Campbell et al v. Facebook Inc.

Filing 157

EXHIBITS re 149 Opposition/Response to Motion,,,,, filed byFacebook Inc.. *** ATTACHMENTS 1, 13 LOCKED AT FILER'S REQUEST. SEE DOCUMENT 162 . *** (Attachments: # 1 Appendix of Evidence (Part 1 of 13) (Redacted), # 2 Appendix of Evidence (Part 2 of 13) (Redacted), # 3 Appendix of Evidence (Part 3 of 13) (Redacted), # 4 Appendix of Evidence (Part 4 of 13) (Redacted), # 5 Appendix of Evidence (Part 5 of 13) (Redacted), # 6 Appendix of Evidence (Part 6 of 13) (Redacted), # 7 Appendix of Evidence (Part 7 of 13) (Redacted), # 8 Appendix of Evidence (Part 8 of 13) (Redacted), # 9 Appendix of Evidence (Part 9 of 13) (Redacted), # 10 Appendix of Evidence (Part 10 of 13) (Redacted), # 11 Appendix of Evidence (Part 11 of 13) (Redacted), # 12 Appendix of Evidence (Part 12 of 13) (Redacted), # 13 Appendix of Evidence (Part 13 of 13) (Redacted))(Related document(s) 149 ) (Chorba, Christopher) (Filed on 1/16/2016) Modified on 1/22/2016 (ewn, COURT STAFF). Modified on 1/22/2016 (vlkS, COURT STAFF).

Download PDF
1 2 3 4 5 6 7 8 9 10 11 12 GIBSON, DUNN & CRUTCHER LLP JOSHUA A. JESSEN, SBN 222831 JJessen@gibsondunn.com JEANA BISNAR MAUTE, SBN 290573 JBisnarMaute@gibsondunn.com PRIYANKA RAJAGOPALAN, SBN 278504 PRajagopalan@gibsondunn.com ASHLEY ROGERS, SBN 286252 ARogers@gibsondunn.com 1881 Page Mill Road Palo Alto, California 94304 Telephone: (650) 849-5300 Facsimile: (650) 849-5333 GIBSON, DUNN & CRUTCHER LLP CHRISTOPHER CHORBA, SBN 216692 CChorba@gibsondunn.com 333 South Grand Avenue Los Angeles, California 90071 Telephone: (213) 229-7000 Facsimile: (213) 229-7520 Attorneys for Defendant FACEBOOK, INC. 13 14 UNITED STATES DISTRICT COURT 15 NORTHERN DISTRICT OF CALIFORNIA 16 OAKLAND DIVISON 17 MATTHEW CAMPBELL and MICHAEL HURLEY, 18 Case No. C 13-05996 PJH (MEJ) PUTATIVE CLASS ACTION Plaintiffs, 19 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION v. 20 FACEBOOK, INC., 21 Defendant. 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1693 1 2 I, Dan Fechete, declare as follows: 1. I have been employed as a software engineer at Facebook since October 2011, and my 3 current title is Engineering Manager. I am over the age of 18. Since I joined Facebook, I have 4 worked on Facebook’s Developer Platform, and, until they were deprecated, my work encompassed 5 Facebook’s “Recommendations” and “Activity Feed” plugins and certain Facebook services related 6 to those plugins. The following facts reflecting functionality prior to October 2011 are based on my 7 review of the cited documents and related source code. The following facts reflecting functionality 8 after October 2011 are based on my review of the cited documents and related source code, as well as 9 my personal knowledge. If called and sworn as a witness, I could and would testify competently to 10 11 these facts. 2. I provide this Declaration to explain certain facts regarding Facebook’s software code 12 as it relates to Facebook’s “Recommendations” and “Activity Feed” plugins and certain Facebook 13 services related to those plugins, particularly as they related to uniform resource locators (“URLs”) in 14 messages sent and received through the Facebook platform. 15 16 17 18 19 3. I understand that on November 13, 2015, Plaintiffs filed a Motion for Certification of the following proposed class: All natural-person Facebook users located within the United States who have sent, or received from a Facebook user, private messages that included URLs in their content (and from which Facebook generated a URL attachment), from within two years before the filing of this action up through the date of the certification of the class. 20 I understand that Plaintiffs filed their action on December 30, 2013, and that therefore the relevant 21 period for Plaintiffs’ new purported class is December 30, 2011 to present (the “Class Period”). 22 4. I understand that Plaintiffs have submitted an expert report from Dr. Jennifer Golbeck 23 in support of their Motion for Certification, which purports to describe Facebook’s “interception and 24 acquisition of the URL attachments in Private Messages,” as well as purported “uses” of that data— 25 including use in “External Recommendations,” “Taste,” and “Activity Feed.” I also understand that 26 her report (as well as her deposition testimony) included the statements cited herein. 27 28 Gibson, Dunn & Crutcher LLP 1 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1694 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 2 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1695 1 Overview of Recommendations Plugin and “Taste” 2 8. Facebook’s Recommendations Feed1 was a social plugin offered to developers that 3 displayed a list of URLs representing the most recommended webpages on that developer’s site. If 4 someone was logged into Facebook when he or she visited the developer’s website, 5 Recommendations Feed prioritized information that was subject to certain actions by that person’s 6 Facebook friends, including friends’ clicking on a “Like” button on a given webpage. For example, a 7 site that publishes articles might display the most recommended articles and those articles 8 recommended by a friend of the viewer, as illustrated by the example below: 9 10 11 12 13 14 15 16 17 18 9. 19 The general purpose of the Recommendations Feed was to help people discover web 20 information that they were likely to want to view, enjoy, and interact with. It was part of a set of 21 social plugins announced at the same time (April 2010), all of which were designed to personalize 22 non-Facebook webpages with information that a particular person would find valuable, in order to 23 personalize the internet at large with social context in order to facilitate information discovery and 24 encourage social interaction. 25 26 27 28 Gibson, Dunn & Crutcher LLP 1 Dr. Golbeck refers to this as the “Recommendations widget.” (Golbeck Report ¶ 60.) 3 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1696 1 10. Facebook’s Recommendations Feed was announced to the public at Facebook’s F8 2 conference in April 2010 (a conference where Facebook announces new products and features). In 3 addition to the Recommendations Feed, the Recommendations “API” was an interface on or from a 4 Facebook webpage that allowed people to write queries to display the same information presented by 5 the Feed.2 Likewise, the Recommendations “Bar” was a later implementation of the same 6 Recommendations Feed, but also added the ability for the viewer to “Like” or “Share” the 7 Recommended information. It was introduced on July 26, 2012. Unless otherwise indicated below, 8 the Recommendations API and Recommendations Bar reflected the same information displayed by 9 the Recommendations Feed at a given time for a given URL viewed by a given person. The 10 Recommendations Feed (and related Bar and API) were discontinued on June 23, 2015. 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 2 Dr. Golbeck refers to this as “an API call in RecommendationsGetAPI.php.” (Id.) 26 27 28 Gibson, Dunn & Crutcher LLP 4 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1697 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 5 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1698 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 6 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1699 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 7 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1700 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 8 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1701 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 9 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1702 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 30. From June 23, 2015, when the Recommendations Feed was discontinued, to present, the Recommendations Feed has not existed. 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 10 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1703 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 11 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1704 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 12 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1705 1 Activity Feed Plugin 2 38. Facebook’s Activity Feed was a social plugin offered to developers that displayed a 3 list of recent activity taken on that developer’s site. If someone was logged into Facebook when she 4 visited the developer’s site, Activity Feed prioritized actions by that person’s Facebook friends, 5 particularly friends’ clicking on a “Like” button on a given webpage. If the person was not logged in, 6 or there was not enough activity to fill the Activity Feed, the Activity Feed would have reflected 7 URLs from the Recommendations Feed. Developers also could have configured the plugin to show 8 both the Activity Feed and Recommendations Feed. 9 39. The general purpose of the Activity Feed was similar to the Recommendations Feed, 10 to help people discover web information that they were likely to want to view, enjoy, and interact 11 with. 12 13 40. Facebook’s Activity Feed was announced to the public at Facebook’s F8 conference in April 2010. The Activity Feed was discontinued on June 23, 2015. 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 13 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1706 1 2 3 4 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 I declare under penalty of perjury under the laws of the United States of America that the 20 foregoing is true and correct and that this declaration was executed on January 15, 2016 in Menlo 21 Park, California. 22 /s/ Dan Fechete Dan Fechete 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 14 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1707 1 2 ATTORNEY ATTESTATION I, Christopher Chorba, attest that concurrence in the filing of this Declaration of Dan Fechete 3 has been obtained from the signatory. I declare under penalty of perjury under the laws of the United 4 States of America that the foregoing is true and correct. Executed this 15th day of January, 2016, in 5 Los Angeles, California. 