WhatsApp Inc. v. NSO Group Technologies Limited

CourtDistrict Court, N.D. California
DecidedFebruary 23, 2024
Docket4:19-cv-07123
StatusUnknown

This text of WhatsApp Inc. v. NSO Group Technologies Limited (WhatsApp Inc. v. NSO Group Technologies Limited) is published on Counsel Stack Legal Research, covering District Court, N.D. California primary law. Counsel Stack provides free access to over 12 million legal documents including statutes, case law, regulations, and constitutions.

Bluebook
WhatsApp Inc. v. NSO Group Technologies Limited, (N.D. Cal. 2024).

Opinion

1 2 3 UNITED STATES DISTRICT COURT 4 NORTHERN DISTRICT OF CALIFORNIA

6 WHATSAPP INC., et al., 7 Case No. 19-cv-07123-PJH Plaintiffs, 8 v. ORDER RE MOTIONS TO COMPEL 9 AND MOTION FOR RELIEF FROM NSO GROUP TECHNOLOGIES CASE MANAGEMENT ORDER 10 LIMITED, et al., Re: Dkt. No. 235, 236, 239, 240, 249, 11 Defendants. 257, 260, 264, 265, 272, 276, 279, 280 12

13 14 Before the court are plaintiffs’ motion to compel discovery, defendants’ motion to 15 compel discovery, and defendants’ motion for relief from the case management schedule. 16 The motions came on for hearing on February 15, 2024. Plaintiffs WhatsApp Inc. and 17 Facebook, Inc. appeared through their counsel, Antonio Perez-Marques, Craig Cagney, 18 Micah Block, and Greg Andres. Defendants appeared through their counsel, Joseph 19 Akrotirianakis and Aaron Craig. Having read the parties’ papers and carefully considered 20 their arguments and the relevant legal authority, and good cause appearing, the court 21 rules as follows. 22 BACKGROUND 23 On October 29, 2019, plaintiffs filed this lawsuit, alleging that defendants sent 24 spyware, using WhatsApp’s system, to approximately 1,400 mobile phones and devices 25 designed to infect those devices for the purpose of surveilling the users of those phones 26 and devices. Dkt. 1, ¶ 1. The complaint alleges four causes of action: (1) violation of the 27 Computer Fraud and Abuse Act (“CFAA”), 18 U.S.C. § 1030; (2) violation of the California 1 Comprehensive Computer Data Access and Fraud Act, Cal. Penal Code § 502; (3) 2 breach of contract; and (4) trespass to chattels.1 3 Defendants previously filed a motion for protective order, seeking an order 4 excusing it from compliance with discovery obligations due to various U.S. and Israeli 5 restrictions. See Dkt. 186. The court denied defendants’ motion to the extent that it 6 sought a blanket order excusing it from all discovery, but also concluded that defendants 7 may be partially excused from certain discovery obligations based on the framework set 8 forth by Richmark Corp. v. Timber Falling Consultants, 959 F.2d 1468, 1475 (9th Cir. 9 1992). See Dkt. 233. 10 The Richmark court set forth the following factors for a court to consider “in 11 deciding whether or not foreign statutes excuse non-compliance with discovery orders:” 12 (1) the importance to the investigation or litigation of the documents or other information 13 requested, (2) the degree of specificity of the request, (3) whether the information 14 originated in the United States, (4) the availability of alternative means of securing the 15 information, (5) and the extent to which noncompliance with the request would undermine 16 important interests of the United States, or compliance with the request would undermine 17 important interests of the state where the information is located. 959 F.2d at 1475. 18 After considering Richmark as applied to this case, the court concluded that “to the 19 extent that discovery disputes arise between the parties, the court’s analysis will focus on 20 factors (1) and (2), and in instances where the requested discovery is sufficiently 21 important and specific, the court will order compliance with those discovery requests.” 22 Dkt. 233 at 10. 23 Plaintiffs’ motion to compel discovery now raises a dispute where the discovery 24 requests must be analyzed as to factor (1) and (2), i.e., the importance of the requests to 25 the litigation, and the degree of specificity of the requests. 26

