp. 2d at 913. Without citing to the current
version of 17 U.S.C. § 411, which was in effect at the time of the United States District
Court for the Southern District of Ohio’s 2010 decision, the Southern District of Ohio
quoted from a 2008 unpublished decision, which the Southern District of Ohio stated
“aptly explained” that a party seeking to establish fraud on the Register of Copyrights
bears the heavy burden of establishing that the inaccuracies were deliberate. See id.
(quoting Tacori Enters. v. Rego Mfg., No. 1:05CV2241, 2008 WL 4426343, at *1 (N.D.
Ohio Sept. 25, 2008)). The United States District Court for the Southern District of Ohio’s
2010 decision in Jedson Engineering, Inc., however, did not cite to or address the
language in the current version of 17 U.S.C. § 411(b). See Jedson Eng’g, Inc. v. Spirit
Constr. Servs., Inc., 720 F. Supp. 2d at 913-14. Moreover, the Jedson Engineering, Inc.,
court relied heavily on and quoted a large passage from the unpublished decision in
Tacori Enterprises, which was issued on September 25, 2008. The version of 17 U.S.C.
§ 411(b) currently at issue in this court in the above-captioned cases went into effect on
October 13, 2008, and, therefore, the current version of 17 U.S.C. § 411(b) was not
addressed in the earlier September 25, 2008 Tacori Enterprises unpublished decision.
Because Jedson Engineering, Inc. did not cite to or analyze the language in the current
version 17 U.S.C. § 411(b) and heavily relied on the unpublished decision in Tacori
Enterprises, which predated the current version of 17 U.S.C. § 411(b), plaintiffs’ reliance
on Jedson Engineering, Inc. is misplaced.

       In the post-trial filings, plaintiffs also cite to Lego A/S v. Best-Lock Construction
Toys, Inc., 874 F. Supp. 2d 75 (D. Conn. 2012), and Sierra-Pascual v. Pina Records, Inc.,
660 F. Supp. 2d 196 (D.P.R. 2009). In Lego A/S, one party specifically alleged that a
copyright registrant had committed fraud on the Register of Copyrights and, in discussing
whether to invalidate the copy registrations at issue in Lego A/S, the United States District
Court for the District of Connecticut also did not cite to or discuss the current version of
17 U.S.C. § 411(b). See Lego A/S v. Best-Lock Constr. Toys, Inc., 874 F. Supp. 2d at
102. In Sierra-Pascual, the United States District Court for the District of Puerto Rico
stated that Pina Records, Inc. alleged “that Sierra willfully witheld [sic] the information
here at issue, a fraudulent act that would in itself invalidate the copyright registration.”
Sierra-Pascual v. Pina Records, Inc., 660 F. Supp. 2d at 203 (emphasis in original). The
Sierra-Pascual court did not cite to or discuss the current version of 17 U.S.C. § 411(b).
See id. Both Lego A/S and Sierra-Pascual specifically involved allegations of fraud on the
Register of Copyrights. Neither case provides persuasive support for plaintiffs’ argument


                                             60
that 17 U.S.C. § 411(b) requires a showing of fraud or willfulness to invalidate a copyright
for purposes of filing a copyright infringement claim.

        Additionally, plaintiffs cite to a patent case, Therasense, Inc. v. Becton, Dickinson
& Co., 649 F.3d 1276 (Fed. Cir. 2011) (en banc), and argue, in plaintiffs’ post-trial brief,
that, “[s]ince the court in Theresense [sic] opined that ‘[b]ut-for proof is required to
invalidate copyrights,[’]” it “stands to reason that the same high standards of proof must
be applied in a copyright infringement case.” Therasense, Inc. was a patent case, in which
the United States Court of Appeals for the Federal Circuit addressed the “inequitable
conduct,” patent doctrine. See Therasense, Inc. v. Becton, Dickinson & Co., 649 F.3d at
1285. The United States Court of Appeals for the Federal Circuit in Therasense, Inc.
stated:

       Moreover, if this court were to consider standards of materiality in other
       contexts, the most analogous area of law is copyright. See Sony Corp. of
       Am. v. Univ. City Studios, Inc., 464 U.S. 417, 439, 104 S.Ct. 774, 78 L.Ed.2d
       574 (1984) (finding it appropriate to draw an analogy between copyrights
       and patents “because of the historic kinship between patent law and
       copyright law”). But-for proof is required to invalidate both copyrights and
       trademarks based on applicant misconduct. See 17 U.S.C. § 411(b)(1)
       (copyright); Citibank, N.A. v. Citibanc Group, Inc., 724 F.2d 1540, 1544
       (11th Cir. 1984) (trademarks). The dissent concedes that “but for”
       materiality is required to cancel a trademark but contends that it is not
       required to invalidate federal registration of a copyright. Various courts have
       held otherwise. See 2 Melville B. Nimmer & David Nimmer, Nimmer on
       Copyright § 7.20 [B][1] (rev. ed. 2010) (“plaintiff’s failure to inform the
       Copyright Office of given facts is without substance, to the extent that the
       Office would have registered the subject work even had it known those
       facts”). Moreover, the Copyright Act has codified this “but for” requirement,
       making clear that copyright registration is sufficient to permit an
       infringement suit, even if the certificate of registration contains inaccurate
       information, unless “the inaccuracy of the information, if known, would have
       caused the Register of Copyrights to refuse registration.” 17 U.S.C. §
       411(b)(1); see also 2 Nimmer on Copyright § 7.20[B][2] (explaining that the
       materiality “standard [set forth in the 2008 amendment to the Copyright Act]
       is well in line with the construction of the Act prior to this amendment”).

Therasense, Inc. v. Becton, Dickinson & Co., 649 F.3d at 1295 (alterations in original).
The Federal Circuit’s decision in Therasense, Inc. does not indicate that, under 17 U.S.C.
§ 411(b), a showing of fraud or willfulness is required to invalidate a copyright registration
for purposes of filing a copyright infringement claim, as the Federal Circuit only mentions
that “copyright registration is sufficient to permit an infringement suit, even if the certificate
of registration contains inaccurate information, unless ‘the inaccuracy of the information,
if known, would have caused the Register of Copyrights to refuse registration.’”
Therasense, Inc. v. Becton, Dickinson & Co., 649 F.3d at 1295 (quoting 17 U.S.C.
§ 411(b)).


                                               61
       Based on the discussion above, this court concludes that 17 U.S.C. § 411(b) does
not require a showing of fraud or willfulness to invalidate a copyright registration for
purposes of filing a copyright infringement claim, and plaintiff has not demonstrated
otherwise. The court’s conclusion in the above-captioned case regarding the
interpretation of 17 U.S.C. § 411(b) is consistent with the United States Court of Appeals
for the Ninth’s Circuit’s statement in Gold Value International Textile, Inc. that the “plain
language of § 411(b)” “does not require a showing of fraud, but only that the claimant
included inaccurate information on the application ‘with knowledge that it was
inaccurate.’” See Gold Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d at
1147 (quoting 17 U.S.C. § 411(b)(1)(A)). Moreover, other district courts have found that
the language in the current version of 17 U.S.C. § 411(b) does not require a showing of
fraud or willfulness. See SellPoolSuppliesOnline.com LLC v. Ugly Pools Ariz. Inc., No.
CV-15-01856-PHX-BSB, 2018 WL 4565900, at *12 (D. Ariz. Sept. 24, 2018) (“The Court,
therefore, concludes that it is not necessary to show fraud on the copyright office for
§ 411(b)(1)(A) and (B) to apply . . . .”), appeal docketed, No. 18-16839 (9th Cir. Sept. 25,
2018); Palmer/Kane LLC v. Gareth Stevens Publ’g, No. 1:15-CV-7404-GHW, 2016 WL
6238612, at *4 (S.D.N.Y. Oct. 24, 2016) (stating that 17 U.S.C. § 411(b) does not require
a showing of fraudulent intent); Palmer/Kane LLC v. Rosen Book Works LLC, 188 F.
Supp. 3d 347, 352 (S.D.N.Y. 2016) (“Nor is plaintiff correct that the statute [17 U.S.C.
§ 411(b)] requires a showing of fraudulent intent on the part of the applicant.” (citing
Family Dollar Stores, Inc. v. United Fabrics Int’l, Inc., 896 F. Supp. 2d 223, 231 (S.D.N.Y.
2012))).

       BNT-Denmark’s ‘500 Registration and ‘490 Registration, therefore, will be invalid
for purposes of filing a copyright infringement action under 17 U.S.C. § 411(b) if the
evidence in the record before the court demonstrates: (1) that inaccurate information was
included on the two copyright registration applications “with knowledge that it was
inaccurate;” and (2) that the inaccuracies, if known by the Register of Copyrights, would
have caused the Register of Copyrights to refuse the copyright registration applications.
See 17 U.S.C. § 411(b). Courts have indicated that the party asserting that a copyright
registration is invalid under 17 U.S.C. § 411(b) bears the burden of proving that inaccurate
information was included on a copyright application with knowledge that the information
was inaccurate. See Lee v. Karaoke, No. 18-CV-8633-KM-SCM, 2019 WL 2537932, at
*6 (D. N.J. June 19, 2019); see also Palmer/Kane LLC v. Gareth Stevens Publ’g, 2016
WL 6238612, at *4; Lennar Homes of Tex. Sales & Mktg., Ltd. v. Perry Homes, LLC, 117
F. Supp. 3d 913, 925 (S.D. Tex. 2015) (stating that the party seeking to invalidate a
copyright registration under 17 U.S.C. § 411(b) had failed to identify information which
would cause the Register of Copyrights to refuse registration of a copyright application).