6 7 Dated: January 15, 2016 /s/ Christopher Chorba Christopher Chorba 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 15 DECLARATION OF DAN FECHETE IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1708 APP. 1709 App. 1710 Filed Under Seal APP. 1711 App. 1712-1749 Filed Under Seal APP. 1750 App. 1751-1773 Filed Under Seal APP. 1774 App. 1775-1792 Filed Under Seal APP. 1793 App. 1794-1798 Filed Under Seal APP. 1799 App. 1800-1825 Filed Under Seal APP. 1826 App. 1827-1835 Filed Under Seal APP. 1836 App. 1837-1843 Filed Under Seal APP. 1844 App. 1845-1853 Filed Under Seal APP. 1854 App. 1855-1899 Filed Under Seal APP. 1900 App. 1901-1914 Filed Under Seal EXHIBIT AAA APP. 1915 App. 1916-1927 Filed Under Seal 1 2 3 4 5 6 7 8 9 10 11 12 GIBSON, DUNN & CRUTCHER LLP JOSHUA A. JESSEN, SBN 222831 JJessen@gibsondunn.com JEANA BISNAR MAUTE, SBN 290573 JBisnarMaute@gibsondunn.com PRIYANKA RAJAGOPALAN, SBN 278504 PRajagopalan@gibsondunn.com ASHLEY ROGERS, SBN 286252 ARogers@gibsondunn.com 1881 Page Mill Road Palo Alto, California 94304 Telephone: (650) 849-5300 Facsimile: (650) 849-5333 GIBSON, DUNN & CRUTCHER LLP CHRISTOPHER CHORBA, SBN 216692 CChorba@gibsondunn.com 333 South Grand Avenue Los Angeles, California 90071 Telephone: (213) 229-7000 Facsimile: (213) 229-7520 Attorneys for Defendant FACEBOOK, INC. 13 14 UNITED STATES DISTRICT COURT 15 NORTHERN DISTRICT OF CALIFORNIA 16 OAKLAND DIVISON 17 MATTHEW CAMPBELL and MICHAEL HURLEY, 18 Case No. C 13-05996 PJH (MEJ) PUTATIVE CLASS ACTION Plaintiffs, 19 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION v. 20 FACEBOOK, INC., 21 Defendant. 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1928 1 2 I, Michael Adkins, declare as follows: 1. I have been employed as a software engineer at Facebook since May 2010, and my 3 current title is Engineering Manager. I am over the age of 18. I have worked on the Facebook 4 Messages product to build anti-abuse, security, and anti-phishing systems for the Facebook Messages 5 product. My responsibilities generally involve ensuring the integrity of messages passing through 6 Facebook’s system to ensure that they are not malicious, fraudulent, or spam. My work thus 7 encompasses 8 systems). Unless otherwise stated, the following facts are within my personal knowledge and, if 9 called and sworn as a witness, I could and would testify competently to these facts. 10 2. one of Facebook’s suite of anti-abuse systems (also referred to as “Security” I provide this Declaration to explain certain facts regarding Facebook’s software code 11 as it relates to Facebook’s 12 uniform resource locators (“URLs”) in messages sent and received through the Facebook platform, in 13 support of Facebook’s Opposition to Plaintiffs’ Motion for Class Certification. 14 3. and other Security-related systems, particularly as they relate to As explained in further detail below, Facebook source code is configured to run 15 16 17 Accordingly, there are many 18 instances when a URL or URL attachment generated in connection with a message will not lead to 19 the creation of a 20 Sentry, no 21 made in this case, 22 security and anti-abuse functions. 23 Overview of Sentry 24 . Specifically, in those instances when a URL attachment is blocked by will be created. Further, contrary to assertions I understand Plaintiffs have generated from URL attachments to messages for its 4. to determine whether a 25 message or post, or information included with it – such as a URL – is malicious, fraudulent, or 26 otherwise harmful. For example, if a person using Facebook posts or sends a message with the URL 27 http://clickmonkeys.com, 28 Gibson, Dunn & Crutcher LLP would analyze the URL to determine 1 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1929 1 whether it is a harmful link containing spam, malware, a virus, or the like, and whether it is likely that 2 the sender’s account has been hijacked (given that it sent a malicious or spammy URL or URLs). 3 can likewise run things like 4 5 6 5. One general purpose of Facebook’s Security systems (including , among others) 7 is to protect people and their data when they use Facebook. For instance, Facebook encrypts user 8 activity (whether that involves posting a status update or sending a message) so that third parties 9 cannot access it in transit, and if an individual clicks on a spam post accidentally, Facebook’s 10 detection tools determine whether a virus has infected the individual’s browser or computer and helps 11 to remove it. 12 hackers, and other such individuals or entities, so that all people legitimately using Facebook can 13 enjoy the site safely and confidently. 14 6. among other Security tools, was built to ward off attacks from cyber criminals, Sentry runs a series of various filters and other mechanisms by which to detect abuse 15 or other fraudulent activity on Facebook; these include functions called 16 “Sigma.” 17 in the text of the message and the URL typed 18 19 20 21 22 . Sigma, in turn, is a rules engine that runs a series of policies 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 2 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1930 1 2 Sentry and URLs in Messages 7. As noted above in paragraph 3, Facebook code is configured such that 8. First, during the period covered by discovery in this case (2010-2013), 3 4 5 6 7 , Facebook would assess 8 This functionality can be seen 9 which specifically states that 10 11 9. 12 Specifically, if the sender typed a URL into the message and , which would in turn, 13 14 (which is contained in a system called 15 ), it would tell . Accordingly, no URL preview would be generated. So instead, 16 . This was true whether the person using 17 Facebook was attempting to share the URL through a message or through a public post to their 18 profile, a status message on their NewsFeed, a post to a friend’s profile, or the like; 19 20 to generate a URL preview. 21 22 23 24 10. Second, if a URL preview was successfully generated (and not deleted by the sender), the URL attachment would have been sent with the message when the sender pressed “Send.” 25 26 27 28 Gibson, Dunn & Crutcher LLP 3 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1931 1 to determine and help resolve any abuse- or security-related issues. 2 3 detect largescale automated abuse (e.g., spam, malware, phishing, and other abuse). For example, Sigma 4 5 6 . Likewise, the 7 8 . Further, could be run through Facebook’s 9 10 11. 11 , and that the sender was 12 allowed to send messages to that recipient (i.e. the recipient had not blocked that sender). This would 13 also include 14 qualify for delivery to the Inbox or 15 whether it should be directed to the” Other” folder, based on the sender-recipient(s) relationship and 16 the recipient’s configured settings. The 17 18 . If 19 such an error occurred, the 20 URL attachment to a message, 21 12. . If such an error occurred with respect to a . Further, the 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP . Accordingly, may use 4 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1932 1 2 3 . Based on the 4 5 6 the sender might have seen the following security prompt: 7 8 9 10 11 12 13 13. , including 14 15 to perform their anti-abuse- and security-related functions. For instance, 16 17 – was available to 18 and used by Sigma, 19 14. . Third, when a sender or a recipient tried to view the sent message, 20 21 22 23 It would once again run a discussed in paragraphs 10 and if any of these threw an error, the message, part of the 24 message, or its URL attachment may not have been rendered to the recipient. Of course, this set of 25 checks would not occur if 26 27 28 Gibson, Dunn & Crutcher LLP 5 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1933 1 2 detect that a URL attachment to the message was potentially dangerous when the recipient (or sender) 3 tried to view it in their inbox, it could have shown the following security protocol to the recipient (or 4 sender) when they tried to view the message and its attachment: 5 6 7 8 9 15. Note that, if in this process, 10 11 12 13 it could not render its URL attachment to the recipient (or sender) trying to view that message. 14 15 16 17 18 Variability Among Class Members and Over Time in Connection with Sentry 16. There was considerable variability in a given instance with respect to whether 19 on a message and any URL attachment 20 associated with it. 21 17. For efficiency reasons, the Sigma 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 6 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1934 1 . Thus, 2 presented by each message. It is impossible to know precisely what 3 variability of the input and other data 4 5 18. at a given time. Further, each individual , Sigma, among others) could determine whether 6 7 will do given the For instance, if a sender attempted to upload a malicious file, 8 9 19. Further, Facebook’s 20. Similarly, as described earlier above, if a sender sent a message to a recipient 10 11 12 13 recognized as their Facebook friend, but the message contained a URL known to be a spammy link, 14 15 16 17 21. Alternatively, but was later determined by 18 19 so that it would not have rendered the URL preview 20 attachment to the sender or recipient if they later reopened that message in their Inbox or Sent 21 Messages folder. 22 22. 23 24 Taking all of this variation together, at a minimum, determining whether a putative class member’s share of a URL in a message actually resulted in , among other things, on whether the 25 26 27 28 Gibson, Dunn & Crutcher LLP Such a determination would require the following individualized inquiries for each message: 7 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1935 1 a. Was the message sent from the Facebook website, or was it sent using the Share 2 Plugin on a third party website? 3 b. Did the sender either copy and paste a URL into the draft message text field, or type a 4 URL into the draft text and press the space bar? 5 c. Was the URL to a third-party webpage (as opposed to a Facebook webpage)? 6 d. Was the sender using a browser that is JavaScript capable? 7 e. Did the sender have JavaScript enabled in her browser? 8 f. Did any of the 9 10 11 g. When the message was sent, 12 13 or Sigma 14 15 , among other things? 16 h. After the message had been sent, and the sender or recipient attempted to view it, was 17 the URL attachment, or part of the message, or the whole message, 18 19 20 21 22 ? 23. To my knowledge, neither Facebook nor any other entity possesses the data that would 23 be required to ascertain the answers to the inquiries in paragraph 22(a)-(g), either on an individual or 24 bulk basis, for putative class members. 25 26 27 28 Gibson, Dunn & Crutcher LLP 8 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1936 1 I declare under penalty of perjury under the laws of the United States of America that the 2 foregoing is true and correct and that this declaration was executed on January 14, 2016, in Menlo 3 Park, California. 