             In the United States Court of Federal Claims
                                          No. 15-501C

                                     (Filed: April 18, 2019)
 **********************************          )
 3RD EYE SURVEILLANCE, LLC and               )      Discovery disputes in patent case; prior
 DISCOVERY PATENTS, LLC,                     )      preliminary protective order superseded by
                                             )      claim construction; particularized showing
                       Plaintiffs,           )      not made for discovery of source code;
                                             )      general obligation to respond to proper
        v.                                   )      discovery requests; RCFC 26(b)(1), 33(b),
                                             )      34(b), 36(a)
 UNITED STATES,                              )
                                             )
                       Defendant,            )
                                             )
        and                                  )
                                             )
 ELBIT SYSTEMS OF AMERICA,                   )
 LLC, GENERAL DYNAMICS ONE                   )
 SOURCE LLC, NORTHROP                        )
 GRUMMAN SYSTEMS                             )
 CORPORATION, and VIDSYS, INC.,              )
                                             )
             Defendant-Intervenors.          )
 **********************************
       Steven A. Kennedy, Kennedy Law, P.C., Dallas, Texas, for plaintiffs.
        Lee Perla, Trial Attorney, Commercial Litigation Branch, Civil Division, United States
Department of Justice, Washington, D.C., for defendant. With him on the briefs were Joseph H.
Hunt, Assistant Attorney General, Civil Division, Gary L. Hausken, Director, Commercial
Litigation Branch, Civil Division, and David A. Foley, Jr., Trial Attorney, Commercial
Litigation Branch, United States Department of Justice, Washington, D.C.

       Kurt G. Calia, Covington & Burling LLP, Palo Alto, California, for defendant-intervenor
Elbit Systems of America, LLC.

      Scott Andrew Felder, Wiley Rein, LLP, Washington, D.C., for defendant-intervenor
General Dynamics One Source LLC.

       Gregory H. Lantier, Wilmer Cutler Pickering Hale and Dorr LLP, Washington, D.C., for
defendant-intervenor Northrop Grumman Systems Corporation.

       David Rene Yohannan, Quarles & Brady LLP, Washington, D.C., for defendant-
intervenor Vidsys, Inc.
                                     OPINION AND ORDER

LETTOW, Senior Judge.

        Pending before the court in this patent infringement action are five motions linked by a
fundamental issue underpinning the case: the discovery of defendants’ source code for security
systems the plaintiffs allege infringe on their patents. The matters currently pending for
resolution are (1) Plaintiffs’ . . . Motion for Protective Order (“Pls.’ Mot. for Protective Order”),
ECF No. 256; (2) Plaintiffs’ Comprehensive Brief Addressing Discovery . . . (“Pls.’ Mot. to
Compel”), ECF No. 268; (3) Defendant’s Motion to Compel Interrogatory Response, Compel
Document Production, Determine the Sufficiency of Objections, and Deem Certain Requests for
Admission Admitted (“Def.’s Mot. to Compel”), ECF No. 269; (4) Defendant’s Motion to
Enforce the . . . Protective Order or in the Alternative, Enter a New Protective Order (“Def.’s
Mot. for Protective Order”), ECF No. 274; and (5) Plaintiffs’ Motion for Reconsideration of
Order . . . (“Pls.’ Mot. for Recon.”), ECF No. 278.

        The positions of the parties can be summed succinctly. The plaintiffs want access to the
full source code of various security systems in use at government facilities and claim they cannot
respond to any discovery requests by the defendant until they receive such access. The
defendants, on the other hand, claim that the plaintiffs have not shown a good faith and
particularized basis for discovery of source code. They further represent that they have provided
plaintiffs with over 150,000 documents during discovery. As for their own motion to compel,
the defendants’ argue that the plaintiffs have an affirmative obligation to respond to the
defendants’ discovery requests.

                                             BACKGROUND

        Plaintiffs are the patent holder and the assignee of three patents, Nos. 6,778,085 (the
“’085 patent”), 6,798,344 (the “’344 patent”), and 7,323,980 (the “’980 patent”), each relating to
security systems with attendant imagery capabilities. See 3rd Eye Surveillance, LLC v. United
States, 140 Fed. Cl. 39 (2018) (ruling on challenges to patent eligibility and on claim
construction). Plaintiffs assert that their intellectual property is being infringed by security
systems in use at secured locations owned, operated, or managed by or for the United States. See
Pls.’ First Am. Compl. (“Am. Compl.”) ¶ 9, ECF No. 22.1 Defendant-intervenors are suppliers



