Showing posts with label Sugihara. Show all posts
Showing posts with label Sugihara. Show all posts

Domestic Terrorism: Shooting out a PG&E Transformer

By PETE BENNETT - Contra Costa Watch  


Aug 2013 - Walnut Creek CA - Last year someone shot out a PG&E high voltage transformer which I believe was a KVA High Voltage Line that travels through many towns and cities.  Details are sketchy but glancing past articles it seem in-congruent in a modern society that a KVA Transformer would be used for target practice.

For many years I've been following news articles about PG&E, AT&T and other utilities that support our infrastructure.  Although they deliver services for millions daily in many ways that's our Achilles heal as a well timed attack could be a market disruption tool - subtly planned, tactically executed but more important potentially overlooked by those responsible as day to day activities often overwhelm or overtake many tasks.  It happens everyday at your business, your school, homework or job where so much information flows at you can't respond.

That information flow is the domestic terrorists advantage as these mysterious persons often carrying multiple agendas can strike at the weaker links.  Now to some knocking out a transformer array might sound like a drunken Cowboy out on the range but from my perspective is these events are little tests that lead up to a larger coordinated attack on our infrastructure which is why you get cable, the weather and the news plus where some live their lives out watching sports from the stadium or the arm chair.

Having personally seen PG&E documents on the San Bruno fire as a software contractor I could see endless weaknesses in their planning as well as thinking.  Old timers now retired pointed out something about the San Bruno fire that I found interesting and as an arson victim myself I now seek patterns to tie together.

There is a pattern but it's not limited to PG&E but potentially is linked to larger looming event.  My focus is the Bay Area but it's easy to see other incidents nationally are potentially interconnected.

As I use my decryption skills to analyze publicly known infrastructure points I'll paint an argument that we live in a different world where our centuries of world domination might become the foundation of domestic terrorism.

In the end you might wonder who's guarding our infrastructure and perhaps reallocating TSA nail-clipper chasers to walk the wires, pipelines, and sewers seeking intimate details no matter how smelly the task the sewer crawl could be one could easily dump a tanker trunk uphill from downtown San Francisco with the intent of creating a sensational fire.  One of the suspects I've encountered was once a member of the San Francisco Police Department and I personally consider him an arsonist.

In my other articles I'll point out the glaring connections to my July 2011 car accident and preceding arrest (Arrest Explained) where I strongly suspect that Hillside Covenant Churches Youth Director breached my laptop with sensitive data and that his relationships with the Doyle Family leads to the Former Head of the Walnut Creek Bomb Squad whose roommate Lisa was my roommate (Greg Santilli) girlfriend who all have ties to the CNET.

The easy question is why are all these people near me in the first place?


.
Share:

The H1b Visa and the CHP Officer Youngstrom Fatal Shooting


By petecbennett@outlook.com PETE BENNETT
Posted July 31st 2013

======================================================================

This page and others will detail my position on how the H1b visa resulted in the shooting death of Officer Kenyon Youngstrom.  I was once afforded the pleasure of meeting him at the Walnut Creek Starbucks at in early 2012 when he and his partner sat down next to me more than once.  We had a chance to talk just once when they took the table next to me.

During that brief meeting we casually chatted about life and Youngstrom was rather funny, very likable and was down to earth.  What they did not know was my research on Contra Costa County events which has become the framework of this blog.  There were three separate visits where we crossed paths but my personal situation because this former well paid american programmer was homeless and living his Ford Explorer that was towed away days after another tragedy, the Anthony Banta Jr. shooting.

Most programmers when reading this article by Matthias Gafni might ponder why he was traveling between jobs daily.  Programmers interview a few times, get hired, go to work where they often spend weeks reading code, documentation and have meetings about objectives before touching the code.

The quote from Mindsource was he was a fantastic programmer is flawed as it reeks that Lacey was another Fake Interview Victim.  I know as I've been contacted by Mindsource but also don't believe a word from their recruiters.  I've also got Chris Lacey's linked-in profile and from my experience can see his is skills appear solid and I would be the papers in his backpack were bills or the letter from Mindsource woudl he burned his precious cash driving from Corning CA to San Jose CA.

Please take a moment to read my comments on being stalked in Walnut Creek CA where I was followed near relentlessly for two years.  In one of those events the stalkers took pictures of Youngstrom but I reported the stalking to Walnut Creek Police but read this posting about how they handle attempted murders which is why I stood up in front of the city council which is probably why

The hidden message here: They found Lacey from the internet but they state they have a rich source professionals.

"We found him on a job board through a mailing list," Meza said of Lacy's hiring. "It's just very strange. This can happen to anybody."

Additionally when you read their self-fulfilling comments about how they source it's obvious to me that Mindsource was seeking someone to interview for an H1B Visa re-certification interview.   Please read the The H1B Fake Interview  to learn more about this process.  The H1b visa constitutes about 3 million positions taken by foreign tech workers at a 20% discount or better.

Christopher Lacy started software job 7 days before CHP shooting

By Matthias Gafni
Contra Costa Times
POSTED:   09/12/2012 10:20:37 AM PDT | UPDATED:   11 MONTHS AGO

This undated photo released by the California Highway Patrol shows Officer Kenyon Youngstrom....