4 /s/ Michael Adkins Michael Adkins 5 6 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 9 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1937 ATTORNEY ATTESTATION 1 I, Christopher Chorba, attest that concurrence in the filing of this Declaration of Michael 2 Adkins has been obtained from the signatory. I declare under penalty of perjury under the laws of the 3 United States of America that the foregoing is true and correct. Executed this 15th day of January, 4 2016, in Los Angeles, California. 5 6 Dated: January 15, 2016 /s/ Christopher Chorba Christopher Chorba 7 8 9 10 11 12 13 14 15 16 17 18 19 20 21 22 23 24 25 26 27 28 Gibson, Dunn & Crutcher LLP 10 DECLARATION OF MICHAEL ADKINS IN SUPPORT OF DEFENDANT FACEBOOK, INC.’S OPPOSITION TO PLAINTIFFS’ MOTION FOR CLASS CERTIFICATION Case No. C 13-05996 PJH (MEJ) APP. 1938 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF CALIFORNIA MATTHEW CAMPBELL and MICHAEL HURLEY, on behalf of themselves and all others similarly situated, Plaintiffs Case No. C 13-05996 PJH v. Expert Report of Dr. Benjamin Goldberg FACEBOOK, INC., Defendant APP. 1939 Table of Contents I. QUALIFICATIONS ........................................................................................................... 1 II. SUBJECT MATTER OF OPINIONS ................................................................................ 2 III. MATERIALS REVIEWED ................................................................................................ 2 IV. SUMMARY OF OPINIONS .............................................................................................. 3 V. TECHNOLOGY OVERVIEW ........................................................................................... 8 VI. THE FACEBOOK SOCIAL NETWORKING SERVICE ............................................... 10 VII. THE FACEBOOK SOFWARE/SOURCE CODE ........................................................... 16 A. URL Previews B. VIII. .............................................................................. 16 .......................................................................... 24 RESPONSE TO THE GOLBECK REPORT ................................................................... 26 A. The Alleged “Interceptions” .................................................................................... 26 1. ......................... 27 2. ................................................................. 30 3. ............................................................................ 31 4. Code-Based “Devices”.................................................................................... 31 B. C. Variability in the Alleged “Uses” of “Intercepted” Data ......................................... 37 D. Continuing Conduct ................................................................................................. 41 E. Lack of Ascertainability of Class Members............................................................. 41 F. IX. Variability in the Purported “Interceptions” ............................................................ 32 Variability in Operation of the Source Code Across Senders and Recipients ......... 44 COMPUTER STORAGE ................................................................................................. 44 A. Computer Storage Technology ................................................................................ 44 B. The Incorrect Distinction Between “Memory” and “Storage” ................................ 47 X. ORDINARY COURSE OF BUSINESS........................................................................... 49 XI. RESERVATION OF RIGHTS ......................................................................................... 51 APP. 1940 I. QUALIFICATIONS 1. I am a tenured Associate Professor in the Department of Computer Science of the Courant Institute of Mathematical Sciences, New York University (“NYU”), in New York, NY. I have held this position since September 1994. From 1987 to 1994, I was an Assistant Professor in the Department of Computer Science at NYU. Since September 2014, I have been the Director of Graduate Studies for the MS programs in the Department of Computer Science, having previously served in that role from September 2009 through August 2012. I served as the Director of Undergraduate Studies for the Department of Computer Science from September 1995 through August 1998 and from September 2003 through August 2006. In addition, I have held a one-year visiting professorship at the Institut National de Recherche en Informatique et en Automatique (INRIA), a national laboratory in France, and was twice appointed to a month-long position as an invited professor at the Ecole Normale Supérieure, a university in Paris. 2. I received my Doctoral degree in Computer Science from Yale University, New Haven, Connecticut in 1988, having previously received Master of Science and Master of Philosophy degrees in Computer Science from Yale in 1984. My undergraduate degree from Williams College in 1982 was a Bachelor of Arts degree with highest honors in Mathematical Sciences. 3. I have taught courses at the undergraduate and graduate level in, among other things, software development, programming languages, object oriented programming, hardware design, and operating systems (including networking). I have also published extensively in the areas of memory management and distributed and parallel computing, which involves computers connected by networks and data transmission between computers. 4. I have testified numerous times as an expert in computer science at trial in U.S. District Court, including in the U.S. District Court for the Northern District of California. I have 1 APP. 1941 also provided two technology tutorials to the Court in the U.S. District Court for the Northern District of California. Additional information concerning the computer science courses that I have taught, my professional publications and presentations in the field of computer science, and cases in which I have testified as an expert at trial or deposition in the past four years are set forth in my current Curriculum Vitae, a copy of which is attached as Exhibit II. . SUBJECT MATTER OF OPINIONS 5. I have been retained by Gibson Dunn, counsel for Facebook, to form opinions regarding the operation of the Facebook social networking service, to explain the meaning of computing terminology related to this matter, and to respond to certain assertions made by Dr. Jennifer Golbeck in her November 13, 2015 Report in Support of Plaintiff’s Motion for Class Certification (“the Golbeck report”). (Dkt. No. 137-6.) 6. I am being compensated at a rate of $450 per hour for my work in this matter. My compensation is in no way conditioned on the nature of my opinions or on the outcome of this matter. III. MATERIALS REVIEWED 7. A complete list of the materials that I reviewed in forming my opinions set forth in this report is attached hereto as Exhibit . As detailed further below, I also reviewed portions of Facebook’s source code from the period of September 2009 to December 2012, which I understand to be the same source code to which Dr. Golbeck had access. Consequently, unless otherwise specified, my opinions are limited to the operation of Facebook’s messaging service during that period. 2 APP. 1942 IV. SUMMARY OF OPINIONS 8. I disagree with Dr. Golbeck’s conclusions that Facebook’s implementation of what I or any other skilled computer scientist would consider routine programming functions are “interceptions” of message content using what she calls “code-based devices” (a term I have never heard before). Dr. Golbeck concludes that , is an “interception,” but she does not draw the same conclusion about any of the other objects that are generated when a message is sent. not unusual in object-oriented programming, and here, 9. Dr. Golbeck also claims that also constitute interceptions. However, processes performed by nearly all software systems to track error rates, resource usage or congestion, and security concerns, among other things. 10. Even if Dr. Golbeck’s characterization of these standard programming practices as “interceptions” were credited, an individual, message-by-message inquiry would be required to determine whether 3 APP. 1943 11. Similarly, to determine whether Facebook’s “Insights” feature (an interface for website owners to view data about engagement with their sites); aggregate, anonymous Plugin Counters (numbers that website owners can display with Facebook’s social plugins that reflect the level of engagement with those sites); aggregate, anonymous counters in the Graph API (publicly available counts that reflect the level of engagement with a given URL); and Recommendations and Activity Feeds (which displayed a list of pages for a given website that the viewer may be interested in seeing). However, determining whether i. The date the message was sent, 4 APP. 1944 v. 12. Dr. Golbeck cannot validly opine on the current operation of the messages product since she, like I, could have examined, and at most did examine, only Facebook source code operational until December 31, 2012 (per the agreement of the parties). Accordingly, while her report expresses conclusions about the current operation of Facebook software, I do not believe she has a factual basis for these conclusions since there is no way for her to have reliably determined the behavior of Facebook’s software for any date after December 31, 2012. Her attempt to interpret internal Facebook emails allegedly bearing on potential practices (most or all of which appear to be written long before the beginning of the Class Period) does not form a valid basis for these conclusions about the operation of the current source code (or source code from any time period). 