Whether the ‘490 Registration Contains Inaccuracies

     BNT-Denmark’s ‘490 Registration is titled “NBC Analysis JWARN 1F PHASE 2,
CRID 1489, 1490, and 1491.”19 Defendant argues that the ‘490 Registration is invalid
19According to the parties’ joint stipulation of facts, Marty Sikes transferred five laptop
computers containing images of JWARN Block 1F Phase 2 C2PC CRID 1490 to Republic

                                             62
because the ‘490 Registration contains “known, material inaccuracies and cannot support
ownership of a valid copyright.” Specifically, defendant contends that the ‘490
Registration: (1) incorrectly contains separate versions of JWARN Block 1F Phase 2
software under a single copyright registration; (2) incorrectly failed to exclude
government-owned code; (3) contains the incorrect year of completion; and (4) contains
the incorrect nation of first publication. Defendant contends that, in the Register of
Copyright’s March 18, 2019 response to questions referred by the court under 17 U.S.C.
§ 411(b)(2), the “Register concluded that all of the alleged inaccuracies” in the ‘490
Registration “would have been material if proven.” Defendant argues that BNT-Denmark
“cannot satisfy its prerequisites for bringing and establishing a claim, due to known and
material errors” in the ‘490 Registration.

       Plaintiffs, however, argue that defendant “has made no showing that any of the
information in the applications was inaccurate.” Plaintiffs contend that defendant has not
met its “heavy burden” of proving that inaccurate information was included in the ‘490
Registration. Plaintiffs allege that the information contained in the ‘490 Registration was
accurate.

       As stated above, in a judicial proceeding, a certificate of copyright registration

       made before or within five years after first publication of the work shall
       constitute prima facie evidence of the validity of the copyright and of the
       facts stated in the certificate. The evidentiary weight to be accorded the
       certificate of a registration made thereafter shall be within the discretion of
       the court.

17 U.S.C. § 410(c); see also Scholz Design, Inc. v. Sard Custom Homes, LLC, 691 F.3d
182, 186 (2d Cir. 2012) (“A certificate of copyright registration is prima facie evidence of
ownership of a valid copyright, but the alleged infringer may rebut that presumption.”
(citation omitted)); Feder’n of State Massage Therapy Bds. v. Mendez Master Training
Ctr., Inc., No. CV 4:17-02936, 2019 WL 3774067, at *5 (S.D. Tex. May 7, 2019) (stating
that a certificate of registration under 17 U.S.C. § 410(c) “creates a rebuttable
presumption that the copyright is valid” (citation omitted)). Although the ‘490 Registration
lists 2008 as the year of completion, the ‘490 Registration lists September 28, 2012 as
the date of first publication, which is within five years of the April 28, 2014 effective date
of the ‘490 Registration. The ‘490 Registration, therefore, constitutes “prima facie
evidence” of the facts stated in the ‘490 Registration, although, as discussed below, the
evidence in the record before the court refutes certain statements contained in the ‘490
Registration.

      Defendant asserts that the ‘490 Registration improperly contains three versions of
JWARN Block 1F Phase 2 software under a single copyright registration. Defendant
argues:

of Korea personnel. The parties also have stipulated that ten laptop computers containing
images of JWARN Block 1F Phase 2 Standalone CRID 1489 were transferred to the
Kingdom of Jordan. CRIDs 1489 and 1490 are registered under the ‘490 Registration.

                                             63
       [E]ach CRID number refers to a different version of the software being
       delivered: CRID 1489 incorporated a “Standalone” version of JWARN Block
       1F Phase 2; CRID 1490 incorporated a “C2PC” version of JWARN Block
       1F Phase 2; and CRID 1491 incorporated an “MCS” version of JWARN
       Block 1F Phase 2.

Plaintiffs, however, argue the differences between CRIDs 1489, 1490, and 1491 are
“functional, resulting from the program being adapted to run in three different
configurations: standalone, C2PC, and MCS.” Plaintiffs argue that the “Government
presented no witness testimony at trial showing that differences between CRIDs 1489,
1490, and 1491 were anything other than the result of interoperability with different
systems.” Plaintiffs contend that CRIDs 1489, 1490, and 1491 were properly registered
under a single copyright registration.

       The statute at 17 U.S.C. § 101 states that, “where the work has been prepared in
different versions, each version constitutes a separate work.” 17 U.S.C. § 101 (2018). In
the Register of Copyrights’ March 18, 2019 response to the court’s referral of copyright
questions, the Register of Copyrights states:

       The Compendium (Third)[20] illustrates these principles through two relevant
       examples. The first example involves source code for two versions of the
       same video game, developed for two different consoles, where the code is
       “substantially different, and not simply the result of interoperability or
       hardware compatibility.” In such a case, both versions of the software must
       be registered separately because each version contains different
       copyrightable authorship and the works are therefore separate works. In the
20In its Register of Copyrights’ March 18, 2019 response to the court’s referral of copyright
questions, the Register of Copyrights stated:

       The principles that govern how the Office examines registration applications
       are found in the Compendium of U.S. Copyright Office Practices. Bruhn
       NewTech, A/S filed its applications in 2014. The governing principles the
       Office would have applied at that time are set forth in the Compendium of
       U.S. Copyright Office Practices, Second Edition (referred to as
       “Compendium II”). In this response, the Acting Register cites the current,
       third edition of the Compendium (referred to as “Compendium (Third)”),
       which was released and became effective December 22, 2014, and was
       last updated in 2017, where the relevant practices have not materially
       changed and cites Compendium II if the relevant practices have materially
       changed or where helpful to further illustrate Office practices.

(emphasis in original). Courts have indicated that the Register of Copyright’s
interpretation of the versions of the Compendium and “copyright law” are entitled to
deference. See, e.g., Gold Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d
at 1145.

                                             64
       second example, where software is merely “adapted” to run on a different
       operating system, the different adaptations should not be registered
       separately. Office practice in such a case is for the registration specialist to
       communicate with the applicant to determine whether the author
       contributed a sufficient amount of copyrightable authorship, in which case a
       second application is warranted, or if the only differences between the
       versions were the result of interoperability or hardware compatibility, in
       which case a second application should not be filed.

       Similarly, the Compendium II describes a scenario where a “previously
       published program is adapted to run on a different model or brand of
       computer.” In such a case, the Office would have “question[ed] the nature
       and extent of the adaption” and refused registration for the second work if
       the changes were “functionally predetermined.”

       Under the Compendium II, where an applicant sought to register different
       versions of a published work and the versions contained only
       “uncopyrightable differences,” such as modifications made for the purpose
       of interoperability or hardware compatibility, Office practice was to register
       only one claim using the “best edition” as the deposit.

(emphasis in original) (footnotes omitted).

       According to the Register of Copyrights’ March 18, 2019 response:

       Had the Office been aware, prior to registration, that the claimed work
       encompassed three different separately-published versions of a computer
       program, the Office would have corresponded with the applicant to
       determine whether the three submitted versions of the program were
       substantially different or rather if the program had merely been adapted to
       run on a different model or brand of computer, as well as whether any
       differences between the versions were “functionally predetermined” or
       “simply the result of interoperability or hardware compatibility.”

The Register of Copyrights stated that the three versions of the JWARN Block 1F Phase
2 software should have been registered under separate copyright registrations “[i]f the
three versions of the program each contained a sufficient amount of copyrightable content
that was not simply the result of interoperability or hardware compatibility.”

       In the above-captioned case, CRIDs 1489, 1490, and 1491 are registered under a
single copyright registration, the ‘490 Registration. CRID 1489 was JWARN Block 1F
Phase 2 Standalone software, CRID 1490 was JWARN Block 1F Phase 2 C2PC software,
and CRID 1491 was JWARN Block 1F Phase 2 MCS software.21 Plaintiffs’ fact and expert

 The parties’ joint stipulation of facts defines Standalone software, C2PC software, and
21

MCS software, stating:


                                              65
witness, John O’Donahue, testified at the liability trial that: “As it happens, [CRIDs] 1489,
1414 and 1490 are all implementations of the same version of NBC-ANALYSIS, NBC-
ANALYSIS 10, ATP-45(C). So the core code is the same, the variations being all GOTS
code intended to interface them to the C2PC.” (capitalization in original). John
O’Donahue’s testimony takes the position that CRIDs 1489 and 1490, which are
registered under the ‘490 Registration, contain the same source code, except for
government-owned code included in CRID 1490 in order to permit CRID 1490 to operate
on the government’s C2PC operating system. Former BNT-US employee John
O’Donahue’s testimony does not suggest, that in his opinion, CRIDs 1489 and 1490 were
“substantially different” or that the differences in the source code files in CRIDs 1489 and
1490 were related to something other than compatibility with a standalone system and
the government’s C2PC system. John O’Donahue’s expert report also indicates that
CRID 1489 and CRID 1490 both were compatible with ATP-45C standards, and that
CRID 1489 and CRID 1490 both utilize a “Bruhn Newtech Baseline” of “NBC-Analysis
10.”

       According to John O’Donahue’s expert report, CRID 1489 contains 91,720 files,
while CRID 1490 contains 96,533 files.22 Defendant argues that “CRID 1489 (Standalone)
was built from approximately 5000 fewer files than CRID 1490 (C2PC)” and that the
difference in the number of files indicates that CRID 1489 should have been registered
separately from CRID 1490. (emphasis in original). Defendant, however, has not
demonstrated that the difference in the number of files between CRIDs 1489 and 1490
was related to anything other than the type of system each CRID was designed to operate
on. Defendant did not call an expert witness to discuss the differences in the files in CRIDs
1489, 1490, and 1491 or offer an expert opinion as to whether there were substantial
differences in the files in CRIDs 1489, 1490, and 1491. Rather, defendant, in one
paragraph in its supplemental post-trial brief, argues that the CRIDs in the ‘490
Registration should have been registered separately. Defendant has not shown that
CRIDs 1489, 1490, and 1491 should have been registered under separate copyright
registrations, and the evidence before the court does not demonstrate that the ‘490
Registration contains an inaccuracy based on the ‘490 Registration’s inclusion of CRIDs
1489, 1490, and 1491 under a single copyright registration, as the differences between
CRIDs 1489, 1490, and 1491 appear to be related to the different operating systems each
CRID is designed to operate on and not related to the functions of CRIDs 1489, 1490,
and 1491. Although neither side made a strong showing of their position, the burden of
proof on this issue remained with the defendant, and defendant has failed to carry the


       • Standalone: a version of JWARN Block 1 capable of operating in isolation
       from a network or a command and control host;
       • C2PC: a version of JWARN Block 1 capable of operating on the C2PC
       system; and
       • MCS: a version of JWARN Block 1 capable of operating on the MCS
       system.
22John O’Donahue’s expert report does not provide the “Bruhn Newtech Baseline” or the
numbers of files in CRID 1491.