Add caption
MOUNTAIN VIEW -- Christopher Lacy, just days into his new job as a senior software engineer, was on his way to a Sunnyvale client on Sept. 4, the day he shot and killed a California Highway Patrol officer without warning, investigators and a company official said Wednesday.
The 36-year-old programmer had long worked remotely for various Silicon Valley companies but was hired at Mountain View-based Mindsource Inc. a week and two days before the shooting, said Gabriel Meza, Mindsource's vice president of human resources. As a senior software engineer, Lacy was tasked with the development of Java, a computer programming language.
"In the seven days he worked for us, the only feedback was he was doing an amazing job," Meza said. "He was top level. Very senior."

The new job required that Lacy visit various Silicon Valley clients at their sites to provide consulting, Meza said, meaning Lacy would have to either commute 430 miles round-trip from his home to isolated and rural Rancho Tehama, outside of Corning, or stay somewhere in the Bay Area during the week. Neighbors said Lacy moved north a year ago because he despised the hustle and bustle of the Bay Area.

On Sept. 4, Lacy was scheduled to provide consulting for Hewlett-Packard at their Sunnyvale office, Meza said. After a likely four-hour drive from his trailer in Rancho Tehama, Lacy was pulled over on Interstate 680 in Alamo for having an obstructed license plate. After a 10-second interaction with CHP officer Kenyon Youngstrom, Lacy shot him without warning. A second officer then shot Lacy to death. Youngstrom died the following evening.

His neighbor speculated that Lacy had been spending his weekdays in the Bay Area because his Jeep Wrangler was gone the week before the shooting.

"He told me he didn't ever want to go back down there," neighbor Jim Bowron said. "But you have to go where the money is, and Silicon Valley just happens to be that."

An email from a Mindsource recruiter was found in his Jeep by investigators, according to a search warrant filed in Contra Costa Superior Court this week. "We found him on a job board through a mailing list," Meza said of Lacy's hiring. "It's just very strange. This can happen to anybody."
Detectives seized a handgun safety certificate, ammunition, a gun-carrying case, three shooting targets and large amount of computer equipment, among other items, from his Tehama County trailer, according to court documents.
While searching the Jeep, investigators also found "a backpack containing (mail) belonging to Lacy, pistol ammunition, four loaded pistol magazines, a knit cap and a pistol shoulder holster," according to the warrant.
Youngstrom, 37, of Cordelia -- who donated his organs, saving the lives of four people -- will have a memorial service Thursday morning at a Vacaville church.
Contact Matthias Gafni at 925-952-5026. Follow him at Twitter.com/mgafni.

Share:

Walnut Creek Homeless Trinity Center is Biased

By PETE BENNETT - Contra Costa Watch EMAIL
Phone: 510-460-5641
Posted: 06/13/2013

======================================================================

Earlier this year I found myself without gear, food or transportation.  In December the Walnut Creek Police towed my truck off and my gear including my amps and guitars.  That was my basic home where I parked behind my friends house.  

That same week officers killed a person I personally knew and should have never been shot but worse is the last fatal shooting is related to Supervisor Glover who has another cousin shot and killed by Pittsburg Police.  

I know residents and businesses of Walnut Creek who donate food to Trinity think their donations are going to the greater good but many that need these services are being refused, they take food from Loaves and Fishes which is part of the Contra Costa Food Bank, they all receive donations and federal funds to run their operations but have been known to cut homeless and need out.  Trust me I know as they did this to me.  They simply don't like me making noise about how some local homeless that talk to me.  It's not just about Nordstroms or Nieman Marcus or Tiffany's it's about equity.  You need a lesson just ask a few past Presidents. 

In 2011 when my world fell apart I returned to Fresh Start (now Trinity) as a client not as helper.  I've donated food, clothing and even gave Loaves and Fishes restaurant equipment way back in the 80s.  

Today I can't get services because I've been banned as a trouble maker.  They are not too happy with what I've found that's being covered up in Walnut Creek and surrounding areas.  

Over in front of Traders Joes the homeless are being hit by cars and nearly killed, we have persons found floating the creek, we have homeless being hit by cars all around the county. 

When I wrote this article I'd spent months asking questions about these accidents near Traders Joes Walnut Creek CA as I was really taken aback learning about g
Homeless Targets 


It seems that the only place in town is a club but my complaints about Hillside Covenant Church are well know which is why I stood up at Walnut Creek Council Meeting.  

Watch me speak about my desperate situation coupled with the numerous incidents clearly point to I'm being targeted and that others based on their situation end up with the same deal or dead or so severely injured they end up in long term care with permanent brain damage which is why I wrote this article.  

City Council Meeting



Share:

Foray Technologies

By PETE BENNETT - Contra Costa Watch EMAIL
Phone: 510-460-5641
Posted: 06/13/2013

Reposted to Protect My Sons as in 2004 my truck was an arson target, my truck was ablaze on 680, my truck later targeted by hit and run driver, my Ford Explorer rigged ABS system to flip me while driving north, in 2011 returning from a week of working in Modesto for PG&E someone followed me for 50 miles then tried to flip me, and on July 20th 2011 they blinded me then pushed me into oncoming traffic.  