13. Dr. Golbeck also provides “sample” code for a database query of her own design, which she claims would yield a list of the Facebook IDs of everyone whose actions had and she has stated that this would identify the members of Plaintiffs’ proposed class. However, her proposed query is both under- and over-inclusive in a number of ways (all of which I understand she has conceded). First, it will be under-inclusive in that it will not identify: iii. Senders and recipients whose accounts were deleted; 5 APP. 1945 Dr. Golbeck’s proposed query will also be over-inclusive in that it will include: vii. Senders whose messages did not contain URLs in their text; viii. ix. Senders and recipients outside the United States; x. Senders of messages outside the Class Period; and xi. Senders that were not subject to the challenged “uses.” Her proposed query also cannot identify senders: 14. As discussed below in further detail, 15. I disagree with Dr. Golbeck’s distinction between “memory” and “storage,” in which she claims that, when a 1 6 APP. 1946 , they are held in memory, not storage. I have never encountered such a distinction in my decades of experience as a computer scientist. Computer systems use different forms of electronic storage, including but not limited to CPU storage, CPU cache memories, random access memory (or RAM), and disk or flash memory; indeed, memory in computing is a form of storage. But even under Dr. Golbeck’s unique definition of storage (with which I do not agree), 16. Finally, I disagree with Dr. Golbeck’s conclusion that Facebook’s alleged interception, was not necessary for the messaging functionality on Facebook. First, while I do not offer an opinion on illegality as a legal conclusion, I note that Dr. Golbeck appears to use an incorrect inquiry for determining whether any interception was performed in the ordinary course of Facebook’s business. Dr. Golbeck assessed whether the alleged interception was “necessary.” However, I understand the Court has instead stated that the relevant inquiry is whether there exists any nexus between the alleged interception and Facebook’s ultimate business, which is to allow people to share information and connect with other people in a safe, efficient online space. Since my review of the source code and reliance on sworn testimony of Facebook’s engineers indicate that Facebook’s both necessary and also have a clear nexus to Facebook’s messaging service and its ultimate business. 7 APP. 1947 V. TECHNOLOGY OVERVIEW 17. The technology at issue in this matter relates to the messaging feature of the Facebook social networking platform. The specifics of the Facebook platform are described below in a subsequent section of this report. This section provides a general overview of the technology and defines various technical terms used throughout my report. 18. Facebook, like most services found on the Internet, utilizes a client-server architecture. In a client-server architecture, people on “client” devices, usually personal computers and mobile devices such as smart phones and tablets, interact with a user interface supported by software—generally referred to as “client software”—running on their client devices. More demanding computations, storage of larger amounts of data, and communication between different people are supported by server computers, which are larger, more powerful computers with large amounts of storage capacity. The software that the server computers run, generally referred to as “server software”, usually responds to requests from numerous client devices, generates the data to be provided to the clients (often specifying the format of the display of the data), interacts with database management systems to store and retrieve data, and, in many cases, communicates with other server computers. The terms “client” and “server” are used to refer either to the client and server software or to the client and server machines—or both. In this report, unless stated otherwise, I will use “client” and “server” to refer to the software and hardware together. For example, when I discuss a “Facebook server”, I am speaking of Facebook server software running on a Facebook server computer. 19. Clients and servers in many modern client-server systems use HTTP, the Hypertext Transport Protocol defined by the World Wide Web consortium (see http://www.w3.org/Consortium/) to communicate with each other, almost always over the Internet. Services provided by servers to clients using the HTTP protocol are usually referred to 8 APP. 1948 as “web-based” services. Clients request resources, such as documents (e.g. web pages, audio files, and videos) and services (for shopping, travel, etc.), by issuing HTTP requests. An HTTP request is directed to the proper server—and specifies the desired document or service on that server—using a uniform resource locator (URL). Examples of URLs include https://www.google.com/, http://www.ford.com/new-cars/, and https://en.wikipedia.org/wiki/Webserver_directory_index. 20. People on client devices can communicate with each other in numerous different ways, such as via electronic mail (email), video chat, texting, and messaging. In each of these media, the data being transmitted is generally sent from a client to a server, which then may forward the data to another server, and so on, until the data is sent from a final server to the receiving client (of course, in some instances, there may only be a single server involved). When the data arrives at a server, it is stored on that server at least temporarily until it is forwarded to the next server or to the receiving client. In many cases, a server only forwards the data to the receiving client when the receiving client requests the data. For example, in many email and messaging systems, the email or message data is stored in the recipient’s “inbox” on a server until the email or messaging software on the client requests the data. The process of storing transmitted data on a server and forwarding the data to the next server or to a client is known as “store-and-forward”. 21. In most email systems and some messaging systems, the text of a message that someone has typed can be augmented by an “attachment.” An attachment is additional data that is transported to the recipient along with the main text of the email or message, but is often not visible within the display of the text of the email or message. Attachments are often in a different format from the text of the email or message, such as when the text is in plain text or 9 APP. 1949 HTML format and the attachment is a document in PDF format, an image, or an audio or video file. In some cases, the attachment only becomes visible (or audible) when the sender or recipient clicks or taps on an icon or link displayed along with the message. In other cases—as in the Facebook messaging feature described below—the attachment may be displayed automatically when the text of the message is displayed. 22. In most web-based email and messaging systems, even when an email or message is forwarded to the client for display to the sender or recipient, the email or message (along with any attachment) remains in the “inbox” on the server. This way, emails or messages can be accessed by the senders and recipients at a later time or from a different client device and does not require a substantial amount of storage on the client devices. In such cases, the email or messaging service is said to be “hosted” on the server(s) supporting the service, because the server(s) provides the long-term storage for the emails and messages. VI. THE FACEBOOK SOCIAL NETWORKING SERVICE 23. Facebook is a free social networking service. The main purpose of the service, as stated in Facebook’s mission statement, is to give people the power to share and make the world “more open and connected.” When people join the service, they create a profile by providing Facebook with a variety of information such as Name, Age, Profile Picture, City, Education, and Work experience. As an example, below is an image of my profile on Facebook. 10 APP. 1950 24. As individuals continue to use the service, they may post additional information that they wish to share. Some of this information may be user-generated, such as photos, videos or posts, and some of it may be information from other sources, such as web articles that someone finds interesting. People who use Facebook can also define other people on Facebook as “friends,” and they can control who else on and off Facebook can see what they post (such as “friends,” “friends of friends,” the general public, and so on). These privacy settings can be configured individually by each person who uses Facebook. 25. In addition to posting and viewing information, people who use Facebook can interact with each other and with information in many different ways, for example: 11 APP. 1951 • Pages: Companies or businesses can create pages on Facebook, which enables them to communicate information to people who follow them. • Groups: People who use Facebook can create groups on Facebook around specific interests or affiliations, which enables communication between members of the group, whether they are Facebook friends or not. • Applications: Third-party developers can create applications that run on the Facebook platform; many of the most popular applications are games that people play with their friends on Facebook. 26. People who use Facebook to share what they are interested in can also use social plugins, which appear on third-party websites, to share these interests. Plugins like the “Share,” “Like,” and “Send” buttons let people seamlessly tell friends what has caught their attention, what is important to them, or what they enjoy, even when they are on third-party sites, so they can engage and connect with others on those topics, and so that they can receive other information tailored to their interests and preferences. This helps bring together what is otherwise a sprawling, disjointed network of activity across the Internet and allows people who use Facebook to have a richer, more meaningful connection to other people, ideas, and information. When someone is logged in to Facebook, Facebook can display personalized streams of information from her friends, such as life events, reviews, and comments, anywhere a site has incorporated Facebook plugins. Even when people who use Facebook are not logged in to Facebook, social plugins allow website owners to present information about aggregate engagement with different kinds of information, which can help people identify information that is popular and that they might find interesting. A list of the current Facebook social plugins can be found at https://developers.facebook.com/docs/plugins. 