                                             66
burden that the ‘490 Registration improperly contains three versions of the JWARN Block
1F Phase 2 software under a single copyright registration.

       The second alleged inaccuracy in the ‘490 Registration relates to whether BNT-
Denmark knowingly failed to identify and exclude government code in the copyright
application for the ‘490 Registration. According to defendant, there is a substantial
amount of government code in the ‘490 Registration. Defendant argues:

       The trial record establishes that the Government owned at least these
       significant aspects of the source code:

       • Battlefield Management Functions, see, e.g., Stip. [the parties’ joint
       stipulation of facts] ¶ 40;

       • C2PC and MCS Integration code, see, e.g., Stip. ¶ 40;

       • Messaging formats, see, e.g., Tr. [transcript] 608:25-09:24 (O’Donahue);

       • Modeling tools and interoperability, see, e.g. Stip. ¶ 33, Tr. 628:18-30:23
       (O’Donahue); and

       • Additional features developed in response to JPMIS requirements, see
       Stip. ¶ 34.

Defendant further asserts that, “[b]y 2008, BNT-US’s list of Government-owned software
components spanned a 47-page ‘GOTS Source Code Summary’ document. In total, BNT-
US identified 49 distinct GOTS source code components comprising hundreds of
individual GOTS source code files.”

        According to plaintiffs’ supplemental brief addressing the Register of Copyrights’
March 18, 2019 response, a “question of fact exists as to whether uncopyrightable
government material within CRIDs 1489, 1490, 1491 constituted a substantial portion of
this software, when balanced against the copyrightable portion of the deliveries, i.e., BNT-
Denmark core NBC-ANALYSIS COTS product.” (capitalization in original). Plaintiffs
argue that defendant has not presented evidence or expert testimony indicating that the
government off-the-shelf components incorporated into CRIDs 1489, 1490, and 1491
were substantial. Plaintiffs also assert that defendant has not presented any evidence
indicating that “the GOTS components of the CRID 1489/1490/1491 deliveries were
previously published or registered.”

       The statute at 17 U.S.C. § 409 (2018) requires, “in the case of a compilation or
derivative work, an identification of any preexisting work or works that it is based on or
incorporates, and a brief, general statement of the additional material covered by the
copyright claim being registered.” See 17 U.S.C. § 409(9). According to the Register of
Copyright’s March 18, 2019 response to the court’s referral of copyright questions:



                                            67
      [T]he Compendium II required applicants who sought to register derivative
      textual works, including derivative computer programs, to exclude all
      material that had been previously registered or published, including by a
      third-party, or that was in the public domain.

      Additionally, the Compendium II explicitly provided that if a work combines
      copyrightable elements with uncopyrightable government material, the
      claim does not extend to the uncopyrightable material and the application
      should include “an appropriate disclaimer or limitation of claims.”

      Significantly, the requirement to exclude preexisting material from the
      copyright claim only applied when the preexisting material was
      “substantial.” The Compendium II defined “substantial” to mean that the
      preexisting material represents a “significant portion of the work.” The
      Compendium II pointed to a derivative program containing a total of 5,000
      lines of program text, fifty of which were previously published, as an
      example of a work in which the preexisting material was not a substantial
      portion of the work as a whole.

(emphasis in original) (footnotes omitted). The Register of Copyrights further stated:

      If, alternatively, the material owned by the Government or a third-party had
      been previously published or registered, and the material constituted a
      ‘substantial’ portion of the version of the Software that is registered under
      Copyright Registration No. TX 7-836-490, Bruhn NewTech, A/S would have
      been required to exclude that material in its application for that version if the
      Government or third-party owned material was first incorporated into that
      version of the Software.

        In the above-captioned case, the parties have stipulated that the “software object
code in CRIDs 1489 and 1490 was compiled from a combination of COTS source code
and GOTS source code,” including Battlefield Managements Functions. CRID 1490 also
contains government-owned C2PC integration code. The Software Administrator’s
Manuals for CRIDs 1489 and 1490 each state: “JWARN 1F Phase 2 is an application
based on a Commercial Off-The-Shelf (COTS) software package developed by Bruhn
NewTech, Inc. (BNI). Additional Government Off-The-Shelf (GOTS) capabilities are
included in the package.” Plaintiffs’ expert and fact witness, John O’Donahue, also
testified that there was “GOTS code” in CRIDs 1489 and 1490. Thus, based on the
evidence before the court, CRIDs 1489 and 1490 contained government off-the-shelf
code, which was not identified or specifically excluded in BNT-Denmark’s copyright
application for the ‘490 Registration.

      As noted in the Register of Copyrights’ March 18, 2019 response, BNT-Denmark
would have needed to exclude in the copyright application for the ‘490 Registration the
government-owned material incorporated into CRIDs 1489, 1490, and 1491 if “the
material owned by the Government or a third-party had been previously published or


                                             68
registered, and the material constituted a ‘substantial’ portion of the version of the
Software that is registered under Copyright Registration No. TX 7-836-490.” Defendant
has not offered expert testimony as to whether the government-owned code in CRIDs
1489, 1490, and 1491 was “substantial.” Moreover, defendant has not cited to any
evidence regarding whether the government-owned code in CRIDs 1489, 1490, and 1491
was “previously published or registered.” In the one paragraph in defendant’s
supplemental post-trial filings addressing whether BNT-Denmark was required to exclude
the government-owned code from the application for the ‘490 Registration, defendant
cites to joint exhibit 66, which was admitted into evidence during the liability trial, and
argues that, in joint exhibit 66, “BNT-US identified 49 distinct GOTS source code
components comprising hundreds of individual GOTS source code files.” Joint exhibit 66,
which is dated January 28, 2008, is titled “GOTS Source Code Summary” and states
“[t]his document is meant to provide a correlation between the JWARN 1F SF2B1[23]
feature list and the set of software components created to meet the requirements
generated by Joint Project Manager Information Systems (JPM IS).” Joint exhibit 66 is
not specific to CRIDs 1489, 1490, and 1491, and joint exhibit 66 does not identify how
many of the government “software components” identified in joint exhibit 66 were
incorporated into CRIDs 1489, 1490, or 1491. Rather, joint exhibit 66 indicates whether
“features added to the NBC-ANALYSIS (now JWARN 1F SF2B1)” are either a “JPM IS
Product” or an “NBC-A product (independent of JPM IS requirements),” without reference
to CRIDs 1489, 1490, or 1491. (capitalization in original). Defendant has not offered any
other testimony regarding which government “software components” in joint exhibit 66
were specifically incorporated into CRIDs 1489, 1490, and 1491. Defendant, therefore,
has not established that there was inaccuracy in this regard in BNT-Denmark’s application
for registration of CRIDs 1489, 1490, and 1491 related to BNT-Denmark’s alleged failure
to exclude government-owned code from the application.

        Regarding the third alleged inaccuracy in the ‘490 Registration, which involves the
year of completion for the ‘490 Registration, the ‘490 Registration lists a year of
completion of 2008. Defendant contends that BNT-Denmark’s “internal records”
demonstrate that CRIDs 1489, 1490, and 1491 were not complete until 2012, and that
2012 is the correct year of completion for CRIDs 1489, 1490, and 1491. According to
plaintiffs, BNT-Denmark’s “original, draft application for copyright registration for CRIDs
1489, 1490, and 1491 listed the date of creation as 2011,” and BNT-Denmark’s attorney,
at the time, who completed the ‘490 Registration application, Mary Beth Tung, changed
the year of completion date on the application from 2011 to 2008 for the ‘490 Registration
after speaking with a copyright examiner. Plaintiffs argue:

      [T]he Government extracted a small number of file names from a much
      larger collection of file names examined by Mr. O’Donahue. Through this
      exercise, the Government called attention to the fact that these
      spreadsheets of file names within CRIDs 1489 and 1490 included a few
      revision dates from 2012 (i.e., after 2008). The Government provided no
      expert testimony at trial as to whether these 2012 dates reflected any
23“SF2B1” is not defined in joint exhibit 66 or in the parties’ acronym chart submitted to
the court.

                                            69
       changes to the NBC-ANALYSIS code after 2008. On the face of the
       spreadsheets, however, these “2012” files each have “jemclient” file names.
       JEM is an entirely different software product from NBC-ANALYSIS, and is
       not a Bruhn NewTech software product. Revisions to code or file names in
       CRIDs 1489 or 1490 directed only toward allowing the NBC-ANALYSIS
       software to work with JEM software would not be copyrightable elements,
       but only software links to the separate JEM dispersion model. Adapting a
       program to run on a different piece of hardware is not a copyrightable
       difference. Compendium II § 610.04.

(internal references omitted) (emphasis in original).