And I know quite a few of this victim list and that is one too many.   

Related: Arson / Arson
======================================================================




KWAN SOFTWARE ENGINEERING, INC., Plaintiff, v. FORAY
TECHNOLOGIES, LLC, Defendant.
No. C 12-03762 SI
UNITED STATES DISTRICT COURT FOR THE NORTHERN DISTRICT OF
CALIFORNIA
2013 U.S. Dist. LEXIS 14708
January 22, 2013, Decided
January 22, 2013, Filed
PRIOR HISTORY: Kwan Software Eng'g, Inc. v. Foray
Techs., LLC, 2012 U.S. Dist. LEXIS 157194 (N.D. Cal.,
Nov. 1, 2012)
CORE TERMS: software, digital, workflow,
authenticity, authentication, customer, authenticate,
guidelines, literally, hash, falsity, Lanham Act, user,
preliminary injunction, false advertising, injunction,
consumer, algorithm, video, irreparable harm, message,
authenticated, literal, purports, false statements,
advertisement, technology, authenticating, acquisition,
distance
COUNSEL: [*1] For Kwan Software Engineering, Inc.,
a California corporation, doing business as Veripic, Inc.,
Plaintiff: Dhaivat H. Shah, LEAD ATTORNEY, David
Ira Tobias Siegel, GRELLAS SHAH LLP, Cupertino,
CA; George Grellas, George Grellas & Associates,
Cupertino, CA.
For Foray Technologies, LLC, Delaware Limited
Liability Company, Defendant: Chip Cox, James Steven
Greenan, Greenan, Peffer, Sallander & Lally, LLP, San
Ramon, CA.
JUDGES: SUSAN ILLSTON, United States District
Judge.
OPINION BY: SUSAN ILLSTON
OPINION
ORDER DENYING PLAINTIFF'S MOTION FOR A
PRELIMINARY INJUNCTION; DENYING
MOTIONS FOR LEAVE TO FILE
SUPPLEMENTAL EVIDENCE
Plaintiff Kwan Software Engineering, Inc., d/b/a
Veripic, Inc. ("Veripic") has moved to enjoin defendant
Foray Technologies LLC ("Foray") from making certain
public representations that allegedly constitute false
advertising under § 43(a) of the Lanham Act and under
California law. Foray has filed an opposition, and Veripic
has replied. The Court held a hearing on the motion on
December 17, 2012. Having considered the parties'
arguments, the Court hereby DENIES plaintiff's motion
for a preliminary injunction, for the reasons discussed
below.
BACKGROUND
Veripic is a California corporation that provides [*2]
software for handling digital evidence to police and fire
departments, as well as to other entities that need to store
and retrieve photos, video, and audio files. First
Amended Complaint ("FAC") ¶ 1, 7, 9. Veripic and
Foray are direct competitors in the digital
evidence-related software market, which mainly consists
Page 1of law enforcement agencies. Id. ¶ 9.
Veripic's complaint states seven causes of action
against Foray: (1) copyright infringement; (2) inducement
of breach of contract; (3) contributory and induced
copyright infringement; (4) violation of the Digital
Millennium Copyright Act; (5) false advertising and
unfair competition under the Lanham Act; (6) false
advertising under California Law; and (7) unfair
competition under California Law. However, Veripic's
instant motion only seeks to enjoin Foray's behavior with
respect to allegations of false advertising under § 43(a) of
the Lanham Act (15 U.S.C. § 1125(a)) and under Cal.
Bus. & Prof. Code § 17500, et seq.
Veripic produces and sells the "Digital Photo Lab"
("DPL") software, which is "a centerpiece of its digital
evidence management suite designed for law enforcement
agencies." FAC ¶ 8. The "most popular" feature of
Veripic's [*3] DPL software is the "Calibration Module,"
which permits users to measure the real life length of
objects (in inches or metric units) or distances between
objects in a photo using a "simple point and click." Id. ¶
10. As a result, users can know the precise distances
within photos and accurately print life-size or scaled
images. Id. ¶ 11.
Foray produces and sells the Authenticated Digital
Asset Management System ("ADAMS") software to the
same customer base as Veripic targets with its DPL
software. 1 Id. ¶ 9. Foray's ADAMS software has an
"Image Calibration Utility" that performs substantially
the same function as Veripic's "Calibration Module" -- to
allow users to accurately abstract real-life distance from a
photo. Id. ¶ 15-16. However, until July 2009, Foray's
Utility did so in a more "cumbersome" way than Veripic's
"simple point and click" method. Id. Foray's Utility
required customers to know the exact real life horizontal
or vertical distance in a photo and to engage in a
"multi-step process" in order to obtain real life
measurements. Id. ¶ 16.
1 Although "ADAMS" originally referred to the
software at issue in this case, Foray now uses
"ADAMS" to cross-brand a suite of related
products, [*4] including ADAMS Property &
Evidence, ADAMS Crime Scene Photo/Video,
ADAMS Bag & Tag, ADAMS Latent/ACE-V,
and ADAMS Video Interview.
The ADAMS software employs a "hash function,"
which allows the user to validate whether a piece of
digital evidence has been manipulated or altered between
the time it is entered into the ADAMS software system
and a later time when a user wishes to make use of that
piece of digital evidence. Id. ¶ 32. Veripic's DPL
software has technology that allows the user to validate
not only whether digital evidence has been altered since it
was entered in the Veripic software system, but also
whether the digital evidence has been altered from the
moment the picture was originally taken.
The gravamen of Veripic's false advertising claim is
that since 2008, Foray has misled the public about certain
industry standards and the capabilities of Foray's own
software, and by implication, the capabilities of Veripic's
similar software, insofar as they comply with those