       1
         The three patents constitute a closely related patent family. A provisional application
was filed on July 8, 2002 as No. 60/393,942. See ’344 Patent at 1, item (60). The application
was formally filed October 17, 2002 and issued on September 28, 2004. See id. items (22), (45).
The ’085 patent is a continuation in part of the ’344 patent, even though the ’085 patent was
issued first, on August 17, 2004. See ’085 Patent, at 1, items (45), (60), (63). The ’980 patent is
a continuation in part of the ’085 patent and was issued on January 29, 2008. See ’980 Patent at
1, items (45), (63). Each has a similar title. The ’344 patent is styled “Security Alarm System
and Method with Realtime Streaming Video,” ’344 Patent at 1, and the ’085 patent and ’980

                                                  2
of various hardware, software, or information technology (“IT”) services to the federal
government who have been given notice to intervene in this matter as a result of indemnity
clauses in their respective contracts with the United States. See, e.g., Def.’s Unopposed Mot. For
Leave of Ct. to Notice Additional Third Parties at 4 (discussing the justification for issuing
notice to defendant-intervenor General Dynamics One Source pursuant to Rule 14(b) of the
Rules of the United States Court of Federal Claims (“RCFC”)), ECF No. 79.2

        Plaintiffs initially filed suit in this court on May 15, 2015, and submitted an amended
complaint on January 26, 2016, and then again on October 7, 2018. Plaintiffs allege that “[t]he
[g]overnment operates security systems at numerous secured locations, including . . . airports,
[f]ederal [c]ourts, and other government office buildings,” and that these systems infringe
plaintiffs’ patents – the ’085, ’344, and ’980 patents. See Am. Compl. ¶ 12.

        This litigation has seen extensive proceedings in the nearly four years since the plaintiffs
filed their first complaint, culminating in four published opinions to date by the court addressing
various motions made by the parties as the case progressed through preliminary discovery and
towards claim construction, also taking into account six separate applications post-complaint for
inter partes review filed by the United States with the Patent Trial and Appeal Board (“PTAB”).
See Joint Prelim. Status Report at 4 & n.2, ECF No. 51.

        The first contested matter that required the court’s resolution was the government’s
motion for more definite statement, ECF No. 9, filed concurrently with a motion to dismiss for
lack of subject matter jurisdiction, ECF No. 8. See Def.’s Mot. for a More Definite Statement at
1 n.1 (“The government has concurrently, but separately, filed a motion to dismiss for lack of
subject matter jurisdiction.”). In these motions, the United States contended that “[b]ecause the
Complaint fails to identify an accused[ly infringing] surveillance system, a more definite
statement is necessary to provide minimal fair notice in this case.” Id. at 1. In the course of
briefing these related motions, “the government . . . concede[d] that plaintiffs have standing to
bring the present suit,” and the court accordingly denied the government’s motion to dismiss for



patent are both titled “Security System and Method with Realtime Imagery,” ’085 Patent at 1,
’980 Patent at 1.
       2
         The United States sought to notice a number of government contractors who could
potentially be required to indemnify the United States, see ECF Nos. 23, 25, 30, 79, 163, & 183,
and, upon approval by the court, notice was eventually issued to 14 such entities, see ECF Nos.
42-49, 82-85, 165, & 191. Of the various contractors to whom notice issued, ten eventually
joined in this action. See ECF Nos. 54, 57, 64, 67, 70, 78, 94, 97, 100, & 102. Of this group, a
number were thereafter dismissed without prejudice as it became apparent to plaintiffs that
various defendant-intervenors were not infringing, based on available information. See ECF
Nos. 132 (motion to dismiss Diebold, Inc., FLIR Detection, Inc., CACI NSS, Inc., and Leidos,
Inc.), 147 (motion to dismiss Datawatch Systems, Inc.), & 171 (motion to dismiss Tyco
Integrated Security LLC). At present, the remaining defendant-intervenors are, as listed in the
caption of the case, Elbit Systems of America, LLC, General Dynamics One Source, LLC,
Northrop Grumman Systems Corporation, and Vidsys, Inc.

                                                 3
lack of subject matter jurisdiction that had been filed on that ground. See 3rd Eye Surveillance,
LLC v. United States, 124 Fed. Cl. 438, 440-41 (2015). The government’s motion for a more
definite statement, however, was granted “because the complaint does not specifically identify
the accused system ‘[leaving] the government [] to guess what systems allegedly infringe on the
asserted patents.’” Id. at 442. The court directed “plaintiffs to amend their complaint to explain
why they believe that certain government agencies and third-party contractors to the government
have infringed the patents at issue . . . [; specifically,] plaintiffs should submit an amended
complaint that provides the government with the publicly available information upon which they
relied to bring their claims before the court.” Id. at 440.