12 APP. 1952 27. While most content on Facebook is a form of “one-to-many” communication, Facebook also provides means for “one-to-one” or “one-to-few” communication. Initially, this was performed through a function called “inbox” which behaved similarly to e-mail, enabling people to send messages to other people directly. This changed over time, and ultimately evolved into “Messages,” which is Facebook’s integrated communications platform. It enables people who use Facebook to send messages directly to other people, or to groups of people. This platform can currently be accessed through the Facebook website or through its standalone messaging application (Messenger). In addition to sending text, people can send documents and pictures, among other things. If the recipient of the message is currently browsing the Facebook website, the message will appear onscreen and enable her to respond, which can lead to a conversation with messages being sent and received in real time. If the recipient is not online, the message will appear the next time the recipient accesses Facebook. This can lead to asynchronous communication similar to e-mail, where messages are sent and received by the client device at different times. Messages are stored on Facebook servers, which enables people who use Facebook to conduct conversations seamlessly on multiple devices, for example, by beginning a conversation on a PC, and continuing it on a smartphone. It also enables senders and recipients to view messages they have sent or received in the past. 28. For a message sent from the Facebook website that contains a URL, For example, if a sender types a URL for a webpage into a draft message, Facebook will sometimes generate a small preview of the webpage (referred to in this report as a “URL preview”), including both an image and some text from the web page. This process is done before a sender sends the message, giving the sender the option to remove the attachment if the 13 APP. 1953 sender wishes. Below is an image of a messaging conversation that I had with my wife (though this one was created for the purposes of this report). Two of the shown messages contain URL previews, and one does not. 29. As mentioned above, a URL preview is displayed and the corresponding URL . However, if the sender deletes the URL preview by clicking on an “x” in the corner of the displayed preview while the message is being composed, . The URL preview display for a message being drafted, along with the “x” to click on to remove the preview, is shown below. 14 APP. 1954 30. Similarly, if the sender decides to delete the text of the URL from the draft message, the URL preview remain (unless the sender deletes it). Below is a message to my wife in which I originally typed a URL, but then deleted the URL. The URL preview for that deleted URL remains, . Shown on the left is how the message, after being sent, appears in my inbox and on the right is the message as it appears in my wife’s inbox. This example shows that the URL gets sent with the message, even though the URL is not in the message itself. 15 APP. 1955 VII. THE FACEBOOK SOFTWARE/SOURCE CODE A. URL Previews 31. The Facebook source code that I examined in this matter, which was also available to Dr. Golbeck and was cited in her report, included code from September 2009 to December 2012 and was primarily written in two programming languages: JavaScript, and PHP. Both of these languages provide support for what is known to programmers as “object-oriented programming.” Although a detailed discussion of object-oriented programming is beyond the scope of this report, a core feature of all object-oriented languages is the creation of “objects,” which are data structures that both contain the data and specify the operations that can be applied to the data. A data structure is simply a way of aggregating distinct pieces of data so that they can be treated as a unit. For example, a data structure representing a personnel record may include fields for an employee’s name, social security number, department, office address, phone, and salary. If that data structure were created in an object-oriented language, the data structure would be called an “object” and, in addition, might specify the operations that can be performed on a personnel record, such as “contact the employee,” “adjust the salary of the employee,” “change the employee’s department,” etc. 32. I describe here the functionality of Facebook messaging that is relevant to this matter, based on the source code that I examined and other documents provided to me (including deposition testimony, witness declarations, interrogatory responses, etc.). However, as discussed in subsequent sections of this report, I note that Facebook is a huge system comprising tens of millions of lines of code, and handling an average of over supporting over 1.5 billion people, requests each day. (See January 14, 2016 Declaration 16 APP. 1956 of Alex Himel (“January 14 Himel Decl.”) ¶ 28 n.3.) In such a huge system with that level of demand, there are bound to be software errors that lead to inconsistencies in the behavior of the system and . Thus, my description below of the functionality of the Facebook code, particularly the code supporting Facebook messaging, reflects how the system was designed to operate generally—not necessarily how it actually operated at any given moment.2 33. Beginning in or around August 2010, Facebook 2 I understand that certain Facebook engineers have submitted declarations in connection with this matter that explain and discuss variation among the practices and functionality challenged by Plaintiffs. Much of that variation is also discussed below. 17 APP. 1957 Web scraping is a normal technique used to extract data from websites for various reasons. Declaration of Alex Himel being submitted simultaneously in support of Facebook’s Opposition to Plaintiffs’ Motion for Certification. (See id. ¶¶ 13-15; id. at Ex. B (Facebook’s Supplemental Responses and Objections to Plaintiffs’ First Set of Interrogatories (“Supp. Resp. to First Interrog.”)) at 17-18.) 34. On the Facebook server, 18 APP. 1958 35. Below is an example of preview images being displayed after the message was sent (see also paragraph 29 for an image of the preview being displayed before being sent). 19 APP. 1959 36. 37. I understand from Facebook’s interrogatory responses that 20 APP. 1960 (See Supp. Resp. to First Interrog. at 17.) 38. The use of has many benefits. (See January 14 Himel Decl. ¶ 14.) 39. In the case of Facebook messaging, (See January 14 Himel Decl. ¶¶ 15-16; Supp. Resp. to First Interrog. at 18.) 21 APP. 1961 40. When the sender had completed typing the message, she could send the message by clicking on or tapping a “Send” button or hitting the enter key. in the inboxes of the sender and recipient so that they could view the message text as well as the URL attachment. (January 14 Himel Decl. ¶¶ 16-18; Supp. Resp. to First Interrog. at 18-19; January 14, 2016 Declaration of Michael Adkins (“Adkins Decl.”) ¶¶ 10-14.) (See January 14 Himel Decl. at Ex. A (Facebook’s Second Supplemental Responses and Objections to Plaintiffs’ Narrowed Second Set of Interrogatories (“Sec. Supp. Resp. to Sec. Interrog.”)) at 18.) 41. 22 APP. 1962 (See also January 14 Himel Decl. ¶¶ 16-18.) 42. 23 APP. 1963 B. 43. Like other complex websites, Facebook must store the information shared on its site, at the very least in order to display that information when people use features that require it (e.g., viewing your messages inbox or a social plugin counter). Complex websites also log activity on their sites (with varying frequency and degree of detail) for other purposes, including maintaining site integrity and operability and detecting and deterring abuse. 44. 45. 24 APP. 1964 I understand 25 APP. 1965 from the Facebook engineers that it was in fact changed over time. 46. see also January 14 Himel Decl. ¶ 54.) VIII. RESPONSE TO THE GOLBECK REPORT 47. I have been asked by counsel to respond to certain portions of the Golbeck report as augmented by Dr. Golbeck’s deposition testimony. In this section, I provide my responses as well as the bases for my disagreements with Dr. Golbeck. I understand that the opinions I express in this report will be considered by the Court for class certification purposes; thus, it is not my intent to exhaustively respond to Dr. Golbeck with respect to topics that are unrelated to class certification. I reserve the right to respond to the Golbeck Report on such topics in the future if asked to do so. A. The Alleged “Interceptions” 48. Dr. Golbeck refers to several routine computer programming functions as “interceptions.” I offer no opinion at this time on whether the practices Dr. Golbeck discusses could be deemed “interceptions” for purposes of wiretapping law (though it would seem odd to 26 APP. 1966 me if they could be). As discussed below, however, there was considerable variation in these practices and in my opinion it would be necessary to conduct a message-by-message analysis to determine whether the purported “interceptions” occurred for any given message. 1. 49. Dr. Golbeck characterizes as an “interception” or “redirection” the creation of a data structure, ) As someone who has been working and teaching in the field of computer science for more than 30 years, I disagree with these conclusions and the use of this terminology. As discussed above, the creation of “objects” is a standard part of object-oriented programming, and there is nothing unusual about If Dr. Golbeck’s characterization of an “interception” or “redirection” based on the creation of data structures (objects) were correct, there would be no way for the provider of a service involving communication between people to know when it was or was not performing an “interception.”3 50. At her deposition, Dr. Golbeck attempted to (Golbeck Deposition Transcript (“Golbeck Dep.”) 3 In her report, Dr. Golbeck says, 27 APP. 1967 51. At her deposition, Dr. Golbeck also stated that • collecting statistics about the geographical locations of senders and recipients to improve performance and reduce failures, e.g. by adding computing and 4 28 APP. 1968 communication resources to best reduce network congestion and balance the computing load on servers; • saving web page images referred to in messages so that the web pages do not have to be repeatedly accessed at a cost of network congestion and server load; and • for security by analyzing and saving patterns in the message content and traffic patterns to detect malevolent communications. 52. To the extent that Dr. Golbeck is characterizing the creation of an object (as opposed to other types of data structures) as an “interception” or “redirection,” the creation of objects is a fundamental operation in all programs written in commonly used object-oriented languages, such as Java, C++, PHP, and JavaScript— 53. Indeed, during her deposition, Dr. Golbeck could not identify 54. Dr. Golbeck also states that she considers the it would strike one of skill in the 29 APP. 1969 field of computer science as odd to characterize 2. 55. Dr. Golbeck also opines that Facebook’s logging is a process performed by virtually all software systems and occurs for many reasons, including the recording of errors, interactions, resource usage, security issues, etc. If simply logging various aspects of person-generated data as part of providing a service to people can be considered an “interception,” service providers would not be able to determine which logging might be considered an interception and which might not be. 56. Dr. Golbeck’s report cites to a source code file after that date. (Id.) 57. Dr. Golbeck’s report also points to 30 APP. 1970 3. 