       When submitting an application for copyright registration, the application must
include the year in which the creation of the work in the application was completed. See
17 U.S.C. § 409(7). According to the statute at 17 U.S.C. § 101:

       A work is “created” when it is fixed in a copy or phonorecord for the first
       time; where a work is prepared over a period of time, the portion of it that
       has been fixed at any particular time constitutes the work as of that time,
       and where the work has been prepared in different versions, each version
       constitutes a separate work.

17 U.S.C. § 101. The regulation at 31 C.F.R. § 202.3 (2018) further states that the year
of completion is defined as “the latest year in which the creation of any copyrightable
element was completed.” 37 C.F.R. § 202.3(c)(4). In the Register of the Copyrights’ March
18, 2019 response to the court’s referral of questions, the Register of Copyrights states:
“According to the Compendium II, if multiple versions of a work are being registered
together (because they do not contain copyrightable differences), the applicant should
give the date of creation of the latest version of the work.” (emphasis in original).

        In the above-captioned case, witness Mary Beth Tung, as plaintiffs’ attorney,
created the application for the ‘490 Registration. In what plaintiffs and Mary Beth Tung
refer to as a “draft” application for the ‘490 Registration, which is dated April 24, 2014, the
year of creation for CRIDs 1489, 1490, and 1491 is listed as 2011. According to Mary
Beth Tung’s testimony at the liability trial, Ms. Tung received the information for the draft
application for the ‘490 Registration “from the client,” including “when it was created.” As
indicated in the quoted portions of Mary Beth Tung’s testimony in the court’s Opinion
below, Ms. Tung had difficulty recalling many details related to her work in submitting
applications for the ‘490 Registration and the ‘500 Registration. During her testimony at
the liability trial, Mary Beth Tung noted that “[i]t’s been years” since she submitted the
copyright applications for the ‘490 Registration and ‘500 Registration and frequently
responded to questions by stating that she could not remember. When Ms. Tung
submitted the applications for the ‘490 Registration and ‘500 Registration, Ms. Tung was
an attorney with Davis, Agnor, Rapaport & Skalny, which is a law firm at which plaintiffs’
current counsel of record, Steven Lewicky, formerly was a partner. Ms. Tung testified that
she left “the firm at the end of January of 2015.” Ms. Tung testified that she became an


                                              70
attorney in 2011, which is three years prior to when the applications for the ‘490
Registration and ‘500 Registration were submitted in 2014. During the liability trial, the
following exchange between Ms. Tung and counsel of record for defendant, Scott Bolden,
occurred:

       Mr. Bolden: In total, how many copyright applications have you filed as an
       attorney?

       Ms. Tung: I don’t know. I wasn’t -- at that point, I had been an attorney two
       or three years, so three years I guess, by 2014. So I don’t know.

       Mr. Bolden: Could the number be four?

       Ms. Tung: It could have been. But I also assisted on copy -- a lot of copyright
       filings prior to that that were filed by attorneys in the firm. So I don’t know. I
       really don’t know.

       At the liability trial, Mary Beth Tung was shown plaintiffs’ exhibit 1071, containing
handwritten notes on paper, and Mary Beth Tung identified the handwriting in plaintiffs’
exhibit 1071 as her own handwriting. Ms. Tung stated that, based on her review of the
handwritten notes in plaintiffs’ exhibit 1071, she believed that she spoke with a copyright
examiner on May 1, 2014. Ms. Tung stated that, during the May 1, 2014 discussion, “it
appears that we discussed the creation publication date.” Ms. Tung stated that her notes
also indicated that she had a second discussion with a copyright examiner on May 7,
2014, and that her handwritten notes indicate that “[i]t appears there was some changes
that she [the copyright examiner] wanted made,” including a “change in the completion
date to 2008.” The following discussion occurred during Mary Beth Tung’s testimony:

       Mr. Lewicky: And do you have a recollection of why the Copyright Office
       suggested these particular changes?

       Ms. Tung: If I remember, there was -- because the first 25 pages and last
       25 pages were submitted, they wanted to -- the examiner wanted to make
       sure that the -- there were some dates I think embedded in the code if I
       remember, and she just wanted to make sure that those matched. It didn’t
       have anything to do with the actual completion date, it’s she felt that what
       was embedded in the code that was going to be visible to the public would
       match what the application said. So it was more of an administrative
       change.

In a May 12, 2014 email message sent by Mary Beth Tung to the copyright examiner, Ms.
Tung requested that the completion date for the ‘490 Registration be changed from 2011
to 2008.

      Plaintiffs’ expert and fact witness, John O’Donahue, attached to his expert report
Microsoft Excel spreadsheets, in native format, containing information related to the


                                              71
source code files in CRIDs 40, 1489, and 1490, which were titled “CRID40Revisions,”
“CRID1489Revisions,” and “CRID1490Revisions.”24 (capitalization in original). Each of
the “Revisions” spreadsheets contained four columns. (capitalization in original). During
the liability trial, John O’Donahue testified the first column, Column A, contains
“essentially an assigned ID number,” the second column, Column B, contains “the name
of the source file itself,” and the third column, Column C, “shows the name of the source
file and the path that it’s in.” The fourth column, Column D, contains information related
to the revisions made to the source code file, as well as the revision number, the date
and time of the revision, and the initials of the individual who made the revision.

       While looking at the “CRID1489Revisions” spreadsheet during the liability trial, the
following exchange between counsel of record for defendant, Scott Bolden, and John
O’Donahue occurred:

      Mr. Bolden: Let’s go to record ID number 122716. And, Mr. O’Donahue, this
      spreadsheet is with respect to CRID 1489, correct?

      Mr. O’Donahue: Yes, it is.

      Mr. Bolden: Okay. And so for this particular file, it’s named
      invokejemclient.cpp, and if we could move to column D, please, and this file
      has a revision of 1.24, with a date of July 17th, 2012. Do you see that?

      Mr. O’Donahue: I do.

      Mr. Bolden: So does it appear that CRID 1489 was first built in 2012 or
      thereafter?

      Mr. O’Donahue: It does.

Thereafter, when looking at the “CRID1490Revisions” spreadsheet, the following
exchange between counsel of record for defendant and John O’Donahue occurred:

      Mr. Bolden: Would you agree that you created this particular file with respect
      to CRID 1490?

      Mr. O’Donahue: Yes, I would.

      Mr. Bolden: Okay. And let’s go to record 92354. All right, the listing at record
      92354 is a file again named invokejemclient.cpp, and if we could go to
      column D, please. That has a revision number of 1.24 with a date of July
      17th, 2012, correct?
24CRID 40 is registered under the ‘500 Registration, and Mr. O’Donahue’s revision
spreadsheet regarding CRID 40 is discussed below. The record before the court does not
contain a revisions spreadsheet for CRID 1491, which is registered under the ‘490
Registration.

                                            72
      Mr. O’Donahue: Correct.

      Mr. Bolden: So do you believe that CRID 1490 was first built in 2012 or at
      some point thereafter?

      Mr. O’Donahue: At some point thereafter, yes.

        According to John O’Donahue’s “CRID1489Revisions” spreadsheet, in CRID
1489, there are twenty-three source code files with revision dates in July 2012, two source
code files with revision dates in 2011, and more than seventy source code files with
revision dates in 2009. (capitalization in original). According to John O’Donahue’s
“CRID1490Revisions” spreadsheet, in CRID 1490, there are twenty-three source code
files with revision dates in July 2012, two source code files with revision dates in 2011,
and more than one hundred source code files with revision dates in 2009. (capitalization
in original). The application for the ‘490 Registration did not identify any of the source
code files revised in 2009, 2011, or 2012, nor did the ‘490 Registration disclaim those
revised source code files from the application for the ‘490 Registration. Although the
application for the ‘490 Registration claims that the works in the ‘490 Registration were
complete in 2008, both CRIDs 1489 and 1490 were revised multiple times after 2008,
most recently in 2012, and plaintiffs’ expert and fact witness John O’Donahue testified
that CRIDs 1489 and 1490 were not complete until 2012 or sometime thereafter. Thus,
listing 2008 as the year of completion in the application for the ‘490 Registration was
inaccurate because source code files in CRIDs 1489 and 1490 were revised in 2009,
2011, and 2012, and CRIDs 1489 and 1490 were not complete until after the revisions
occurring in 2012.

       Regarding the fourth alleged inaccuracy in the ‘490 Registration, which is that the
‘490 Registration allegedly incorrectly lists Denmark as the nation of first publication,
defendant argues that the correct nation of first publication is the United States.
Defendant contends that CRIDs 1489 and 1490 “were first distributed in the United
States, to the United States, by a subsidiary based in the United States.” According to
defendant, BNT-Denmark’s “internal records” demonstrate that CRIDs 1489 and 1490
were first published in the United States. Defendant argues that, “[s]ince the correct
information is apparent from its internal records, BNT-Denmark knew or should have
known about the inaccurate nations of first publication.”

        According to plaintiffs, CRIDs 1489 and 1490 were first published in Denmark.
Plaintiffs argue that the “Government points out that delivery notes indicate that CRIDs
1489, 1490, and 1491 were delivered to locations in the United States, but the elements
of NBC Analysis-JWARN that are protectible by copyright (i.e., the core NBC-Analysis
product) were first published in Denmark.” Plaintiffs argue that defendant “presented no
evidence at trial showing that core NBC-ANALYSIS elements of CRIDs 1489 or 1490
were delivered or published in the United States before they were published and made
available for commercial sale in Denmark.” (capitalization in original).



                                            73
       An application for copyright registration must include the “date and nation of its first
publication,” “if the work has been published.” See 17 U.S.C. § 409(8). In the third edition
of the Compendium, the United States Copyright Office defines the nation of first
publication as “the country where copies or phonorecords of the work were first published
with the authorization of the copyright owner.” U.S. COPYRIGHT OFFICE, COMPENDIUM OF
U.S. COPYRIGHT OFFICE PRACTICES § 612.5 (3d ed. 2014).25 The statute at 17 U.S.C.
§ 101 defines publication as:

       [T]he distribution of copies or phonorecords of a work to the public by sale
       or other transfer of ownership, or by rental, lease, or lending. The offering
       to distribute copies or phonorecords to a group of persons for purposes of
       further distribution, public performance, or public display, constitutes
       publication. A public performance or display of a work does not of itself
       constitute publication.