standards. FAC ¶ 22-39. In particular, it is alleged that
Foray falsely represents that its ADAMS software has the
ability to "authenticate" images consistent with guidelines
propounded by the Scientific Working [*5] Group on
Imaging Technology ("SWGIT"). Id. ¶ 23-24.
Accordingly, Veripic now seeks to enjoin Foray from (1)
using the name "Authenticated Digital Asset
Management System" or "ADAMS" or any other name
that states or implies that Foray's software authenticates
digital assets; (2) stating that Foray's software
authenticates digital assets; (3) representing that SWGIT
guidelines endorse the use of hash functions as the best
way to authenticate digital assets and that Foray's
software complies with SWGIT guidelines; and (4)
stating that Foray's software is the only software that
complies with the SWGIT "requirement" contained in the
workflow described in SWGIT Section 13. If successful
on this motion, Veripic also requests that Foray post in a
prominent place on the landing site of its website that it
has been preliminarily enjoined from making the above
statements and linking a copy of the Court's order
granting the motion.
LEGAL STANDARD
"A plaintiff seeking a preliminary injunction must
establish that he is likely to succeed on the merits, that he
is likely to suffer irreparable harm in the absence of
preliminary relief, that the balance of equities tips in his
favor, and that an injunction [*6] is in the public
interest." Winter v. Nat. Res. Def. Council, Inc., 555 U.S.
7, 20, 129 S. Ct. 365, 172 L. Ed. 2d 249 (2008). A
preliminary injunction is an extraordinary remedy never
awarded as of right. Id. at 24 (citing Munaf v. Geren, 553
Page 2
2013 U.S. Dist. LEXIS 14708, *2U.S. 674, 689-690, 128 S. Ct. 2207, 171 L. Ed. 2d 1,
(2008)). In each case, courts "must balance the competing
claims of injury and must consider the effect on each
party of the granting or withholding of the requested
relief." Winter v. Nat. Res. Def. Council, Inc., 555 U.S. at
24 (citing Amoco Production Co. v. Village of Gambell,
AK, 480 U.S. 531, 542, 107 S. Ct. 1396, 94 L. Ed. 2d 542
(1987)).
DISCUSSION
Veripic contends that an injunction is necessary in
order to prevent a loss of prospective customers and
damage to its goodwill. Veripic also contends that Foray's
misrepresentations threaten the effectiveness of criminal
investigations and prosecutions nationwide, where law
enforcement officials are erroneously relying on evidence
management software that is not capable of doing what it
purports to do. Foray responds that Veripic's fears are
overstated because the purchasers are highly
sophisticated consumers capable of discerning whether
the product they purchased is actually capable of
performing the functions it purports to perform. More
important, [*7] Foray denies that the three "false"
statements at issue here are literally false, as required by
the Lanham Act. Therefore, Foray contends that Veripic
has no likelihood of success on the merits. It is to that
first issue the Court now turns.
1. Likelihood of Success on the Merits
To succeed on a claim of false advertising under the
Lanham Act, the plaintiff must show that: (1) the
defendant made a false statement either about its own or
another's product; (2) in a commercial advertisement; (3)
that deceived or has the tendency to deceive a substantial
segment of its audience; (4) that the deception is material,
in that it is likely to influence the purchasing decision; (5)
that the defendant caused its false statement to enter
interstate commerce; and (6) plaintiff has been or is likely
to be injured as a result of the false statement, either by
direct diversion of sales from itself to the defendant, or
by a lessening of the goodwill associated with plaintiff's
product. Newcal Indus., Inc. v. Ikon Office Solutions, 513
F.3d 1038, 1052 (9th Cir. 2008).
2
2 The parties agree that false advertising under
California law requires the same showing of
falsity as the Lanham Act.
To demonstrate [*8] falsity within the meaning of
the Lanham Act, a plaintiff may show that the statement
was literally false, either on its face or by necessary
implication, or that the statement was literally true but
likely to mislead or confuse consumers. Southland Sod
Farms v. Stover Seed Co., 108 F.3d 1134, 1139 (9th Cir.
1997). To be "literally false" the statement must be
unambiguously false. In re Century 21-RE/MAX Real
Estate Adver. Claims Litig., 882 F. Supp. 915, 923 (C.D.
Cal. 1994).
When evaluating statements for literal falsity, the
statements should be analyzed in their full context.
Southland Sod Farms,108 F.3d at 1139. Where the
statements were made to sophisticated consumers with
unique background knowledge and experience, the court
should consider that as part of the relevant context. See,
e.g.,Core-Vent Corp. v. Nobel Industries, 163 F.3d 605,
[published in full-text format at 1998 U.S. App. LEXIS
22175] at * 4 (9th Cir. 1998) (unpub.) ("Of course, we do
not ignore the context in which these studies were
presented ( . . . to a professional conference and . . . in a
scientific journal); Campagnolo S.R.L. v. Full Speed
Ahead, Inc., 2010 U.S. Dist. LEXIS 46176, at *18 (W.D.
Wash. May 11, 2010) ( to determine literal falsity, "the
first question [*9] is: what does the person to whom the
advertisement is addressed find to be the message?");
Utah Medical Products v. Clinical Innovations, 79 F.
Supp. 2d 1290, 1309 (D. Utah 1999) ("While actual
consumer confusion is not necessary to assert a claim of
literal falsity, the perspective of the relevant consumer
population is necessary in determining whether the