         After plaintiffs filed their first amended complaint, the United States submitted a suite of
motions to notify various government contractors, who the government asserted, “pursuant to the
patent indemnity clause in each underlying contract . . . may have an interest in the subject
matter of this suit.” E.g., Def.’s Opposed Mot. to Notice Third Parties, at 3, ECF No. 23
(seeking to notice former defendant-intervenors IndigoVision, Ltd. and Datawatch Systems,
Inc.). The court held a hearing on the government’s initial motions on March 24, 2016, and
granted them on April 5, 2016. See 3rd Eye Surveillance, LLC v. United States, 126 Fed. Cl. 266
(2016). As the court noted, the parties primarily disputed whether “the government ha[d]
sufficiently alleged that the third-party entities have an interest in the present action such that
notice . . . is necessary or appropriate.” Id. at 273. In that respect, the court disagreed with
plaintiffs’ assertion that, to sufficiently allege an interest in the present action, the government
must satisfy the standard set forth in Twombly and Iqbal. Id. at 273-75 (addressing Bell Atl.
Corp. v. Twombly, 550 U.S. 544 (2007), and Ashcroft v. Iqbal, 556 U.S. 662 (2009)). The court
granted the government’s motions to notice eight entities that may have an interest in this case,
id. at 277, with notice sent to those eight entities on April 13, 2016, ECF No. 42-49. Thereafter,
the government filed two further motions to notice interested parties, one on July 8, 2016, see
ECF No. 79, to notice four additional interested parties, which the court granted the same day,
see Order of July 8, 2016, ECF No. 80, and a second filed August 23, 2017, ECF No. 163, to
notify one more additional interested party, which the court also granted on the same day, see
Order of Aug. 23, 2017, ECF No. 164.

       Four entities that received notice, Tactical Micro, Inc., Indigo Vision, Ltd., Security
Operations Group International, LLC, and Technical Communities, Inc., did not enter an
appearance and did not assert an interest in this case. Of the remaining ten, six were
subsequently dismissed without prejudice. See generally [First] Order of June 15, 2017, ECF
No. 146 (dismissing Diebold, Inc., FLIR Detection, Inc., CACI NSS, Inc., and Leidos, Inc.);
[Second] Order of June 15, 2017, ECF No. 148 (dismissing Datawatch Systems, Inc.); Order of
Nov. 16, 2017, ECF No. 175 (dismissing Tyco Integrated Security, LLC).

        With the parties identified, the case proceeded apace with preliminary discovery and the
exchange of tentative infringement and invalidity contentions, until plaintiffs filed a motion to
compel the government’s responses to certain requests for production of documents. See Pls.’
Mot. to Compel Gov’t to Produc. Docs. & Overrule Objs., ECF No. 126. The government
resisted producing the documents that plaintiffs sought, arguing that the requests for production
were “vague with respect to time,” disproportionate to the needs of the case, id. at 2-3, and,
specifically as to production of allegedly infringing source code, inappropriate because “source


                                                 4
code should only be produced where the requesting party is able to show that it is actually
relevant to the infringement theories advanced against a particular instrumentality,” id. attach 3,
at 3. Plaintiffs further sought source code employed in United States embassies, but asserted no
claims in the complaint as to those installations. Id. Attach. 3, at 4. In addition, Grumman
specifically declined to produce certain documents “that it [wa]s prohibited from producing due
to federal government restrictions.” Id. at 7. All of these contentions save the first – the time
period for which plaintiffs could assert claims to damages for infringement – were addressed in
an order issued June 16, 2017. See Order of June 16, 2017, 2017 WL 2609233, ECF No. 149.