17 U.S.C. § 101. At least one court has indicated that computer software products are
published when the computer software products are “distributed for sale.” Auto. Data
Sols., Inc. v. Directed Elecs. Can., Inc., No. CV 18-1560-GW(EX), 2018 WL 4742289, at
*5 (C.D. Cal. Aug. 15, 2018); see also COMPENDIUM (THIRD) § 612.2 (“Software is
distributed when copies are distributed by purchase or license, whether in CD-ROM
format or online (provided that the copies are actually downloaded and not merely
accessed online).”).

        In the April 24, 2014 draft application for the ‘490 Copyright Registration, as
plaintiffs’ then attorney Mary Beth Tung originally listed the United States as the nation of
first publication for CRIDs 1489, 1490, and 1491 and listed the copyright “[c]laimants” as
BNT-US. During her testimony, Ms. Tung testified that she received the information
required for the April 24, 2014 draft application “from the client.” During Ms. Tung’s
testimony, plaintiffs’ counsel of record, Steven Lewicky, inquired about Ms. Tung’s Mary
2014 telephone conversations with a copyright examiner, asking: “Do you recall any
discussion with the Copyright Office about the changing or altering the location of the
creation of the software, the country of creation?” Ms. Tung responded: “I don’t remember
any discussions about that at all.” On the issued certificate of registration for the ‘490
Registration, however, the copyright claimant is BNT-Denmark, the nation of first
publication is Denmark, and the date of first publication is listed as September 28, 2012.
As discussed above, the nation of first publication is not determined by where a work is
created, but, rather, is determined by where the work is first published. See U.S.
COPYRIGHT OFFICE, COMPENDIUM OF U.S. COPYRIGHT OFFICE PRACTICES (THIRD) § 612.5.

         BNT-US delivered JWARN Block 1F Standalone CRID 1489 and JWARN Block
1F Phase 2 C2PC CRID 1490 to JPMIS on September 28, 2012, which is the same date
of first publication stated in the ‘490 Registration. BNT-US’ September 28, 2012 deliveries
of CRID 1489 and CRID 1490 were made to JPMIS in San Diego, California, and BNT-
25 As stated in the Register of Copyrights’ March 18, 2019 response to the court’s referral
of questions, the “principles that govern how the Office examines registration applications
are found in the Compendium of U.S. Copyright Office Practices.” (emphasis in original).

                                              74
US’ delivery notes for CRIDs 1489 and 1490 both state “Release Date: September 28,
2012.” BNT-US’ delivery notes for CRIDs 1489 and 1490 also state that CRIDs 1489 and
1490 “may not be exported from the United States, either in their original form or
incorporated in other end items, without the prior written approval of the U.S. Department
of State.” (emphasis omitted). The record before the court does not support that BNT-
Denmark had distributed CRIDs 1489 and 1490, which were designed and delivered to
the United States government pursuant to BNT-US’ subcontracts with Northrop
Grumman, to the public or any other entity in Denmark or elsewhere prior to BNT-US’
September 28, 2012 deliveries of CRIDs 1489 and 1490 to the government in San Diego,
California. As discussed above, the deliveries of CRIDs 1489 and 1490 were made by
BNT-US as part of Northrop Grumman’s “Global Operations” project, and both CRIDs
1489 and 1490 contained government off-the-shelf code. CRID 1490 specifically was
designed to operate on the United States government’s C2PC operating system. The
accurate nation of first publication for the ‘490 Registration, therefore, is the United States,
as opposed to the listed nation of Denmark. Indeed, the ‘490 Registration identifies
September 28, 2012, as the date of first publication, which is the date BNT-US delivered
CRIDs 1489 and 1490 to the United States government in San Diego, California.

        Plaintiffs also argue that BNT-Denmark’s “core” NBC-Analysis software, which
plaintiffs define as the “core COTS product developed and periodically updated by BNT-
Denmark,” was first published in Denmark, and, thus, the country of first publication for
the ‘490 Registration is Denmark for CRIDs 1489, 1490, and 1491. Under a heading titled
“Limitation of copyright claim,” the ‘490 Registration, however, stated “Material excluded
from this claim: previous versions.” (capitalization in original) (emphasis added). The ‘490
Registration, therefore, explicitly “excluded” previous versions of BNT-Denmark’s NBC-
Analysis, including previous versions of “core” software, published prior to CRIDs 1489,
1490, and 1491 from the ‘490 Registration. As stated in the Register of Copyrights’ March
18, 2019 response:

       Any material that had been included in a version of the Software that had
       been published previously could not be claimed as part of the TX 7-836-490
       application. Indeed, Bruhn NewTech, A/S explicitly disclaimed previous
       versions of the Software in the TX 7-836-490 application, so the material in
       those versions is not covered by that registration.

The ‘490 Registration pertains to CRIDs 1489, 1490, and 1491 and needed to reflect the
nation in which CRIDs 1489, 1490, and 1491 were first published. As discussed above,
the evidence before the court indicates that CRIDs 1489 and 1490 were first published in
the United States on September 28, 2012. Moreover, if the court accepted plaintiffs’
argument that CRIDs 1489 and 1490 were first published in Denmark because BNT-
Denmark’s “core” NBC-Analysis software was sold in Denmark, the date of first
publication, which is September 28, 2012, would be inaccurate and incorrect, as BNT-
Denmark had sold its “core” NBC-Analysis software prior to September 28, 2012. The
‘490 Registration, therefore, contains inaccuracy as to the nation of first publication.




                                              75
Whether the ‘500 Registration Contains Inaccuracies

       The ‘500 Registration is titled, “NBC Analysis - CRID 0040.” Defendant argues that
the ‘500 Registration is invalid for purposes of filing a copyright infringement claim
because the ‘500 Registration allegedly contains an incorrect year of completion and an
incorrect nation of first publication. Regarding the year of completion, defendant argues
that the ‘500 Registration states that the year of completion for CRID 40 is 1998, while
BNT-Denmark’s “internal records” provide that CRID 40 was completed in 1999. Plaintiffs
assert:

       The date of the ‘2076 Contract is May 13, 1998. Mr. Windesheim testified
       that Bruhn NewTech delivered the DOS software for NBC-ANALYSIS five
       or six days after the company signed the contract (i.e., during May 1998).
       The Windows version of NBC-ANALYSIS designated as CRID 0040 was
       delivered to the Government on January 15, 1999. Applying the Copyright
       Office’s guidance, only the “most complete” version of a program is to be
       registered, and the Windows version was the most complete. Because the
       core software of NBC-ANALYSIS was created in 1998, and the 1999
       Windows version was a modification to allow it to run on a different platform,
       both versions did not require registration.

(capitalization in original) (internal references omitted). Defendant, however, contends:

       Plaintiffs argue that the 1998 date was correct by conflating the registered
       CRID 40 delivery with an unregistered prior “DOS version” delivery.
       Plaintiffs’ argument is deeply flawed and contradicted by the Register’s
       views. Again, the Register explained that BNT-Denmark’s registrations
       were limited to the most recent changes, and could not encompass content
       from previously published works. And again, BNT-Denmark’s internal
       records demonstrate that CRID 40 was first completed and built in 1999.

(internal references omitted).

       As stated above, in a judicial proceeding, a certificate of copyright registration

       made before or within five years after first publication of the work shall
       constitute prima facie evidence of the validity of the copyright and of the
       facts stated in the certificate. The evidentiary weight to be accorded the
       certificate of a registration made thereafter shall be within the discretion of
       the court.

17 U.S.C. § 410(c). The ‘500 Registration lists a date of first publication of January 12,
1999, which indicates publication happened more than five years before the April 28,
2014 effective date of the ‘500 Registration. The “evidentiary weight to be accorded” to
the ‘500 Registration, therefore, is “within the discretion of the court.” See id. Certain
courts have stated that, “[e]ven in the case where a registration certificate is dated more


                                             76
than five years after the date of first publication, the court may exercise its discretion
under § 410(c) and give it the weight of prima facie evidence.” Lee v. Karaoke, 2019 WL
2537932, at *6 (internal quotation marks and citation omitted). Other courts have
concluded that “the registrations here are entitled to no such presumption [under 17
U.S.C. § 410(c)] because they were filed more than five years after the first publication of
the work.” DRK Photo v. McGraw-Hill Glob. Educ. Holdings, LLC, 870 F.3d 978, 987 (9th
Cir. 2017), cert. denied, 138 S. Ct. 1559, 200 L. Ed. 2d 744 (2018). In the above-captioned
case, as discussed below, the evidence in the record before the court refutes certain
assertions contained in the ‘500 Registration.

      As discussed above, an application for copyright registration must include the year
in which the creation of the work in the application was completed. See 17 U.S.C.
§ 409(7). The statute at 17 U.S.C. § 101 states:

       A work is “created” when it is fixed in a copy or phonorecord for the first
       time; where a work is prepared over a period of time, the portion of it that
       has been fixed at any particular time constitutes the work as of that time,
       and where the work has been prepared in different versions, each version
       constitutes a separate work.