advertising could be viewed as false.").
Three statements are at the heart of Veripic's false
advertising claim. Foray contends that Veripic cannot
establish falsity, materiality, and injury for any of the
three statements. As to falsity, Veripic contends only that
the statements are literally false. Veripic does not present
any evidence that, in the alternative, the statements
misled, confused, or deceived consumers. All three
statements revolve around the meaning of the term
"authenticity" as that term is understood by law
enforcement customers and others in the market for
digital evidence management software.
A. Statement One
Veripic alleges that Foray has disseminated the
following false statement in advertisements and responses
to requests for proposals: "Foray's ADAMS software is
the only software that complies with the SWGIT [*10]
Page 3
2013 U.S. Dist. LEXIS 14708, *6'requirement' contained in the workflow described in
Section 13, Best Practices for Maintaining the Integrity
of Digital Images and Digital Video of the SWGIT
Guidelines." Mot. at 7. Connected with that statement,
Foray also advertises "NOTE: While some vendors may
claim they are ASCLD or SWGIT compliant, no other
digital evidence management vendor complies with the
SWGIT workflow #2 [described in Section 13 of the
SWGIT Guidelines]. ONLY the FORAY ADAMS
solution meets this requirement!" Id. at 9. Foray made
these statements to law enforcement agencies in Oakland
County, Michigan and Seattle, Washington. Kwan Decl.,
Exs. A, B.
Veripic argues that this statement is literally false in
two ways: (1) the Section 13 SWGIT workflow ("Section
13") referenced in Foray's advertisement is not a
"requirement," but rather it is "workflow #2" of four
"example" workflows listed in that section; (2) the word
"only" is literally false because ADAMS is not alone
among software consistent with this workflow, since
Veripic's DPL software is also consistent with this
workflow. Foray contends that this statement is accurate
in its context.
The "requirement" at issue here is referred to as an
"example" in [*11] the SWGIT workflow. Siegel Decl.,
Ex 1 at 4. Each "workflow" is simply a list of steps users
may take in order to achieve some software objective.
SWGIT describes these workflows as "best practices"
and prefaces that, "[t]he following . . . list of specific
workflow examples . . . is not exhaustive as each
situation requires tailoring a specific process that should
be outlined in an organization's SOPs." Id. Veripic
contends that calling an example a "requirement" is
literally false. Foray argues that its use of "requirement"
does not mean that its software is the only way to be
consistent with the SWGIT workflow. Rather, its
ADAMS software is one known way to comply with
SWGIT. In context, the Court agrees with Foray. The
Oxford English Dictionary defines "requirement" as
"something wanted or needed." Oxford English
Dictionary, 3d Ed. Here, Foray states that its use of
"requirement" is intended to convey that its software uses
a series of steps known to be wanted or needed by the
example workflow -- i.e, consistent with it, as it is
written. Foray argues that its use of "requirement" does
not exclude the possibility that others can add or change
steps in the workflow. Its use here [*12] only guarantees
to customers that Foray's software, at a minimum, is
consistent with the example.
Veripic also takes issue with Foray's assertion that
only its ADAMS software complies with workflow #2.
Veripic contends that this use of "only" is literally false
because Veripic's DPL software also "fits within the same
workflow." Mot. at 10. However, Veripic undercuts its
argument in the very same sentence, noting that in
complying with the workflow, DPL "also provides other
features to ensure the integrity of digital evidence stored
in its stems." Id. Veripic's product cannot be literally
consistent with the workflow where its product deviates
from the steps listed in that workflow in order to "provide
other features." Foray contends that it uses "only" to
mean that its software is the only one that meets the
workflow's specific series of steps, not its general
outcome. As Foray points out, the left column of
workflow #2 describes a series of steps in which copies
of the original image are created, so that processing
functions can be performed in an outside program, while
maintaining the original image. See Kwan Decl., Ex. A at
13. In other words, the user can make working copies of
[*13] digital files and work on them in other imaging
software, such as Adobe Photoshop. Veripic specifically
eschewed this process as cumbersome and brags that its
DPL "has methods for enhancing images without
changing the actual file, and without creating messy
duplicates, allowing you to enhance your evidence but
never compromise it." Witzke Decl., Ex. A. Thus,
Veripic's DPL software does not simply have "other
features." Rather, it has an entirely different, perhaps
better or simpler method for achieving the outcome
described in workflow #2, that nonetheless does not
literally comply with it. Moreover, Foray has shown that
it literally complies with the specific set of steps
described in the workflow, regardless of whether other
workflows can be designed to achieve the same outcome.
Therefore, the Court cannot say that Veripic is likely to
succeed on the merits of its Lanham Act claim with
respect to this statement, where it has not made a
threshold showing of literal falsity.
B. Statement Two
Veripic argues that Foray's statement "that its
ADAMS software complied with SWGIT guidelines that