58. I understand that Plaintiffs have previously referred to therefore it cannot even be accused of being an interception. 4. 59. Code-Based “Devices” Dr. Golbeck’s Report also refers to portions of Facebook code as “code-based devices” or simply “devices.” (Golbeck Report ¶¶ 17.b., 55). According to Dr. Golbeck, the above-referenced “interceptions” are accomplished through the use of these “code-based devices.” In my 33 years as a computer scientist, I have never heard the term “device” used to refer to software. Within the field, “device” is used to refer to hardware—and I note that Dr. Golbeck does not identify any hardware device as performing the interception such that the device (such as a Facebook server) is not used in the ordinary course of Facebook’s business. At her deposition, Dr. Golbeck admitted she had never used the term “code-based device.” (Golbeck Dep. 206:21-207:2): Q. Have you ever used the term “code-based devices” in your academic career? A. I don’t think so. 31 APP. 1971 Q. Why not? A. This is not the kind of thing I study. I don’t write about code at all, I don’t think, yeah. As someone whose publications have all been about code and programming, I can confirm that “code-based device” is not a term of art used to refer to code alone.5 B. Variability in the Purported “Interceptions” 60. While I find Dr. Golbeck’s characterizations of routine and unremarkable computer science practices as “interceptions” and “redirections” to be unusual, I do not offer any opinion at this time regarding whether these practices could be deemed to constitute illegal wiretapping. However, even if Dr. Golbeck were correct in her characterization of routine programming practices, such as , as “interceptions,” determining whether such alleged interceptions actually occurred would require a message-bymessage analysis, in the following sense: • • 5 Additionally, I performed a web search for “code-based device” and, in all the references I found, the “device” is a hardware device that executed code. 32 APP. 1972 • (See supra paragraph 30, 39; January 14 Himel Decl. ¶ 15.) • The Facebook code— 33 APP. 1973 Adkins Decl. ¶¶ 8-12, 1623.) • As stated in Facebook’s interrogatory responses (see Supp. Resp. to First Interrog. at 35; Sec. Supp. Resp. to Sec. Interrog. at 16) and the testimony of Facebook witnesses (see January 14 Himel Decl. ¶¶ 28, 40; September 25, 2015 Deposition of Ray He 77:10-78:23, 156:15-157:1), 34 APP. 1974 • The same variability exists for Facebook’s Graph API. Graph API count would have been incremented. Graph API. (See January 14 Himel Decl. ¶¶ 27-29, 69, 73-78.) or Graph API. (Id. ¶ ) 35 APP. 1975 • (Id. ¶¶ 46-49.) • . (See supra ¶¶ 55, 57; January 14 Himel Decl. ¶¶ 52-57.) • Moreover, as stated above, Dr. Golbeck has not examined any Facebook source code later than December 31, 2012, so she cannot tell from the Facebook code she examined 36 APP. 1976 61. In summary, because of the various scenarios under which an C. Variability in the Alleged “Uses” of “Intercepted” Data 62. For the reasons discussed in the Facebook fact declarations I have reviewed, the same variability that exists for the “interception” issue also exists for the “use” issue. For a variety of reasons, including changes of practices over time, it would be necessary to conduct a message-by-message inquiry to determine whether and even then such a determination likely would not be possible. Further, I understand Dr. Golbeck acknowledged at her deposition that, other than one (Golbeck Dep. 310:22-314:22.) 37 APP. 1977 63. Examples of the variability inherent in any inquiry concerning each of the alleged “uses” include: • Insights, Related APIs, and Real-Time Analytics: I understand that visible to domain owners through Insights until October 11, 2012. the Insights counter at all. the owner of that domain might never have authenticated ownership and accessed Insights RealTime Analytics – a specialized system designed to provide Insights data even more rapidly. Insights counter. (See January 14 Himel Decl. ¶¶ 58-65.) • Plugin Counts: The between August 16, 2010 and December 19, 2012. (See id. ¶¶ 37-43.) First, 38 APP. 1978 (See id. ) • & Graph API: API queries would have reflected Graph API query. Graph API query. Graph API, 39 APP. 1979 . (See id. ¶¶ 7379.) • Recommendations and Activity Feeds: There likewise was considerable variability over time, during certain periods, For most of the proposed class period (from December 2011 to July 9, 2014) Recommendations and Activity Feeds, at most, both the Recommendations and Activity Feeds were discontinued altogether on June 23, 2015. (See Fechete Decl. ¶¶ 23-34, 43-45.) 40 APP. 1980 D. Continuing Conduct 64. Dr. Golbeck and I had access to the same Facebook source code produced in this matter, namely source code from the period of September 2009 to December 2012. However, the Golbeck report opines on the current operation of the Facebook software—without ever having reviewed current Facebook source code. One of skill in computer science would know there is no way to reliably determine the behavior of software—particularly when it comes to internal operations that are not visible to the sender or recipient, as is the case with the accused functionality—without examining source code. Thus, I do not believe Dr. Golbeck has a factual basis for the conclusions she reaches in Section V of the Golbeck report, entitled “ Facebook’s Conduct Continues to the Present” (Golbeck Report ¶¶ 94-97). 65. I also note that, in opining on several of Facebook’s practices, Dr. Golbeck relies not on source code but on e-mails about potential practices. (See, e.g., id. ¶¶ 46-49, 52-53, 6671, 76-78, 86-93.) This is not a scientifically reliable manner on which to base conclusions about the operation of source code. E. Lack of Ascertainability of Class Members 66. In her report, Dr. Golbeck says that “to retrieve a list of class members, the Code process should be relatively straightforward.” (Id. ¶ 103.) In the next two paragraphs of her report, she provides “example” code that she contends would return a list of “Facebook user IDs of everyone ” and, in her deposition, she said that such a list would identify the class members. (Golbeck Dep. 331:2-8.) 67. That is incorrect. This query would return a list of people that is both under- and over-inclusive of the proposed class. In her deposition, Dr. Golbeck conceded each of these flaws in her proposed query: 41 APP. 1981 68. This query will be under-inclusive in that it will not reflect recipients of messages 69. This query will be under-inclusive in that it will not identify 70. This query will be under-inclusive in that it will not identify senders and recipients whose accounts were deleted. (Id. at 335:25-336:10.) 71. This query will be under-inclusive in that it will not identify 72. This query will be under-inclusive in that it will not identify 73. This query will be under-inclusive in that it will not identify 74. This query will be over-inclusive in that it will include senders whose messages did not contain URLs in their text. (Id. at 339:2-15.) 75. This query will be over-inclusive in that it will include 76. This query will be over-inclusive in that it will include senders and recipients outside the United States. (Golbeck Dep. 340:22-341:1.) 77. This query will be over-inclusive in that it will include senders of messages outside the Class Period. (Id. at 341:2-7.) 6 In her deposition, Dr. Golbeck proposed that this flaw could be remedied by looking at each message to ascertain who the recipient was, a woefully infeasible methodology if done manually, or trying to draft code to do the same, but does not propose any actual methodology for doing so. She assumes this is feasible. (Golbeck Dep. 334:3-335:18.) 42 APP. 1982 78. Moreover, Dr. Golbeck’s query is overbroad in that it will identify senders that were not subject to the challenged “uses.” In her deposition, Dr. Golbeck conceded each of these flaws in her proposed query and said that identifying those that were subject to the challenged “uses” would be “case-specific:” 79. This query cannot identify senders 80. This query cannot identify 81. This query cannot identify 82. This query cannot identify 83. This query cannot identify 84. This query cannot identify 85. This query cannot identify 86. This query cannot identify 87. Finally, I understand from Facebook engineers that this query would not correctly writing and executing even a corrected query would 43 APP. 1983 be extremely burdensome and resource-intensive, if it were even possible, given the nature and breadth of Facebook’s databases. (See January 14 Himel Decl. ¶ 8.) F. Variability in 88. As discussed in detail above, the (See January 14 Himel Decl. ¶¶ 20-22, 27-30, 37-43, 46-50, 55-57, 62-65, 73-79; Fechete Decl. ¶¶ 20-38, 43-44; Adkins Decl. ¶¶ 8-12, 16-23.) 89. For all the reasons given above, it is my opinion that the Facebook messaging software did not treat the people identified by Dr. Golbeck as being a “class” substantially the same. IX. COMPUTER STORAGE A. Computer Storage Technology 90. I have been asked to explain the meaning of “storage” in the context of computer science. Simply put, “storage” refers to the electronic components in a computer system that hold (store) data so that the data can be (1) processed by the central processing unit (CPU), e.g. used for arithmetic, image processing, text formatting, etc., (2) held temporarily until the data is 44 APP. 1984 sent over a network or is sent to a display device, printer or other output device, or (3) kept for a longer period of time (perhaps indefinitely) so that it can be accessed in the future. The amount of data stored on a computer or other computing device (e.g. smartphone or tablet) is measured in terms of bytes, where a single byte comprises eight bits (each bit being a zero or a 1), which was the amount of data historically required to represent a single character of text (e.g. letter, digit, punctuation mark). On modern computing devices, storage capacity is normally multiples of megabytes (millions of bytes), gigabytes (billions of bytes), or terabytes (trillions of bytes). Naturally, mobile devices such as smartphones and tablets generally have less storage than personal computers, which, in turn, have less storage than large servers. 