17 U.S.C. § 101.

       There are two draft copyright applications in the record before the court for the ‘500
Registration, both of which were prepared by plaintiffs’ then attorney Mary Beth Tung.
The first draft copyright application for the ‘500 Registration, plaintiffs’ exhibit 1073, is
dated April 22, 2014 and states that CRID 40 was complete in 2008. The second draft
copyright application for the ‘500 Registration, which is dated April 24, 2014, lists 1995
as the year of completion for CRID 40. During the liability trial, Ms. Tung stated that she
received information related to the year of completion for CRID 40 “from the client.” Ms.
Tung also reviewed her handwritten notes and testified that, when speaking to a copyright
examiner, she believed that there “was a change in [the] completion date to 1998.” On
May 12, 2014, Ms. Tung sent an email message to the copyright examiner regarding
CRID 40 and the ‘500 Registration, in which Ms. Tung stated: “Change the Year of
Completion from ‘1995’ to ‘1998.’” (capitalization in original).

        BNT-US’ delivery note for CRID 40 has a “[d]elivery date” of January 15, 1999 and
indicates that delivery of CRID 40 was made to the United States Marine Corps Tactical
Systems Support Agency in Camp Pendleton, California, pursuant to the ‘2076 Contract.
During the liability trial, Bruce Windesheim, who joined BNT-US in 1995 and whose
signature block in 1998 indicates that he was vice president of BNT-US as of 1998,
testified that BNT-US’s January 15, 1999 delivery included “six CDs” “to replace the
original six DOS CDs with the Windows CD that the Government insisted that we do.” In
the “CRID40Revisions” spreadsheet attached to plaintiffs’ expert and fact witness John
O’Donahue’s expert report, Mr. O’Donahue identifies over sixty source code files which
were revised during January 1999. (capitalization in original). During the liability trial, while



                                               77
examining the “CRID40 Revisions” spreadsheet, counsel of record for defendant, Scott
Bolden, and Mr. O’Donahue had the following discussion:

      Mr. Bolden: I’d like to turn our attention to assigned ID number 38228,
      please. On this particular line, do you see a file that’s named analyp.csx?

      Mr. O’Donahue: Yes, I do.

      Mr. Bolden: And that file has a revision of 1.8, with a date of January 12th,
      1999?

      The Court: Could you highlight that one for us all?

      Mr. Bolden: (Counsel complied)

      The Court: All right, thank you.

      Mr. Bolden: With a revision date of January 12th, 1999?

      Mr. O’Donahue: I do.

      Mr. Bolden: Okay. We’ll look at another one. Let’s look at assigned ID
      number 17844. So here we have a file named attack.cxx with a revision of
      1.56, with a date of January 4th, 1999.

      Mr. O’Donahue: I see that.

      Mr. Bolden: Okay. So CRID 40, at least as what we’ve seen so far, includes
      source code files that are dated from 1999?

      Mr. O’Donahue: From, yes, January -- contains some in January 1999.
      That’s correct.

      Mr. Bolden: So CRID 40 must have been built in 1999 or thereafter?

      Mr. O’Donahue: Yes, basically any time after the latest revision you can find
      anywhere in that list.

        The evidence in the record before the court, therefore, indicates that BNT-US was
revising the source code files in CRID 40 in January 1999, prior to delivery of CRID 40 to
the government on January 15, 1999. CRID 40 does not appear to have been created
until after the revisions in the source code for CRID 40 were complete in January 1999.
Indeed, plaintiffs’ expert and fact witness, former BNT-US software engineer and
manager, John O’Donahue, testified that there were revisions to the CRID 40 source code
in January 1999, and that CRID 40 was not “built” until “after the latest revision you can
find anywhere” in the “CRID40Revisions” spreadsheet. Thus, the statement in the ‘500


                                           78
Registration that CRID 40 was complete in 1998 is inaccurate, as the revisions to the
source code files in CRID 40 were not complete until 1999.

        Moreover, plaintiffs’ argument that, “[b]ecause the core software of NBC-
ANALYSIS was created in 1998, and the 1999 Windows version was a modification to
allow it to run on a different platform, both versions did not require registration” is incorrect.
That the DOS version of NBC-Analysis software was created in 1998 does not change
that completion of CRID 40, which was NBC-Analysis software designed for use on
Windows, occurred in 1999, when the source code revisions of CRID 40 were complete.
In the ‘500 Registration, under a heading titled “Limitation of copyright claim,” the ‘500
Registration stated: “Material excluded from this claim: photographs, previous versions,”
thereby excluding previous versions of the NBC-Analysis software, including the 1998
DOS version of NBC-Analysis. (capitalization in original). The ‘500 Registration also
identified “text, compilation, editing, computer program, artwork,” as “[n]ew material
included in this claim.” In the Register of Copyrights’ March 18, 2019 response, the
Register of Copyrights states:

       [T]he application to register NBC Analysis – CRID 0040 covers only new
       material that was added to or modified in the Software when that version of
       the Software was published in January 1999. In the application to register
       this work, Bruhn NewTech, A/S explicitly disclaimed previous versions of
       the Software. That registration covers only the material in the Software that
       was first added or modified in the version that was published in January
       1999. Any content that had been previously published as part of a different
       version of the Software is not included in the TX 7-836-500 registration.

(footnote omitted). Plaintiffs’ argument involving a 1998 DOS version of NBC-Analysis,
therefore, fails, and the ‘500 Registration inaccurately lists 1998 as the year of completion
for CRID 40, which was not complete until 1999.

        Defendant also alleges that the nation of first publication of CRID 40 in the ‘490
Registration, which is listed as Denmark, is inaccurate. Defendant argues that CRID 40
was first published in the United States, not Denmark. Defendant asserts that plaintiffs
have not identified any previous publication of CRID 40 other than publication in the
United States. According to plaintiffs, however, there is “no evidence” that CRID 40 was
first published in the United States. Plaintiffs argue that the code for CRID 40 was written
in Denmark, and that “NBC-ANALYSIS was the commercial-off-the-shelf (COTS) product
of BNT-Denmark, created in Denmark and made available for commercial sale in
Denmark.” (capitalization in original).

         In plaintiffs’ “CRID40Revisions” spreadsheet, prepared by John O’Donahue who
testified as both a fact witness and expert witness at the liability trial, Mr. O’Donahue lists
revision dates of source code files as being as late as January 12, 1999, and, at the
liability trial, Mr. O’Donahue testified that CRID 40 was not complete until “basically any
time after the latest revision.” As stated above, the ‘500 Registration stated that BNT-
Denmark had “excluded from this claim,” i.e., the ‘500 Registration, “previous versions,”


                                               79
if any, of CRID 40, which would exclude any previously published versions of CRID 40
from the ‘500 Registration, including the alleged previous versions of “core” NBC-Analysis
software and the 1998 DOS software. At the liability trial, plaintiffs’ counsel of record
asked Bruce Windesheim: “Did there come a time when Bruhn NewTech U.S. delivered
a Windows version of NBC-ANALYSIS?” (capitalization in original). Mr. Windesheim
responded: “At the customer’s request, we first started it. When they took the original
delivery, our Windows version wasn’t quite ready. It was almost but not quite, and they
insisted that as soon as it was ready, we had to then deliver that to them, and we did.” In
the delivery note of CRID 40, BNT-US lists a delivery date of January 15, 1999 to the
United States government in Camp Pendleton, California. The record before the court
indicates that CRID 40 was first complete on January 12, 1999, and was first published
in the United States, when BNT-US delivered to the United States government CRID 40
in California on January 15, 1999, pursuant to the ‘2076 Contract. Thus, the ‘500
Registration inaccurately lists Denmark as the nation of first publication.

Knowledge and Materiality of the Inaccuracies in the ‘490 Registration and the ‘500
Registration

        As demonstrated above, the ‘490 Registration and the ‘500 Registration both
contain inaccurate years of completion, as well as inaccurate nations of first publication.
“An inaccuracy in the application does not necessarily invalidate a copyright registration,
however.” Gold Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d at 1146
(citing 17 U.S.C. § 411(b)(1)). The statute at 17 U.S.C. § 411(b)(1) applies when “the
inaccurate information was included on the application for copyright registration with
knowledge that it was inaccurate,” and “the inaccuracy of the information, if known, would
have caused the Register of Copyrights to refuse registration.” See 17 U.S.C. § 411(b)(1).
“Section 411(b)(1) presents a conjunctive test: both conditions must be satisfied in order
for an inaccuracy in a registration to defeat a claim.” Archie MD, Inc. v. Elsevier, Inc., 261
F. Supp. 3d at 518-19 (citation omitted). An applicant for a copyright registrant will have
knowledge of inaccurate information in a copyright application when the applicant is
“aware” of the facts underlying the inaccuracy. See Gold Value Int’l Textile, Inc. v.
Sanctuary Clothing, LLC, 925 F.3d at 1147 (“Fiesta knowingly included previously
published designs in its application to register an unpublished collection. Fiesta was
aware that it had sold yards of fabric to customers prior to registering the 1461 Design as
part of an unpublished collection. Although Fiesta asserts that it did not believe that such
sales constituted publication as a matter of law, Fiesta provides no reasonable basis for
this belief.”); see also Palmer/Kane LLC v. Rosen Book Works LLC, 188 F. Supp. 3d at
352 (“While plaintiff objects that there is no evidence that plaintiff knew the information
was inaccurate, plaintiff’s 30(b)(6) witness testified that the works had been published by
the time the May 18, 2001 application had been filed, which plaintiff surely would have
known at the time as well.” (emphasis in original)). “Moreover, ‘the term “‘“knowingly”’”
does not necessarily have any reference to a culpable state of mind or to knowledge of
the law. As Justice Jackson correctly observed, “‘“the knowledge requisite to knowing
violation of a statute is factual knowledge as distinguished from knowledge of the law.”’”’
Gold Value Int’l Textile, Inc. v. Sanctuary Clothing, LLC, 925 F.3d at 1147 (quoting Bryan



                                             80
v. United States, 524 U.S. 184, 192 (1998) (quoting Boyce Motor Lines v. United States,
342 U.S. 337, 345 (1952) (Jackson, J., dissenting))).