state that the use of a hash function is the best way to
authenticate digital assets" is also literally [*14] false.
According to Veripic, hash functions do not allow a user
to authenticate, as SWGIT uses that term, but rather, hash
Page 4
2013 U.S. Dist. LEXIS 14708, *10functions validate integrity. Section 13 of the SWGIT
guidelines, cited by Foray in support of the above
statement, is entitled "Best Practices for Maintaining the
Integrity of Digital Images and Digital Video." Siegel
Decl., Ex. 1. Veripic says this section has "nothing to do
with authenticating digital assets." Mot. at 10. On
Veripic's reading, SWGIT guidelines draw a bright line
distinction between "integrity" and "authenticity."
SWGIT guidelines state, "authenticity differs
significantly from integrity." Siegel Decl., Ex. 1.
Accordingly, "[i]ntegrity ensures that the information
presented is complete and unaltered from the time of
acquisition until its final disposition. For example, the
use of a hash function can verify that a copy of a digital
image file is identical to the file from which it was
copied, but it cannot demonstrate the veracity of the
scene depicted in the image." Id., Ex. 2. Authenticating
software, however, validates whether "a questioned
image or video is an accurate representation of the
original data by some defined criteria." Id. In response,
[*15] Foray argues that there are various industry
understandings of "authenticity" and "integrity," and that
integrity as Veripic defines it, is really a subset of
authenticity. In other words, there are at least two types
of authenticity: (1) acquisition authenticity (what Veripic
calls "integrity"), which ensures that the file itself has not
been changed since created or acquired; and (2) subject
matter authenticity, which ensures that the photo is what
it purports to be, the substance of the photo has not been
altered, and one can rely on the photo to draw real world
conclusions, such as distance and position.
Although Veripic argues that the distinction between
integrity and authenticity is inviolate, Foray presents
significant evidence that the terms are ambiguous,
overlapping, and sometimes interchangeable.
Notwithstanding their warning that the terms are distinct,
SWGIT's guidelines, read in their entirety, use those
terms loosely and interchangeably. For example, in
Section 13, SWGIT states "authentication is the process
of substantiating that the content is an accurate
representation of what it purports to be." Siegel Decl., Ex.
1. Yet in Section 14, SWGIT refers to authenticity, [*16]
stating, "[i]n the absence of a witness who can testify to
the origin of a questioned image or video, it may be
possible for an examiner to authenticate such data by
identifying its origin." Id. Ex. 2. In other words, Section
14 suggests that authentication requires confirmation of
the origin of data, which is precisely what Veripic says is
part of integrity validation, not authentication. In fact,
how would one know that data is an accurate
representation of what it purports to be (Veripic's
"authenticity") without necessarily confirming that the
data is complete and unaltered (Veripic's "integrity")
since its creation? Veripic's own promotional materials
define Foray's ADAMS as "acquisition authentication"
software, which "refers to knowing that a photo hasn't
changed starting from when it enters the computer
moving forward." Witzke Decl., ¶ 7, Ex. A, VeriPic FAQ
¶ 2 (emphasis in original).
Moreover, law enforcement professionals in the
industry use authenticity in a variety of ways, some of
which are consistent with what Foray claims its ADAMS
software actually does. According to Foray's expert Kerri
McClary, "authenticate" frequently refers to the various
steps taken when capturing, [*17] processing and
handling digital photographs to maintain their
"authenticity" in order to provide a foundation in court
that the digital photograph accurately portrays the scene.
3 McClary Decl., ¶ 5. Veripic's rebuttal declaration by
Richard McEvoy, Jr., does not actually dispute this. See
McEvoy Decl., ¶ 10 ("procedures for authentication of
digital evidence must encompass the entire lifespan of
that evidence . . . "). Authenticity in the legal evidentiary
context encompasses both acquisition and subject matter
authenticity, i.e., a witness may testify that a photo
accurately depicts the then-existing reality, and also by
implication, that the photo file has not been manipulated.
3 Veripic's evidentiary objection to the McClary
declaration, that it was unsigned, is
OVERRULED. Foray has properly validated the
signature. See Docket No. 47.
The evidence presented by the parties demonstrates
that at best, that term authenticity is ambiguous as used in
Foray's public statements. The SWGIT definition cited by
Veripic states that authentication is used "to discern if a
questioned image or video is an accurate representation
of the original data by some defined criteria." Siegel
Decl., Ex. 2. [*18] However, SWGIT Guidelines
nowhere define the criteria. Accordingly, Veripic has not
shown that there is a clear-cut definition of authenticity
from which Foray's statements clearly and
unambiguously deviate. Customers in the market for
"authenticating" software have multiple understandings
of what authenticating software is capable of doing and
what criteria to use to set authentication expectations.
Sellers and industry experts similarly have multiple
Page 5
2013 U.S. Dist. LEXIS 14708, *14understandings. Given this ambiguity, the Court cannot
say that Veripic is likely to succeed on the merits of its