        After the parties’ briefing and the resolution of most of the issues raised in plaintiffs’
motion, the court, in the third major milestone in this strongly-contested litigation, issued an
opinion and order resolving the parties’ contentions as to the time period for which the United
States was required to produce documents potentially relevant to plaintiffs’ claims. See 3rd Eye
Surveillance, LLC v. United States, 133 Fed. Cl. 273 (2017). The court, at a hearing held on
June 14, 2017, had requested supplemental briefing “regarding whether systems installed prior to
February 12, 2013[,] are within the scope of potentially infringing systems, to assess whether the
government should be compelled to produce documents regarding such systems.” Id. at 275 &
n.1. Following the completion of briefing, the court concluded that “the assignment of the ’085,
’344, and ’980 patents to Discovery Patents d[id] not fall within a recognized exception to the
Assignment of Claims Act, but rather fit[] squarely within the ambit of claim assignments that
Congress sought to bar.” Id. at 277. Accordingly, the court concluded that “any systems first
procured or used by the government prior to February 12, 2013[,] are not within the scope of
potentially infringing systems in this case . . . unless such systems were modified or upgraded to
become infringing after that date.” Id. at 278.

       While the notice and discovery disputes were underway in this court, the United States
was advancing petitions for inter partes review before the PTAB. See Joint Prelim. Status
Report at 3-4 & n.2. The United States filed six petitions for inter partes review, in which it
sought “a ruling of invalidity for every claim in each of the three patents-in-suit.” Id. at 4.3 The
PTAB declined to institute inter partes review proceedings on five of the applications, see
Department of Justice v. Discovery Patents, LLC, IPR2016-01035, Paper No. 11 (P.T.A.B. Nov.
15, 2016); Department of Justice v. Discovery Patents, LLC, IPR2016-01037, Paper No. 11
(P.T.A.B. Nov. 15, 2016); Department of Justice v. Discovery Patents, LLC, IPR2016-01038,
Paper No. 10 (P.T.A.B. Nov. 15, 2016); Department of Justice v. Discovery Patents, LLC,
IPR2016-01039, Paper No. 10 (P.T.A.B. Nov. 15, 2016); Department of Justice v. Discovery
Patents, LLC, IPR2016-01040, Paper No. 10 (P.T.A.B. Nov. 15, 2016), but instituted



       3
         The inter partes review petitions were: IPR2016-01035 (seeking to invalidate claims 1-
16 of the ’344 patent); IPR2016-01037 (seeking to invalidate claims 1-6 and 56 of the ’085
patent), IPR2016-01038 (seeking to invalidate claims 7-37 of the ’085 patent); IPR2016-01039
(seeking to invalidate claims 38-55 of the ’085 patent); IPR 2016-01040 (seeking to invalidate
claims 1-10 of the ’980 patent); and IPR2016-01041 (seeking to invalidate claims 11-31 of the
’980 patent). See Joint Prelim. Status Report at 4 & n.2. All of the petitions by the United States
were filed on May 13, 2016.


                                                 5
proceedings on the sixth application, eventually finding claims 11-12, 14, 16-18, and 20-31 of
the ’980 patent were “unpatentable over the cited prior art,” see Department of Justice v.
Discovery Patents, LLC, No. IPR2016-01041, Paper No. 29, 2017 WL 5446312, at *8, 15
(P.T.A.B. Nov. 9, 2017). Plaintiffs did not appeal. See Notice of IPR Decision at 2, ECF No.
103.4

        After the resolution of the notices to interested third parties, the parties’ discovery
disputes, and the United States’ petitions for inter partes review, the parties submitted a joint
claim construction statement, ECF No. 193, and opening briefs and responses regarding claim
construction. In their briefing, the parties advanced their preferred definitions of certain relevant,
disputed claim terms found in one or more of the three patents at issue. Concurrently, defendant-
intervenor Grumman, joined by the United States and all other defendant-intervenors, moved for
judgment on the pleadings on the grounds that “[t]he asserted claims are directed to[ ]
unpatentable abstract idea[s] and do not contain an[y] inventive concept[s].” Def.-Intervenors’
Mot. at 1. Plaintiffs then moved for leave to file a Second Amended Complaint. See generally
Pls.’ Rule 15(a)(2) Mot. for Leave to Amend Compl., ECF No. 205.

       On September 25, 2018, in the fourth milestone decision of this case, the court issued an
opinion and order construing thirteen terms across the three patents at issue, denying defendant-
intervenor Grumman’s motion for judgment on the pleadings, and permitting the plaintiffs to
amend their complaint. See 3rd Eye Surveillance, 140 Fed. Cl. 39. The resulting amended
complaint, plaintiffs’ second amended complaint of October 7, 2018, is currently the operative
version.