       Regarding the inaccurate years of completion in the ‘490 Registration and the ‘500
Registration, BNT-Denmark, the registrant of the ‘490 Registration and the ‘500
Registration, created and had access to the source code for CRIDs 40, 1489, 1490, and
1491. Based on the review by plaintiffs’ fact and expert witness, John O’Donahue, of the
source code from CRIDs 40, 1489, and 1490, Mr. O’Donahue was able to determine when
revisions to source code files in CRIDs 40, 1489, and 1490 were made, as well as which
Bruhn NewTech employee had made each revision to the source code files. Former BNT-
US employee John O’Donahue described the process by which Bruhn NewTech
maintained its source code files, stating:

      For Bruhn NewTech, Bruhn NewTech was actually ISO 9001 certified as an
      IT development company, which meant that they had to follow a large
      number of rules defined in ISO 9001. Amongst these are the use of what’s
      called a code management system.

             Now, the purpose of a code management system is to track the
      software at various different levels. So starting at the lowest level, the lowest
      level would be a single code file, and that code file, as I mentioned earlier,
      tends to go through a number of revisions. So the configuration
      management system keeps track of those revisions by revision number,
      revision date and time stamp, and the ID of the developer who made the
      revision.

              The way that the system that Bruhn NewTech used did this was, at
      least in part, to record this information at the bottom of every file. So every
      source file will show at the bottom a list of revisions made to it with the
      revision number, date, time stamp and initials.

              The next level up is that the configuration management system
      keeps track of exactly which versions, so the revisions of each code file go
      into a given customer release. So, for instance, the first one that we’ve been
      discussing in this case is called customer release ID 40, or CRID40, and
      the code management system retained a record of exactly which source
      code files and which versions of those source code files went into that
      particular revision.

              Subsequently, higher numbers were reduced for later customer
      releases, and they would also be tracked the same way. So you would a
      find a list of files with the current revision level and then you could look in
      the file for the revision history for that particular file.

BNT-Denmark, therefore, had the source code files for CRIDs 40, 1489, 1490, and 1491
and was able to look at the source code files to determine when the CRIDs were


                                             81
completed for CRIDs 40, 1489, 1490, and 1491 based on the latest revision to each of
those four CRIDs.

       Moreover, BNT-Denmark knew that the Copyright Office did not have the entire
source code for CRIDs 40, 1489, 1490, and 1491. In her testimony at the liability trial in
the above-captioned case, plaintiffs’ then attorney Mary Beth Tung, who submitted
applications for the ‘490 Registration and the ‘500 Registration, testified that she received
only part of the “computer code” from “the client” and that she did not receive the entire
“computer code” from “the client.” Ms. Tung testified that “I did not have the complete
computer code” and indicated that her deposits with the Copyright Office did not include
the “complete computer code” because “[i]t’s not required to be filed.” According to Ms.
Tung’s testimony, only “the first 25 pages and last 25 pages were submitted,” and “the
examiner wanted to make sure that the -- there were some dates I think embedded in the
code if I remember, and she just wanted to make sure that those matched.” The dates
Ms. Tung referred to were included in the record before the court. In the material
deposited with the Copyright Office for the ‘490 Registration, the following image appears:




As indicated in the image immediately above, the material deposited with the ‘490
Registration lists a revision date of March 28, 2008, which the copyright examiner would
have been able to review. The materials deposited with the ‘500 Registration include
numerous revision dates in 1998, including the following image:




As indicated in the image immediately above, there are revision dates in 1998, which
would have been available for review by the copyright examiner.

        Plaintiffs, however, knew that they had not provided the entire source code for
CRIDs 40, 1489, 1490, and 1491 to Ms. Tung and knew that Ms. Tung only had a portion
of the source code for CRIDs 40, 1489, 1490, and 1491 to provide to the Copyright Office.

                                             82
As such, BNT-Denmark knew that the revision dates in the portions of code for CRIDs
40, 1489, 1490, and 1491 being provided to the Copyright Office would not provide
accurate years of completion because BNT-Denmark knew that Ms. Tung, and the
Copyright Office, did not have the full source code for CRIDs 40, 1489, 1490, and 1491.
Ms. Tung’s testimony indicates that BNT-Denmark was aware that the copyright examiner
was looking at dates “embedded in the code” provided to the Copyright Office, which was
limited and incomplete, in an effort to determine when CRIDs 40, 1489, 1490, and 1491
were first completed. BNT-Denmark, however, had the complete source code for each of
CRIDs 40, 1489, 1490, and 1491 at the time it submitted its applications for the ‘490
Registration and ‘500 Registration and was able to review the revision dates in the source
code to determine when each of the CRIDs were first completed. As indicated in the
testimony of John O’Donahue, BNT-Denmark had the ability to look at individual CRIDs
to see when the source code files were last revised, which provides the year in which a
CRID is completed. The evidence before the court does not indicate BNT-Denmark, as a
multi-national software corporation, was unable to review the revision dates in its source
code of CRIDs 40, 1489, 1490, and 1491 to determine when those CRIDs were created,
as the information contained within BNT-Denmark’s own files provided the BNT-Denmark
with accurate years of completion. Thus, BNT-Denmark had knowledge of the correct
years of completion for CRIDs 40, 1489, 1490, and 1491 and should have established
whether the information being submitted to the Copyright Office was accurate.
Specifically, BNT-Denmark had the knowledge to determine whether it was inaccurate to
state in the copyright application for the ‘500 Registration that CRID 40 was complete in
1998, as opposed to 1999, and whether it was inaccurate to state in the ‘490 Registration
that CRIDs 1489 and 1490 were complete in 2008, as opposed to 2012.

        Regarding the inaccurate nations of first publication, BNT-US’ delivery notes
indicate when, where, and to which organization CRIDs 40, 1489, and 1490 were
delivered. As stated above, BNT-Denmark had the source code and knew when CRIDs
40, 1489, and 1490 were first complete. By knowing when CRIDs 40, 1489, and 1490
were complete and where CRIDs 40, 1489, and 1490 were first distributed to a customer,
BNT-Denmark knew where CRIDs 40, 1489, and 1490 were first published. BNT-
Denmark also had knowledge that it had disclaimed previous versions, if any, of CRIDs
40, 1489, and 1490 in its copyright applications for the ‘490 Registration and ‘500
Registration, as its attorney at the time, Mary Beth Tung, had requested, in writing, that
all previous versions be excluded from the ‘490 Registration and ‘500 Registration. BNT-
Denmark had knowledge of the facts surrounding the first publication of CRIDs 40, 1489,
and 1490, and knew that CRIDs 40, 1489, and 1490 were first sent for distribution to the
United States government in California shortly after each CRID was complete. By
expressly disclaiming previous versions, BNT-Denmark could not have reasonably
believed that it had previously published versions of CRID 40, 1489, and 1490 in a nation
other than the United States. Thus, BNT-Denmark had knowledge of the facts indicating
that Denmark was an inaccurate nation of first publication for CRIDs 40, 1489, and 1490.

       In the Register of Copyrights’ March 18, 2019 response to the court’s referral of
copyright questions, the Register of Copyrights states that it “would have refused
registration” if it was aware that the application for the ‘490 Registration listed an


                                           83
inaccurate nation of first publication and states that it “would have refused registration” if
it was aware that the application for the ‘500 Registration listed an inaccurate nation of
first publication. Regarding the year of completion for the ‘490 Registration, the Register
of Copyright’s response states:

       Assuming that the work that was the subject of the application for TX 7-836-
       490 was completed in 2012, had the Office been aware at the time the
       application was submitted that the claimed work was completed in 2012
       rather than 2008, the Office would have refused registration for the work if
       the application indicated the work had been completed in 2008.

In the Register of Copyright’s March 18, 2019 response, the Register of Copyrights also
states:

       Assuming that the work that was the subject of the application for TX 7-836-
       500 was completed in 1999, had the Office been aware at the time the
       application was submitted that the claimed work was completed in 1999
       rather than 1998, the Office would have refused registration if the
       application indicated that the work had been completed in 1998.

The Register of Copyrights, therefore, would have refused registration of BNT-Denmark’s
copyright applications for the ‘490 Registration and the ‘500 Registration if the Register
of Copyrights had known that the copyright applications for the ‘490 Registration and the
‘500 Registration contained the inaccurate years of completion discussed above and
inaccurate nations of first publication also discussed above. Thus, BNT-Denmark does
not have valid registrations for purposes of filing copyright infringement claims concerning
the CRIDs BNT-Denmark applied to register under the ‘490 Registration and the ‘500
Registration. See 17 U.S.C. § 411(b)(1); see also SellPoolSuppliesOnline.com LLC v.
Ugly Pools Ariz. Inc., 2018 WL 4565900, at *15 (“Therefore, the Court concludes that,
pursuant to § 411(b)(1), Plaintiff’s certificate of registration is not sufficient to bring a
copyright infringement claim because the registration application includes inaccurate
information, Plaintiff included the inaccurate information ‘with knowledge that it was
inaccurate,’ and ‘the inaccuracy of the information, if known, would have caused the
Register of Copyrights to refuse registration’ with a July 2014 publication date.” (quoting
17 U.S.C. § 411(b)(1))).

        In plaintiffs’ second amended complaint, BNT-Denmark asserts that the
“unauthorized transfer of the original software code, and the updates and improvements
to that code, to ROK and Jordanian armed forces resulted in loss of revenue and profit to
BNT-Denmark.” (internal references omitted). The only two copyright registrations
identified in the second amended complaint are the ‘490 Registration and ‘500
Registration. The ‘490 Registration and ‘500 Registration, however, are invalid for
purposes of filing a copyright infringement claim under 17 U.S.C. § 411(b)(1), as
discussed above. BNT-Denmark, therefore, has not established that the alleged transfers
of software to the Republic of Korea and the Kingdom of Jordan constitute copyright



                                             84
infringement. Thus, Count II in plaintiffs’ second amended complaint is without merit as
to both the allegations involving the Republic of Korea and the Kingdom of Jordan.