Lanham Act claim based on this statement.
C. Statement Three
The third Foray statement Veripic alleges is literally
false is that the "ADAMS software 'authenticates' digital
assets" and that therefore, Foray misleads consumer in
naming its software "Authenticated Digital Asset
Management System" (i.e., ADAMS). The view that its
software authenticates is "a foundational part of Foray's
markets and sales of its software." Mot. at 12. In support,
Veripic cites the signature block of Foray employee
emails, which describe Foray as offering "image
authentication solutions." Kwan Decl., Ex. E. This
signature block, noting that Foray [*19] offers
"solutions" plural, actually supports Foray's contention
that it uses authentication to refer to its suite of products
that involve not just crime scene photographs, but also
latent fingerprints, footwear impressions, blood spatter,
and other kinds of evidence that its software
authenticates, as industry consumers think of that term.
Moreover, the Court has already discussed why Veripic
has not demonstrated literal falsity by using SWGIT
guidelines as the standard from which Foray's claims of
authenticity deviate.
Veripic contends that Foray's definition of
authenticity is also inconsistent with the way the National
Institute of Standards and Technology ("NIST") uses that
term. Foray advertises that, "[o]nly Foray Technologies
uses a SHA-256 secure hash algorithm, which is the
current NIST standard (NIST FIPTS 180-2 Secure Hash
Algorithm) for authenticating digital evidence." Kwan
Decl., Ex. A. NIST FIPTS 180-02 has four algorithms,
SHA-1, SHA-256, SHA-384, and SHA-512. Id., Ex. D.
These algorithms, including SHA-256, "produce a
condensed representation" of a computer file called a
"message digest." Id. And the message digest for each
computer file is unique. Id. Thus, software [*20] can
deduce whether a file has been altered by comparing
message digests at different points in the life of a file.
And according to NIST, "[t]hese algorithms enable the
determination of a message's integrity." Id. Thus, Veripic
contends that nowhere does NIST FIPTS 180-2 state that
these algorithms have anything to do with authentication.
NIST does mention authentication in the very next
sentence, stating that message digests help generate
"authentication codes," which are part of confirming
"integrity." Kwan Decl, Ex. D. Thus, rather than resolve
the ambiguity, Veripic's reference to NIST only
exacerbates it. Foray points to evidence from an October
2, 2012, press release in which NIST announced the
winner of its five-year competition to find a new
cryptographic hash algorithm, where it wrote, "[h]ash
algorithms are use widely for cryptographic applications
that ensure the authenticity of digital documents, such as
digital signatures and message authentication codes."
Hennings Decl., ¶ 5, Ex. A. Moreover, Veripic's
president, John Kwan, used a similar understanding of
authentication in a patent application, stating, "[t]his
invention relates to methods of data authentication and
more [*21] particularly, but not exclusively, provides a
system and method for creating, attaching, and using
[hash functions] of digital data to authenticate the claim."
Hennings Decl., ¶ 6, Ex. B.
Veripic argues that Foray has for years used NIST
and SWGIT as reference points to frame the meaning of
"authentication" and it cannot now disclaim that use. As
an example, Veripic points to a presentation by Foray's
vice president of program management, David Witzke, to
the International Association for Identification, wherein
he states that SWGIT "provide[s] us with the guidelines
for the processing of anything digital." Wu Decl., ¶¶ 3-4,
Ex. W1. But later in that presentation, consistent with
Foray's position here, Witzke states, "[u]nder section 13
of the SWGIT guidelines we actually get into some of the
requirements for tracking and maintaining the
authentication of images." Id. In other words, Foray is
suggesting publicly that it understands SWGIT Section
13 to address acquisition authenticity.
Given the state of the evidence, Foray's use of
authenticity in its advertising is far from being literally
false, understood in context. Veripic relies on a hair
splitting, literal reading of NIST and [*22] SWGIT
statements that are themselves inconsistent or ambiguous.
Accordingly, Veripic has not offered evidence sufficient
to justify an injunction because it has not shown likely
success on the merits. Because Veripic is unlikely to be
able to show falsity, the Court need not address the
parties' additional arguments regarding materiality and
injury, except to say that Veripic's arguments here
likewise appear to be weak. Similarly, the Court need not
address Foray's argument that Veripic has unclean hands,
and that Veripic's authentication argument is actually an
undeclared trademark infringement action.
Page 6
2013 U.S. Dist. LEXIS 14708, *182. Irreparable Harm
Plaintiffs must also establish a likelihood that they
will suffer irreparable harm absent injunctive relief.
Winter v. Natural Resources Defense Council, 555 U.S.
7, 20, 129 S. Ct. 365, 172 L. Ed. 2d 249 (2008). In
particular, plaintiffs must establish that "remedies
available at law, such as monetary damages, are
inadequate to compensate for that injury." Boomerangit,
Inc. v. ID Armor, Inc., 2012 U.S. Dist. LEXIS 86382, at
*11 (N.D. Cal. June 21, 2012).
Veripic's theory of irreparable harm is that it will
lose prospective customers and business goodwill. While
goodwill and loss of prospective customers [*23] may
sometimes support a finding of irreparable harm, see