       After the court’s opinion in September 2018, discovery should have proceeded without
any other significant delays. Unfortunately, this did not happen. Discovery disputes arose and
multiplied in the following months, with ten (often duplicative) motions outstanding at one point.
To help resolve the outstanding issues, the court held a hearing on March 11, 2019. See Hr’g Tr.
(Mar. 11, 2019). Shortly after the hearing, the court summarily dismissed five of the outstanding
motions, mostly as moot due to subsequent filings, and deferred a sixth. See Order of Mar. 21,
2019, ECF No. 281.5 Now, the court is charged with the task of ruling on the remaining five




       4
        The propriety of the United States’ invocation of inter partes review is pending before
the Supreme Court in Return Mail, Inc. v. United States Postal Serv., 868 F. 3d 1350 (Fed. Cir.
2017), cert. granted, 139 S. Ct. 1237 (Oct. 26, 2018) (No. 17-1594) (limited to question 1)
(argued Feb. 19, 2019).
       5
         The order denied as moot plaintiffs’ Motion for Discovery Scheduling Order, ECF No.
253; denied without prejudice Elbit’s Motion for a Protective Order, ECF No. 254; denied as
moot Defendants’ Cross-Motion for Discovery Scheduling Order, ECF No. 255; denied as moot
plaintiffs’ Motion for Extension of Time, ECF No. 256; deferred ruling on plaintiffs’ Motion for
a Protective Order, ECF No. 256; and denied defendants’ First Motion to Compel Various
Discovery, ECF No. 258.

                                                  6
motions.6 In doing so, the court must answer a question that has shadowed this litigation from
the very beginning: whether, with the information before the court at this juncture, the plaintiffs
may have access to the source code for systems they allege infringe upon their patents.

                                     STANDARD FOR DECISION

        “Questions of the scope and conduct of discovery are, of course, committed to the
discretion of the trial court.” Florsheim Shoe Co. v. United States, 744 F.2d 787, 797 (Fed. Cir.
1984). Accordingly, resolution of a motion to compel discovery is committed to that discretion.
Heat & Control, Inc. v. Hester Indus., Inc., 785 F.2d 1017, 1022 (Fed. Cir. 1986). When
deciding motions to compel, the “court must balance potentially conflicting goals,” Petro-Hunt,
L.L.C. v. United States, 114 Fed. Cl. 143, 144 (2013), with the understanding that “[m]utual
knowledge of all relevant facts gathered by both parties is essential to proper litigation,”
Hickman v. Taylor, 329 U.S. 495, 507 (1947).

                                           ANALYSIS

                         A. The Government’s Motion for Protective Order

        The broadest issue before the court stems from the government’s motion for a protective
order. See Def.’s Mot. for Protective Order. In this motion, the government asks the court to
enforce a protective order issued on August 17, 2017, see Order of Aug. 2017, ECF No. 162,
which cabined early, preliminary discovery to certain bellwether security systems that the
plaintiffs selected, see Def.’s Mot. for Protective Order at 7. Alternatively, the government also
asks the court to enter a new protective order of the same scope, i.e., a renewed version of the
court’s earlier protective order. Id. at 7-10.

        This litigation was in its infancy at the time the court entered a protective order on
August 17, 2017. That order was directed at preliminary discovery in aid of resolving disputes
over over claim construction, identification of appropriate intervening defendants, amendments
to the complaint, and motions for a judgment on the pleadings. Indeed, fact discovery on those
aspects of the case was completed on October 30, 2017. Now, however, the parties are (or at
least should be) in discovery that addresses all outstanding issues. And although discovery is
subject to “‘ultimate and necessary boundaries,’” “discovery rules ‘are to be accorded a broad
and liberal treatment.’” DNC Parks & Resorts at Yosemite, Inc. v. United States, 137 Fed. Cl.
709-10 (2018) (quoting Hickman, 329 U.S. at 507); see also Micro Motion, Inc. v. Kane Steel
Co., 894 F.2d 1318, 1322 (Fed. Cir. 1990) (“[T]he Federal Rules . . . unquestionably allow broad
discovery.”). Although Rule 26(c) permits parties to seek protective orders respecting
information that is “outside the scope permitted by RCFC 26(b)(1),” DNC Parks, 137 Fed. Cl. at
710 (citing RCFC 26(b)(2)(C)(iii)), any protective order must be “appropriately tailored,” id.
(citing RCFC 26(c)). In this instance, limiting the scope of discovery in this case to that allowed
by the order of August 17, 2017, would be counter to Rule 26(c) and to the spirit of discovery in



       As the court deferred ruling on the plaintiffs’ motion for protective order in its ruling on
       6

March 21, 2019, it will be addressed in this opinion.