91. Computer systems have a number of different forms of electronic storage, ranging from small, fast, and expensive (on a per-byte basis) to large, slow, and inexpensive. Below is a diagram that I created to illustrate the so-called memory hierarchy, i.e. the different types of storage found on computer systems, including registers (very fast, very small storage within a CPU), cache memories (small, fast memories, often within the CPU), RAM (random access memory, aka “main memory”), and disk drive or flash memory.7 7 Historically, there has been another level at the bottom of the hierarchy, archival storage – generally consisting of backup tapes or optical media (e.g. DVD-ROMs) – that is not shown. 45 APP. 1985 As shown in the diagram, the storage types near the top of the diagram are small and fast, and the storage types near the bottom are larger and slower. 92. Storage can also be divided into two categories, “volatile” and “non-volatile.” The term “volatile” means that the storage only retains the data while power is applied, so if the computer is turned off, the data is lost. Registers, cache memories, and RAM are examples of volatile electronic storage. The term “non-volatile” means that data is preserved in the storage even when no power is applied; thus, non-volatile electronic storage is often used for storing data for longer periods of time than volatile storage. Examples of non-volatile storage include disk storage, flash memory, magnetic tapes and optical media (CD-ROMs, etc.). 46 APP. 1986 B. The Incorrect Distinction Between “Memory” and “Storage” 93. Dr. Golbeck appears to distinguish “memory” from “storage.” Any information in a computer system is in memory when it is not in storage; otherwise, it could not be in the computer at all. (Golbeck Report ¶117). 94. Dr. Golbeck also testified about the distinction between “memory” and “storage:” Q. What’s the difference between memory and temporary storage? A. Storage is -- so memory allows you to operate on some data if it’s in memory. Storage, temporary or permanent, is a place where information is stored that it can’t be operated on. (Golbeck Dep. 287:3-9.) 95. Dr. Golbeck’s characterization of memory and storage—namely that memory is not storage—is incorrect for the following reasons: • This is not an accepted characterization—in fact, I have never encountered this distinction between memory and storage before now. Dr. Golbeck seems to be referring to the fact that the instructions of a CPU (such as those to perform arithmetic or logical operations) can directly access some forms of storage, e.g., registers, cache, and RAM, but can only access other forms of storage, e.g., disk drives and flash memory, indirectly by first loading the data from disk or flash memory into RAM. Dr. Golbeck’s distinction between memory and storage has nothing to do with whether data is stored or not, only how the data is accessed. • As evidence that “memory” in the computing field is a form of “storage,” the Microsoft Computer Dictionary defines memory as follows (emphasis added): 47 APP. 1987 memory n. A device where information can be stored and retrieved. In the most general sense, memory can refer to external storage such as disk drives or tape drives; in common usage, it refers only to a computer’s main memory, the fast semiconductor storage (RAM) directly connected to the processor. See also core, EEPROM, EPROM, flash memory, PROM, RAM, ROM. Compare bubble memory, mass storage. (Microsoft Computer Dictionary, 5th Ed., 2002 p. 333) As the dictionary states, “memory,” used in its general sense, refers to all types of storage and, in its common narrower sense, “memory” is used to refer to RAM, which is fast semiconductor storage.8 In either case, of course, memory is a form of storage. 96. For these reasons, and as discussed extensively above, message data is in storage as the term is used in computer science. 97. I understand that the Electronic Communications Privacy Act (18 U.S. Code § 2510) specifically defines “electronic storage” to include “any temporary, intermediate storage of a wire or electronic communication incidental to the electronic transmission thereof,” and that communications in electronic storage are governed not by the Wiretap Act (18 U.S. Code § 2511) but by another law (the Stored Communications Act, 18 U.S. Code § 2701) not being asserted in this case. the “temporary, intermediate storage” defined by the Act to be “electronic storage.” 98. As a factual matter, Dr. Golbeck is incorrect when she states that the – even given Dr. 8 More recently the common use of “memory” is expanded to include “flash memory”, which is a slower and cheaper form of semiconductor storage than RAM and has replaced disk drives in many computing devices. 48 APP. 1988 Golbeck’s definition of “storage” (which I disagree with). Upon reaching , the data would be in “storage” according to Dr. Golbeck’s definition. X. ORDINARY COURSE OF BUSINESS 99. Dr. Golbeck’s report also discusses whether Facebook’s alleged “interception” was “necessary for Facebook to deliver private messages” (Golbeck Report ¶ 17.b.) and ultimately “conclude[s] that the interception, is not necessary for the functionality of message sharing in Facebook.” (Id. at ¶ 109.) However, my understanding is that whether or not the alleged interception of message content was “necessary” is not relevant to the “ordinary course of business” inquiry. 100. Rather, for purposes of assessing whether the “ordinary course of business” exemption to the Wiretap Act should apply, I understand that the Court has stated that it must determine whether the interception is “related or connected to [the] electronic communication provider’s service, even if it does not actually facilitate the service…[and whether there is] some nexus between the need to engage in the alleged interception and the subscriber’s ultimate business, that is, the ability to provide the underlying service or good.” (Order on Mot. to Dismiss (Dkt. 43) 11-12.) Accordingly, Dr. Golbeck’s test for assessing whether Facebook’s alleged “interceptions” fall within the “ordinary course of business” exemption appears to be inconsistent with the Court’s order, and I think her conclusions are irrelevant. Instead, Dr. Golbeck should have inquired whether there exists some nexus between the alleged 49 APP. 1989 “interceptions” and Facebook’s ultimate business, or its ability to provide its underlying service. Of course, Facebook’s underlying service is not merely to provide a messaging product but to provide a massive social network comprising various features allowing people to share information and ideas and to engage and connect with other people in a safe, efficient online environment. Based on my review of the source code, I believe any alleged “interception” (if indeed, one exists, which I do not believe it does) more than qualifies under the “nexus” test set out by the Court, since it is related to both the messaging feature as well as other features that make up the Facebook service. 101. First, as discussed above, my review of the source code indicates that URL share objects (the creation and storage of which Plaintiffs claim constitutes an illegal interception) are inboxes. This contradicts Dr. Golbeck’s assumption that share object creation must not be necessary for sharing URLs in messages because Facebook concedes that share objects are not always created. (Golbeck Report ¶ 110.) Indeed, if no share object is created for a URL sent in a message (for any of the reasons explained above), the recipient will not be able to see the URL 102. Second, 50 APP. 1990 103. Third, 104. Finally, by providing data points for internal research and site maintenance, data points for site integrity analysis, and, in the case of the Insights system, contributing to measures of engagement displayed with Facebook’s social plugins and other features as part of its social platform extending to third-party websites, which help users identify information they may be interested in viewing and sharing. XI. RESERVATION OF RIGHTS 105. I reserve the right to supplement or amend my opinions in response to opinions expressed by Plaintiffs’ experts, or in light of any additional evidence, testimony, discovery or other information that may be provided to me after the date of this report. In addition, I reserve the right to consider and testify about issues that may be raised by Plaintiffs’ fact witnesses and 51 APP. 1991 experts at trial. I also reserve the right to modify or to supplement my opinions as a result of ongoing expert discovery or testimony at trial. Dated: January 14, 2016 DR. BENJAMIN GOLDBERG 52 APP. 1992 EXHIBIT BBB APP. 1993 Curriculum Vitae BENJAMIN F. GOLDBERG Courant Institute of Mathematical Sciences Department of Computer Science New York University 251 Mercer Street New York, New York 10012 Phone: (212) 998-3495 Fax: (212) 995-4121 Email: goldberg@cs.nyu.edu http://cs.nyu.edu/goldberg Personal Born January 31, 1961, Las Cruces, New Mexico. U.S. Citizen. Education Ph.D. in Computer Science, Yale University, 1988. Dissertation: "Multiprocessor Execution of Functional Programs." M.S. and M.Phil in Computer Science, Yale University, 1984. B.A. with Highest Honors in Mathematical Sciences, Williams College, Cum Laude, Phi Beta Kappa, Sigma Xi, June 1982. Honors Thesis: "Theory and Implementation of an Automatic Program Verifier." Employment Associate Professor (Tenured), Courant Institute of Mathematical Sciences, Department of Computer Science, New York University. September 1994 – Present. Invited Professor, Ecole Normale Supérieur, Paris, France. June 2007 – July 2007 and June 2003 – July 2003. Director of Graduate Studies (for the MS programs), Department of Computer Science, New York University. September 2009 – August 2012 and September 2014 – present. Director of Undergraduate Studies, Department of Computer Science, New York University. September 1995 – August 1998 and September 2003 – August 2006. Visiting Professor, Institute National de Recherche en Informatique et en Automatique (INRIA), Rocquencourt, France. September 1994 – August 1995. Assistant Professor, Courant Institute of Mathematical Sciences, Department of Computer Science, New York University. September 1987 - August 1994. APP. 1994 Expert Testimony at Trial or Deposition in the Past Four Years Retained by Jones Day on behalf of Kyocera in the matter of Wi-LAN v. Kyocera, February 2015 – present. Retained by Kaye Scholer on behalf of Google in the matter of ContentGuard v. Google (Covered Business Method patent review before the USPTO). August 2014-September 2015. Retained by Orrick