Stuhlbarg Int'l Sales Co. v. John D. Brush & Co., 240
F.3d 832, 841 (9th Cir. 2001), Veripic has presented no
evidence of actual losses. At best, it presents a
speculative declaration from its company president in
which he states that six customers have told Veripic that
it was their understanding that "Foray authenticated
digital images in the same manner as Veripic." Kwan
Decl. ¶ 25. Moreover, Kwan states that he only recently
became aware of what Foray was telling customers to
deceive them into believing Foray authenticates digital
images. Id. ¶ 26. And "on information and belief," Kwan
believes that Veripic has lost several customers to whom
Foray previously sent an advertisement regarding Foray's
alleged compliance with SWGIT Section 13's
"requirement." Id. ¶ 27.
Veripic's arguments are unavailing for several
reasons. First, as to the urgency of an injunction, Veripic
was made aware, or should have been aware of, Foray's
alleged misrepresentations since at least June 1, 2011,
when the City of Seattle made available to Veripic the
Foray request for proposal response that contains the
offending statements. See Kwan Decl., ¶ [*24] 8, Ex. B.
Such a delay hardly bespeaks of the urgency typical in
successful preliminary injunction motions. See Oakland
Tribune, Inc. v. Chronicle Pub. Co., Inc. 762 F.2d 1374
(9th Cir. 1985) ("Plaintiff's long standing delay seeking a
preliminary injunction implies a lack of urgency and
irreparable harm."). Second, Veripic fails to present any
evidence tending to show that the loss of customers is
anything more than speculation or the result of legitimate
competition. In fact, most customers purchase one of
these competing software suites only after first reviewing
responses to requests for proposals, company
presentations and extensive research. Thus, any loss of
customers may be due to the fact that as between
ADAMS and DPL, customers with knowledge of the
differences between the products -- whether called
integrity validation or authentication -- prefer one brand
over the other.
Veripic has not shown that the harm it imagines is
more than speculative. Accordingly, it has not shown
irreparable harm sufficient to justify a preliminary
injunction.
3. Balance of Hardships
Veripic seeks a broad, five part injunction, wherein
Foray would be enjoined from (1) using the name
"Authenticated [*25] Digital Asset Management
System" or "ADAMS" or any other name that states or
implies that Foray's software authenticates digital assets;
(2) stating that Foray's software authenticates digital
assets; (3) representing that SWGIT guidelines endorse
the use of hash functions as the best way to authenticate
digital assets and that Foray's software complies with
SWGIT guidelines; and (4) stating that Foray's software
is the only software that complies with the SWGIT
"requirement" contained in the workflow described in
SWGIT Section 13. Veripic also requests that Foray post
in a prominent place on the landing site of its website that
it has been preliminarily enjoined from making the above
statements and linking a copy of the Court's order
granting the motion.
The scope of the relief sought goes far beyond
preserving the status quo before trial. Veripic effectively
proposes that Foray discontinue or change the entire
branding of its products. As Foray states, this would end
its business during the pendency of this case. Such drastic
relief cannot be supported only by speculation that future
customers may not purchase Veripic products.
4. Public Interest
Veripic has not made a sufficient showing [*26] that
the injunction it seeks is in the public interest. Veripic is
correct that there may be crucial legal implications of
having law enforcement erroneously rely on software that
does not do what it purports to do. Veripic contends that
ultimately, evidence may be thrown out of court because
it was not properly authenticated. Mot. at 21. This
concern, however, is overstated and unsupported. Here,
sophisticated customers invest significant time and
Page 7
2013 U.S. Dist. LEXIS 14708, *22energy into purchasing this software, and also have
precise understandings of what they need that software to
be able to do in order to gather, store, and validate
evidence in a legal setting. Veripic presents no evidence
to the contrary. Therefore, Veripic has not stated a
compelling public interest in an injunction.
CONCLUSION
For the foregoing reasons, Veripic has not shown
that an injunction should issue. Accordingly, the Court
hereby DENIES Veripic's motion for a preliminary
injunction. The Court also DENIES as MOOT Foray's
motion for leave to file a declaration and deposition
testimony and DENIES as untimely Veripic's
administrative motion for leave to file supplemental
evidence. This order resolves Docket Nos. 22, 48 and 52.
IT IS SO [*27] ORDERED.
Dated: January 22, 2013
/s/ Susan Illston
SUSAN ILLSTON
United States District Judge
Page 8

2013 U.S. Dist. LEXIS 14708, *26
Share:

Contra Costa Flaws

Popular Posts

Blog Archive

Ad Home

More Links

Ways to Donate

Card image

Donate via Venmo

Venmo is easy, fast and goes directly to a credit card.

Donate Here

Follow Us

No one has ever become poor by giving, Please Donate

Flickr Images

Featured

javascript:void(0)
Powered by Blogger.

Comments

Search This Blog

Find Us On Facebook

Random Posts

Recent Posts

Header Ads

BlogRoll

Labels

Popular Posts

Recent Posts

Unordered List

  • Lorem ipsum dolor sit amet, consectetuer adipiscing elit.
  • Aliquam tincidunt mauris eu risus.
  • Vestibulum auctor dapibus neque.

Pages