                                                 7
general. See, e.g., O2 Micro Int’l Ltd. v. Monolithic Power Sys., Inc., 467 F.3d 1355, 1365 (Fed.
Cir. 2006) (“[The] discovery regime under the Federal Rules of Civil Procedure [is broad],
especially given the particular importance of discovery in complex patent cases.”) (citations
omitted). The protective order entered in 2017 was “appropriately tailored” to the specific
preliminary procedural posture that existed at that time but is now out of date.

          Accordingly, the government’s motion for protective order is DENIED. The government
is still entitled, of course, to move for a more “appropriately tailored” protective order reflecting
the current procedural posture of this litigation. It may also object to certain requests by the
plaintiffs that it views as overbroad or otherwise not in accord with Rule 26.

                                      B. Discovery of Source Code

        The salient matter before the court is one that has bedeviled this litigation from the very
beginning: the discovery of source code. Three of the remaining motions find their roots in this
contentious area,7 and the court now holds that the plaintiffs have not demonstrated a
particularized and good faith showing to compel the discovery of source code. Relatedly, the
court also holds that the plaintiffs are not, and cannot be, immunized from the defendant’s
discovery requests in the absence of access to source code and must respond to the various
interrogatories and other document production requests filed by the defendants.

         The plaintiffs claim they require the source code underpinning the multitude of the
government’s security systems that rely on real-time video, imagery, or information, and that
automatically and contemporaneously alert responders about emerging issues. They particularly
emphasize that their expert, Mr. Joseph McAlexander, “cannot form opinions concerning
[potential] infringement,” without such access. Pls.’ Reply Addressing Open Issues . . . (“Pls.’
Reply”), ECF No. 273. Much of their argument relies on the fact that “[p]laintiffs have proffered
the testimony of a qualified expert, Joseph McAlexander,” id. at 5, and that the defendants have
“offer[ed] nothing to contradict [this] testimony,” id. In the view of the plaintiffs, then,
“physical inspection and source code discovery is required.” Id. at 14.

       Concurrently, plaintiffs request that the court either extend their time to respond to the
government’s various discovery requests or enter a protective order preventing government
discovery “until [p]laintiffs can have access to the [allegedly] infringing computer systems and
source code.” Pls.’ Mot. for Protective Order at 7. In short, plaintiffs assert that the discovery of
source code is a threshold issue and that no other discovery should (or could) occur until they
receive access. See id.; see also generally Pls.’ Reply.

         The government, joined by the defendant-intervenors, counters that “ample ground exists
for exercising caution before [p]laintiffs are entitled to source code discovery.” See Defs.’ Resp.
to Pls.’ Consol. Br. (“Defs.’ Resp.”), ECF No. 271, at 2. Specifically, they argue that the
“[p]laintiffs have never shown any need for source code discovery.” Id. And “[i]t is well-settled
that filing a patent infringement action does not per se entitle a plaintiff to see the defendant’s


       7
           (1) Pls.’ Mot. for Protective Order; (2) Pls.’ Mot. to Compel; (3) Def.’s Mot. to Compel.

                                                   8
source code. Rather, the plaintiffs must ‘make a showing of need and relevance’ before taking
any source code discovery.” Id. (quoting Drone Techs., Inc. v. Parrot S.A., 838 F.3d 1283, 1300
(Fed. Cir. 2016)) (emphasis in source). They further claim the plaintiffs “made no effort to
identify any specific systems that might be infringing. Nor do they cite any evidence to support
their contentions.” Id. at 4-5 (internal citation omitted). Defendants also point to the sparse
infringement contentions made by the plaintiffs. Id.

        As further support for of their motion to compel, the defendants argue that their discovery
requests “sought to reduce the amount and scope of testimony that would be required at trial,”
and all “were directed at information known to [p]laintiffs or matters that, with minimal inquiry,
were reasonably available to [p]laintiffs.” Def.’s Mot. to Compel at 1. They also note that
“[p]laintiffs invited the United States to propound most of the requests” and are now “object[ing]
to answering the very same discovery that they invited.” Id.

        The defendants’ position can be summed crisply: plaintiffs have failed to show a good
faith and particular basis to require source code discovery, nor does sufficient basis exist to allow
the plaintiffs to avoid their discovery obligations under Rule 26.

        “[D]iscovery rules are designed to assist a party to prove a claim it reasonably believes to
be viable without discovery, not to find out if it has any basis for a claim.” Hitkansut LLC v.
United States, 119 Fed. Cl. 40, 47 (2014) (quoting Micro Motion, 894 F.2d at 1327) (emphasis in
original). “That [] discovery might uncover evidence showing that a plaintiff has a legitimate
claim does not justify the discovery request.” Micro Motion, 894 F.2d at 1327 (emphasis added).