Application of 28 U.S.C. § 1498(c)

        Although BNT-Denmark does not possess valid copyright registrations for the
purposes of filing a copyright infringement claim, the court addresses defendant’s
argument involving 28 U.S.C. § 1498(c) (2018). Defendant argues that 28 U.S.C.
§ 1498(c) bars copyright infringement claims arising in a foreign country, and that “[t]he
facts demonstrate that the alleged infringements in South Korea are barred because they
accrued outside the United States.” In a footnote in defendant’s post-trial brief, defendant
states that the “Government acknowledges that under the specific facts of this case,
Section 1498(c) does not bar BNT-Denmark’s claim with respect to the alleged infringing
transfer of 10 laptops to Jordanian personnel.”26 Plaintiffs, however, assert that 28 U.S.C.
§ 1498(c) does not bar plaintiffs’ copyright infringement claims because the software
originally was delivered to the United States government in the United States. According
to plaintiffs’ post-trial brief:

       Even if §1498(c) did apply, the additional steps of copying and distribution
       that took place on a United States military base located in South Korea –
       on the way to delivering the software to South Korean facilities – should
       properly be considered additional acts undertaken within the United States
       under the circumstances of this case.

The statute at 28 U.S.C. § 1498(b) states:

       [W]henever the copyright in any work protected under the copyright laws of
       the United States shall be infringed by the United States, by a corporation
       owned or controlled by the United States, or by a contractor, subcontractor,
       or any person, firm, or corporation acting for the Government and with the

26 Although not explained in the footnote in defendant’s post-trial brief, 28 U.S.C.
§ 1498(c) does not appear to bar BNT-Denmark’s copyright infringement claim involving
the Kingdom of Jordan because, as stipulated by the parties, Paul Moroney loaded CRID
1489 onto ten laptop computers “at a Leidos facility in San Diego, California, configured
the program, and shipped the computers to DTRA for re-shipment to Jordan.” The actions
underlying BNT-Denmark’s alleged copyright infringement claim involving the Kingdom
of Jordan, therefore, occurred within the United States. As discussed below, regarding
the laptop computers transferred to the Republic of Korea, the software was loaded onto
the laptop computers inside of the Republic of Korea, and the actual transfer of the laptop
computers occurred inside of the Republic of Korea. Although 28 U.S.C. § 1498(c) may
not bar plaintiffs’ alleged copyright infringement claim involving the alleged transfer of
CRID 1489 to the Kingdom of Jordan, plaintiffs’ alleged copyright infringement claim
involving the alleged transfer of CRID 1489 to the Kingdom of Jordan, nevertheless, fails
because, as discussed above, plaintiffs’ ‘490 Registration and ‘500 Registration are
invalid under 17 U.S.C. § 411(b).


                                             85
       authorization or consent of the Government, the exclusive action which may
       be brought for such infringement shall be an action by the copyright owner
       against the United States in the Court of Federal Claims for the recovery of
       his reasonable and entire compensation as damages for such
       infringement . . . .

Id. The statute at 28 U.S.C. § 1498(c), however, states that “[t]he provisions of this section
shall not apply to any claim arising in a foreign country.” Id.

       In Leonardo v. United States, a Judge of this court stated:

       It is apparent from the legislative history that section 1498(c) was adopted
       “to remove the possibility of [the bill] being interpreted as applying to acts of
       infringement in foreign countries.” Zoltek Corp. v. United States, 51 Fed. Cl.
       829, 835 (2002) (quoting S. Rep. No. 86-1877, at 7 (1960), reprinted in 1960
       U.S.C.C.A.N. 3444, 3450). In addition, the Acting Director of the USIA
       [United States Information Agency] recommended the adoption of the
       language from section 2680(k)[27] for section 1498(c) because without it the
       proposed legislation was “not by its terms limited to infringements in the
       United States.” Def.’s Mot. at 27 (quoting S. Rep. No. 86-1877, at 11 (1960),
       reprinted in 1960 U.S.C.C.A.N. 3444, 3452). He also brought to the
       attention of Congress the interpretation of the FTCA by the U.S. Supreme
       Court which confirmed its application only to acts occurring in the United
       States. Id.

       The FTCA has been interpreted to apply only to tortious conduct occurring
       in the United States. See United States v. Spelar, 338 U.S. 217, 219, 70 S.
       Ct. 10, 94 L.Ed. 3 (1949); Smith v. United States, 507 U.S. 197, 200-202,
       113 S. Ct. 1178, 122 L.Ed.2d 548 (1993). U.S. courts do not possess
       jurisdiction under the FTCA to hear a claim based on an incident that took
       place at a government facility, even an embassy, abroad. See id. In
       addition, for the purposes of the FTCA, an act “arises” “where the negligent
       act or omission occurs,” Nurse v. United States, 226 F.3d 996, 1003 (9th
       Cir. 2000) (internal citations omitted), not at the place where the act or
       omission had its “operative effect.” Richards v. United States, 369 U.S. 1,
       10, 82 S. Ct. 585, 7 L.Ed.2d 492 (1962).

Leonardo v. United States, 55 Fed. Cl. 344, 354 (2003) (first alteration in original)
(footnote omitted). The Leonardo court determined that the “the act which destroyed
plaintiff’s artwork took place in Brussels, Belgium,” at a location the Leonardo court
considered to be “diplomatic property” and concluded that the Leonardo “plaintiff’s
copyright infringement claim is barred by 28 U.S.C. § 1498(c).” See id.



27 Section 2680(k) states that the Federal Torts Claims Act (FTCA) shall not apply to
“[a]ny claim arising in a foreign country.” See 28 U.S.C. § 2680(k).

                                              86
       In the above-captioned case, there were two separate transfers of laptop
computers, which contained software provided by BNT-US, to Republic of Korea
personnel. The first transfer involved two laptop computers containing images of JWARN
Block 1F Phase 2 C2PC CRID 1414, while the second transfer involved five additional
laptop computers containing images of JWARN Block 1F Phase 2 C2PC CRID 1490.
BNT-US initially delivered CRIDs 1414 and 1490 to the United States government in
California. The parties have stipulated that, “[s]ometime between October 27, 2011 and
March 20, 2012, the Government made one or more copies of JWARN Block 1F Phase
2 C2PC CRID 1414 in San Diego and transferred one or more copies from San Diego to
USFK.” The parties also have stipulated that, “[s]ometime between October 1, 2012 and
the end of January 2013, the Government made one or more copies of JWARN Block 1F
Phase 2 C2PC CRID 1490 in San Diego and transferred one or more copies from San
Diego to USFK.” The copying of CRIDs 1414 and 1490 in the United States and
transferring of copies of CRIDs 1414 and 1490 to the United States Forces Korea appears
to have been an authorized use of CRIDs 1414 and 1490, as the government appears to
have been making copies of software it acquired for use by the United States military and
providing the copies to the United States Forces Korea.

       CRIDs 1414 and 1490 were not copied or imaged onto the seven transferred
laptops until CRIDs 1414 and 1490 were in the Republic of Korea. The parties have
stipulated that government contractor Mark White copied or imaged CRID 1414 onto two
laptop computers and copied or imaged CRID 1490 onto five additional laptop computers
while Mark White “was inside his workplace in a building in South Korea operated and
controlled by the Government.” On March 20, 2012, as discussed above, government
contractors Paul Moroney and Marty Sikes transferred the two laptop computers
containing CRID 1414 to members of the Republic of Korea military, and, subsequently,
Marty Sikes transferred the five additional laptop computers containing CRID 1490 to
members of the Republic of Korea military. The copying or imaging of CRIDs 1414 and
1490 onto the seven laptop computers which were ultimately transferred to the Republic
of Korea, as well as the actual transfer of the seven laptop computers containing images
of CRIDs 1414 and 1490, occurred within the Republic of Korea. BNT-Denmark’s
copyright infringement claims involving CRIDs 1414 and 1490, therefore, arose in a
foreign country, and, consequently, the statute at 28 U.S.C. § 1498(c) bars BNT-
Denmark’s copyright infringement claims involving CRIDs 1414 and 1490. See 28 U.S.C.
§ 1498(c); see also Leonardo v. United States, 55 Fed. Cl. at 354; cf. United States v.
Spelar, 338 U.S. 217, 219 (1949) (stating that an “air base” located in Newfoundland,
which was leased to and operated by the United States, was considered to be a foreign
country under the FTCA).28


28 Additionally, defendant argues that BNT-Denmark’s “copyright infringement claim is
barred by the Government time, material, or facilities proviso” in 28 U.S.C. § 1498(b), and
that, “[t]o the extent that BNT-Denmark seeks recovery for acts of copyright infringement
that allegedly occurred before June 30, 2013, recovery is barred by Section 1498(b)’s
three-year limitation.” The court already has determined that BNT-Denmark’s ‘490 and
‘500 Registrations are invalid for purposes of filing a copyright infringement claim, and
that BNT-Denmark’s copyright infringement claim involving the Republic of Korea is

                                            87
                                      CONCLUSION

        Plaintiffs have failed to support the breach of contract action asserted in Count I of
the second amended complaint or the copyright infringement claims asserted in Count II
of the second amended complaint. The Clerk of the United States Court of Federal Claims
shall enter JUDGMENT in favor of defendant.

       IT IS SO ORDERED.
                                                        s/Marian Blank Horn
                                                        MARIAN BLANK HORN
                                                                 Judge




barred under 28 U.S.C. § 1498(c). The court, therefore, does not address defendant’s
additional arguments in this regard.

                                             88