27 1 The court dismissed plaintiffs’ fourth cause of action under Rule 12(b)(6), and no 1 Defendants have also filed a motion to compel discovery that does not relate to 2 the Richmark factors, as well as a motion for relief from the case management schedule. 3 Those motions will be addressed after addressing plaintiffs’ discovery motion. The 4 parties have also filed a number of motions to seal (Dkt. 235, 239, 249, 257, 260, 264, 5 272, 276), which are GRANTED. 6 DISCUSSION 7 A. Plaintiffs’ motion to compel discovery (Dkt. 236) 8 As an initial matter, as stated at the hearing, defendants have already conceded 9 that some of plaintiffs’ requests do seek information that is sufficiently important and 10 specific under Richmark, and those documents must indeed be produced. See Dkt. 252 11 at 5. As to the remaining discovery sought by plaintiffs’ motion, the court will address 12 those requests with reference to the four categories set forth in the parties’ briefs: (1) 13 what versions of the alleged spyware must be produced, (2) what functionality of the 14 alleged spyware must be produced, (3) whether defendants’ clients must be disclosed, 15 and (4) whether defendants’ server architecture information must be disclosed. See Dkt. 16 236 at 12. 17 As to category (1), as stated at the hearing, the court adopts plaintiffs’ definition of 18 “all relevant spyware” as set forth in their motion: “any NSO spyware targeting or directed 19 at Whatsapp servers, or using Whatsapp in any way to access Target Devices.” See Dkt. 20 236 at 13. As also stated at the hearing, defendants have not identified a basis for 21 limiting its production to the Pegasus program, or to any particular single operating 22 system. The complaint alleges that “Pegasus or another remote access trojan developed 23 by defendants” was responsible for the data breaches, and that the programs were used 24 “on mobile devices using the Android, iOS, and Blackberry operating systems.” See Dkt. 25 1, ¶¶ 24, 32. Accordingly, the definition of “all relevant spyware” shall not be read to 26 include only Pegasus, or only a single operating system’s program. Under Richmark, 27 those documents are sufficiently important and specific such that compliance with 1 As to the timeframe of documents that must be produced, the court concludes 2 that, at this stage of the case, the Richmark factors weigh in favor of production for “all 3 relevant spyware” for a period of one year before the alleged attack to one year after the 4 alleged attack; in other words, from April 29, 2018 to May 10, 2020. See Dkt. 1, ¶ 42. If, 5 after reviewing the relevant spyware from that timeframe, plaintiffs are able to provide 6 evidence that any attack lasted beyond that timeframe, plaintiffs may seek further 7 discovery at that time. At the hearing, the parties discussed the possibility of stipulating 8 to a timeframe for the production of “all relevant spyware,” and may substitute their own 9 stipulation for the timeframe set forth in this order. 10 As to category (2), the court rejects defendants’ argument that their production 11 should be limited to the installation layer of the alleged spyware, and instead concludes 12 that defendants must produce information concerning the full functionality of the relevant 13 spyware. As discussed at the hearing, the complaint contains numerous instances 14 alleging not only that spyware was installed on users’ devices, but also that information 15 was accessed and/or extracted from those devices. See, e.g., Dkt. 1, ¶ 27 (“Pegasus 16 could ‘remotely and covertly extract valuable intelligence from virtually any mobile 17 device,’” . . . “intercept communications sent to and from a device, including 18 communications over iMessage, Skype, Telegram, WeChat, Facebook Messenger, 19 Whatsapp, and others,” and could be “customized for different purposes, including to 20 intercept communications, capture screenshots, and exfiltrate browser history.”); ¶ 32 21 (“Pegasus or another remote access trojan” was used “for the purpose of accessing data 22 and communications on target devices.”); ¶ 41 (“Defendants’ malware was designed to 23 give defendants and their customers access to information and data on the target 24 devices, including their communications.”).

Free access — add to your briefcase to read the full text and ask questions with AI

Related

Richmark Corp. v. Timber Falling Consultants
959 F.2d 1468 (Ninth Circuit, 1992)

Cite This Page — Counsel Stack

Bluebook (online)
WhatsApp Inc. v. NSO Group Technologies Limited, Counsel Stack Legal Research, https://law.counselstack.com/opinion/whatsapp-inc-v-nso-group-technologies-limited-cand-2024.