        Although plaintiffs claim the declaration of Mr. McAlexander is sufficient evidence of
their need for source code discovery, it is not. Mr. McAlexander did not state that he believes
specific systems are infringing and that he needs access to source code to prove what he already
reasonably believes is a viable an infringement claim. Pls.’ Mot. to Compel Ex. 1 ¶ 4
(McAlexander Decl.) (“At this time, I have not formed any opinion on the issue concerning
whether any party is infringing the claims of the patents.”). On the contrary, Mr. McAlexander
instead stated that he “can best form verifiable opinions concerning infringement . . . by being
permitted the opportunity to inspect the . . . source code.” Id.¶ 5 (emphasis added).

       Notably, and perhaps most importantly, the patents themselves do not address source
code in express terms. Rather, the claims are written in terms of functionality, relying on
computer technology and internet communications. See, e.g., 3rd Eye Surveillance, 140 Fed. Cl.
at 55-57, 59-60 (construing “security system central station” and “security system central
monitoring station”), 70-71 (construing “wherein the additional information is automatically
generated by the computer system,” “analyzing the biometric information,” and “analyze the
biometric information.”). Examining source code is not the only means to determining
functionality, and to that end, plaintiffs should employ these other means before demanding
source code.

       In this respect, at this point, the plaintiffs have considerable factual materials in hand
regarding the government’s security systems. They may desire and ultimately need more
information, but the government and the defendant-intervenors have produced “approximately


                                                 9
150,000 pages of documents” relating to the security systems at issue. Pls.’ Mot. to Compel at
12; see also Defs.’ Resp. at 5. Mr. McAlexander even states in his declaration that he “expect[s]
to receive and examine production documentation relevant to [the] various surveillance systems”
at issue to form an opinion on potential infringement. Pls.’ Mot. to Compel Ex. 1 ¶ 5. And, as
the government notes in its brief, the plaintiffs did not “disclose[] []even one page” of the
150,000 in support of their request for source code. Defs.’ Resp. at 5.

        Plaintiffs claim that “proving infringement will require more than depositions of
witnesses who have a financial stake in the outcome and more than just the production of []
documents.” Pls. Mot. to Compel at 24. That very well may be true. But depositions of
witnesses and the production of documents may well allow the plaintiffs to hone their allegations
to specific security systems or locations, rather than requesting “all source code operating
[within] the government’s security systems.” Pls.’ Reply at 15. At that point, perhaps the
plaintiffs could show a particularized and good faith basis for the source code discovery that they
seek.

        The plaintiffs also fundamentally misconstrue the holding of Baron Services., Inc. v.
Media Weather Innovations LLC, 717 F.3d 907 (Fed. Cir. 2013). Far from “confirm[ing] that
[p]laintiffs are entitled to source code discovery based on uncontroverted testimony from an
expert,” Pls. Reply at 6, the Federal Circuit’s decision in Baron Service instead found that a
“district court [had] prematurely granted summary judgment of noninfringement,” id. at 914.
This case, however, is far from the summary judgment stage. Nor is the court affirmatively
stating that the plaintiffs could never be entitled to source code discovery. Rather, the court
holds that at the present time and with the present facts, the plaintiffs have not shown with
enough particularity that they are entitled to source code discovery.

         It may be that the plaintiffs are asking the court to tie the defendants’ hands, with the goal
of forcing them into a vulnerable position from which they must either “[c]omply or settle.”
Pls.’ Mot. to Compel at 21. Not only is this fundamentally unfair and against the spirit of
discovery, see, e.g., O2 Micro, 467 F.3d at 1366, it could also add significant time and cost to
this litigation, as plaintiffs’ request for source code, if granted, would effectively pause the
proceedings. Alternatively, plaintiffs’ request could be construed as a fishing expedition,
enabling them to search through the entirety of the source code to find instances they believe
infringe upon their patents, which would be precisely the kind exercise the court held to be
invalid in Hitkansut. See, e.g., Hitkansut, 119 Fed. Cl. at 47.

        Accordingly, the plaintiffs’ motions to compel source code discovery and for a protective
order are DENIED. The plaintiffs have not demonstrated with any specificity that they require
access to defendants’ source code. Plaintiffs have not properly explained why existing
discovery, such as manuals, technical documents, and other non-source code information, is
insufficient for them to establish infringement of particular systems.8


       8
         This is not to say plaintiffs are without options. For example, the plaintiffs could still
ask the defendants about surveillance systems that have online capabilities and a central station
that handles real time video, imagery, and data, and that contemporaneously and automatically

                                                  10
                                  C. Discovery of Classified Systems

        The court finds that plaintiffs have no basis for discovery of classified systems, as of
now. See Hitkansut, 119 Fed. Cl. at 49-50. The security systems potentially at issue deal with
some of the most sensitive locations to national security. Classified systems are mentioned in the
parties’ briefing and argument, see, e.g., Def.’s Mot. for Protective Order at 4, Hr’g Tr. 7:12-24
(Mar. 11, 2019), but the associated issues have not been fleshed out, Hr’g Tr. 11:17 to 12:1 (Mar.
11, 2019). Although it has yet to be formally raised by the government, the court suggests that
the classified designation, or the state-secrets privilege, would be compelling if invoked. See id.
(citing Crater Corp. v. Lucent Techs., Inc., 423 F.3d 1260, 1265 (Fed. Cir. 2005), and Al-Aulaqi
v. Obama, 727 F. Supp. 2d 1, 53 (D.D.C. 2010)).

                                  D. Defendants’ Motion to Compel

        Contrastingly, the defendants seek to compel the plaintiffs to participate in the discovery
process. See Def.’s Mot. to Compel. at 7 (“[Plaintiffs’] refusal to answer any discovery request
until they receive software and source code violates both the letter and spirit of th[e] [c]ourt’s
[r]ules.”). In support, the defendant cites to Rules 26, 33, 34, and 36, stating “[p]laintiffs have an
affirmative obligation to disclose the requested information and documents as well as make the
requested admissions.” Id. at 8 (citing RCFC 26(b)(1), 33(b), 34(b), 36(a)). Plaintiffs oppose
the defendant’s motion, contending that “[u]ntil [p]laintiffs can have full discovery of all
government operating systems, including those implemented by the contractors, [p]laintiffs are
not in a position to form meaningful contentions in this matter or respond to contention
discovery.” Pls.’ Mot. for Protective Order at 6. Plaintiffs’ rationale for opposing the motion to
compel largely echos the reasoning behind their motion for a protective order.

       The court can discern no just reason to deny the defendant’s motion to compel discovery.
As discussed previously, discovery is a two-way street designed to facilitate the flow of
information, and the plaintiffs cannot use their own inability to pinpoint specific systems to
stymie that process. Denying the defendant’s motion to compel would add only further delay
(and cost) to this already protracted litigation.

        The court recognizes the duality of its opinion, i.e., granting the defendant’s motion to
compel while denying the plaintiffs’ motion. But the two motions are factually distinct. The
plaintiffs cast a wide net in their attempt to uncover evidence of infringement (or force
settlement). In contrast, the defendant seeks to identify the source of disagreement through
targeted interrogatories and other requests designed to pinpoint potentially infringing systems.
Rather than broadening the scope of this litigation, the defendant seeks to narrow it to the areas
of actual dispute.




transmits information to responders, i.e., the types of systems plaintiffs claim infringe upon their
patents. Plaintiffs could also ask about any systems that are not operated in this fashion but have
the capability of doing so, either as they stand or with minor tweaks.

                                                 11
        As with their own motion, the plaintiffs are not without options. They still have the right
to object to overbroad interrogatories or other discovery requests made by the defendants. But
the plaintiffs cannot refuse to respond to any and all discovery by the government and defendant-
intervenors solely on the grounds they require source code. It is up to the plaintiffs, not the
government, to identify the specific systems they believe are being infringed.

                                        CONCLUSION

        For the reasons stated, defendant’s motion to enforce the protective order entered August
17, 2017, or issue a new protective order, is DENIED. Plaintiffs’ motion to compel discovery as
to source code is DENIED. Plaintiffs’ motion for an extension of time to respond to discovery
and for a protective order is DENIED.9 Defendant’s motion to compel interrogatory responses
and document production is GRANTED, but the attendant motions to determine the sufficiency
of objections and to deem as admitted certain requests for admission are DENIED.

       On or before June 21, 2019, the parties are invited to propose a new schedule for
discovery and other preparatory proceedings, taking into account this ruling.
       It is so ORDERED.


                                                  s/ Charles F. Lettow
                                                  Charles F. Lettow
                                                  Senior Judge




     Plaintiffs’ motion for reconsideration of the court’s order of March 11, 2019, is also
       9

DENIED.


                                                12