on behalf of EMC in the matter of Oasis v. EMC et al., June 2014 – September 2015. Retained by Fulbright & Jaworski on behalf of Qualcomm in the matter of Certain Consumer Electronics and Display Devices with Graphics Processing and Graphics Processing Units Therein (NVIDIA v. Qualcomm). International Trade Commission, December 2014 – June 2015. Retained by Orrick on behalf of EMC and VMware in the matter of Clouding v. EMC et al. (Inter Partes Review before the USPTO), June 2014 – July 2015. Retained by Quinn Emanuel and Perkins Coie on behalf of Samsung, Google, and HTC in the matter of Smartflash v. Samsung et al. April 2014 – present. Retained by Kenyon & Kenyon on behalf of Advanced Ground Information Systems (AGIS) in the matter of AGIS v. Life360 (Patent Litigation). August 2014 – November 2014. Retained by Milbank Tweed on behalf of Apple in the matter of Wi-LAN v. Apple, February 2014 – September 2014. Retained by Boies Schiller on behalf of InfoSpan in the matter of InfoSpan v. Emirates NBD Bank, September 2013 – present. Retained by Boies Schiller on behalf of Apple in the matter of Apple v. Personal Web Technologies (Inter Partes Review before the PTO), August 2013 – July 2014. Retained by Cooley on behalf of Apple in the matter of GBT v. Apple, October 2013 – June 2014. Retained by Quinn Emanuel on behalf of Toshiba in the matter of Certain Digital Media Devices, Including Televisions, Blu-Ray Disc Players, Home Theater Systems, Tablets and Mobile Phones, Components Thereof and Associated Software (Black Hills Media v. Toshiba et al). International Trade Commission. September 2013 – February 2014. Retained by Wilson Sonsini on behalf of Sasken in the matter of Sasken v. Spreadtrum. American Arbitration Association. July 2013 – January 2014. Retained by Sheppard Mullin on behalf of HTC and Apple in the matter of Wi-LAN v. HTC et al. June 2013 – October 2013. Retained by Bingham McCutchen on behalf of Oracle America in the matter of Oracle America v. Service Key et al. March 2013 – September 2013. Retained by Latham & Watkins on behalf of InterDigital Communications, Inc. in the matter of Certain Wireless Devices with 3G Capabilities and Components Thereof (InterDigital v. Huawei et al). International Trade Commission, December 2011 – February 2013. Retained by Ballard Spahr on behalf of Go Daddy in the matter of WhitServe v. Go Daddy. August 2011 – June 2013. 2 APP. 1995 Retained by Kenyon & Kenyon on behalf of Barnes & Noble in the matter of Deep9 v. Barnes & Noble. February 2012 – August 2012. Retained by Gibson Dunn & Crutcher on behalf of Lawson Software in the matter of ePlus v Lawson Software. October 2011 – April 2013. Retained by Kenyon & Kenyon on behalf of Barnes & Noble in the matter of Certain Handheld Electronic Computing Devices, Related Software, and Components Thereof (Microsoft v. Barnes & Noble), International Trade Commission. August 2011 – February 2012. Retained by Morrison & Foerster on behalf of Oracle America in the matter of Oracle America v. Google. August 2011 – May 2012. Retained by Jones Day on behalf of Nielsen in the matter of comScore v. Nielsen et al. May 2011 – November 2011. Teaching Awards New York University "Golden Dozen" Award, 1992. Awarded to twelve faculty members in the entire College of Arts and Sciences for excellence in teaching. Professional Activities Editorial Board, The Computer Journal. Published by Oxford University Press on behalf of the British Computer Society. 2007 – 2009. Program Committee member: 2007 Symposium on Principles of Programming Languages (POPL) External Review Committee member: 2013 Symposium on Principles of Programming Languages (POPL) Program Committee member: 2001 Workshop on Practical Applications of Declarative Languages (PADL'01), ACM SIGPLAN'95 Conference on Programming Language Design and Implementation, 1995 ACM SIGPLAN Symposium on Partial Evaluation and Semantics-Based Program Manipulation (PEPM '95), 1995 International Workshop on Memory Management (IWMM'95), ACM SIGPLAN'93 Conference on Programming Language Design and Implementation. Review Panel Member, National Science Foundation, January 1998 and January 2000. Official Collaborator, Los Alamos National Laboratory, Computing and Communications Division. Member, Association for Computing Machinery and ACM Special Interest Group on Programming Languages (SIGPLAN). Referee for: ACM TOPLAS, IEEE Computer, International Journal of Parallel Programming, Software Practice and Experience, Computational Intelligence, ACM TOCS, ACM Computing Surveys, etc. Referee for a variety of ACM and IEEE conferences. Journal Papers "Translation and Run Time Validation of Optimized Code'', with L. Zuck, A. Pnueli, C. Barrett, Y. Fang, and Y. Hu, Formal Methods in System Design. 27(3): 335-360, November 2005 3 APP. 1996 "VOC: A Methodology for Translation Validaton of Optimizing Compilers'', with L. Zuck, A. Pnueli, and Y. Fang. Journal of Universal Computer Science, March 2003. "A Syntactic Method for Finding Least Fixed Points of Higher-Order Functions over Finite Domains", with Tyng-Ruey Chuang. Journal of Functional Programming. Vol. 7, No. 4, pp. 357394, July 1997 "Functional Programming Languages", in ACM 50th Anniversary Issue of Computing Surveys. March 1996. "Order-of-demand analysis for lazy languages", with Young-Gil Park. Information Processing Letters, Vol. 55, 1995, pp. 343-348. "Static Analysis for Optimizing Reference Counting", with Young-Gil Park. Information Processing Letters, Vol. 55, 1995, pp. 229-234. "Multiprocessor Execution of Functional Programs", International Journal of Parallel Programming, Vol. 17, No. 5, October 1988. "Distributed Execution of Functional Programs Using Serial Combinators," with P. Hudak, IEEE Transactions on Computers, Vol. C-34, No. 10, October 1985, pp. 881-891. Books or Chapters in Books "Functional Programming Languages", in Handbook of Computer Science and Engineering, CRC Press, Inc. 1996. Publications in Proceedings of Refereed Symposia “Translation Validation of Loop Optimizations and Software Pipelining in the TVOC Framework”. Proceedings of the 17th International Static Analysis Symposium (SAS 2010), September 2010. “TVOC: A translation validator for optimizing compilers”, with C. Barrett, Y. Fang, Y. Hu, A.Pnueli, and L. Zuck. Proceedings of the 17th International Conference on Computer Aided Verification (CAV '05), July 2005. "Theory and algorithms for the generation and validation of speculative loop optimizations", with Y. Hu and C. Barrett. Proceedings of the 2nd IEEE International Conference on Software Engineering and Formal Methods (SEFM), September 2004. "Into the Loops: Practical Issues in Translation Validation for Optimizing Compilers", with L. Zuck and C. Barrett. Proceedings of the Third International Workshop on Compiler Optimization meets Compiler Verification (COCV). April 2004. "Run-Time Validation of Speculative Optimizations using CVC", with C. Barrett and L. Zuck. Proceedings of the Workshop on Runtime Verification 2003, ENTCS 89(2). July 2003. "Software Bubbles: Using Predication to Compensate for Aliasing in Software Pipelines'', with E. Chapman, C. Huneycutt, and K. Palem. Proceedings of the PACT-2002 International Conference on Parallel Architectures and Compilation Techniques, September 2002. "Translation and Run-Time Validation of Optimized code'', with L. Zuck, A. Pnueli, Y. Fang, and Y. Hu. Proceedings of the Workshop on Runtime Verification 2002, ENTCS 70(4). July 2002. 4 APP. 1997 "VOC: A Translation Validator for Optimizing Compilers''. Proceedings of the Workshop on Compiler Optimization Meets Compiler Verification (COCV) 2002, ENTCS 65(2). April 2002. "Formal Models of Distributed Memory Management", with Cristian Ungureanu. Proceedings of the ACM International Conference on Functional Programming, June 1997. "Partial Evaluation of Concurrent Programs", with Mihnea Marinescu. Proceedings of the ACM Symposium on Partial Evaluation and Program Manipulation, June 1997. "Real-Time Deques, Multihead Turing Machines, and Purely Functional Programming", with T-R. Chuang. Proceedings of the 1993 ACM Conference on Functional Programming Languages and Computer Architecture, June 1993. "Polymorphic Type Reconstruction for Garbage Collection without Tags", with M. Gloger. Proceedings of the 1992 ACM Conference on LISP and Functional Programming, June 1992. "A Syntactic Approach to Fixed Point Computation on Finite Domains", with T.R. Chuang. Proceedings of the 1992 ACM Conference on LISP and Functional Programming, June 1992. "Escape Analysis on Lists", with Y.G. Park. Proceedings of the 1992 ACM SIGPLAN Conference on Programming Language Design and Implementation, June 1992. "Incremental Garbage Collection without Tags", Proceedings of the 1992 European Symposium on Programming, February 1992. "Reference Escape Analysis: Optimizing Reference Counting based on the Lifetime of References", with Y.G. Park. Proceedings of the 1991 ACM/IFIP Conference on Partial Evaluation and Program Manipulation, June 1991. "Tag-Free Garbage Collection for Strongly Typed Programming Languages", Proceedings of the ACM SIGPLAN'91 Conference on Programming Language Design and Implementation, June 1991. "Higher Order Escape Analysis: Optimizing Stack Allocation in Functional Program Implementations", Proceedings of the 1990 European Symposium on Programming, May 1990. Springer-Verlag LNCS 432, pp. 152-160. "Generational Reference Counting: A Reduced-Communication Distributed Storage Reclamation Scheme", Proceedings of the SIGPLAN'89 Conference on Programming Language Design and Implementation, June 1989. “A Reduced-Communication Storage Reclamation Scheme for Distributed Memory Multiprocessors", Proceedings of the Fourth Conference on Hypercubes, Concurrent Computers, and Applications, January 1989. "Buckwheat: Graph Reduction on a Shared Memory Multiprocessor", Proceedings of the 1988 ACM Symposium on Lisp and Functional Programming, July 1988, pp. 40-51. "Executing Functional Programs on a Hypercube Multiprocessor", Proceedings of the Third Conference on Hypercube Concurrent Computers and Applications, January 1988. "Detecting Sharing of Partial Applications in Functional Programs", Proceedings of the Conference on Functional Programming Languages and Computer Architecture, September 1987. Published in the Springer-Verlag Lecture Notes in Computer Science, Vol. 274, pp. 408-425. 5 APP. 1998 "Serial Combinators: "Optimal" Grains of Parallelism", with P. Hudak, Proceedings of the IFIP Conference on Functional Programming Languages and Computer Architecture, September 1985. Published in the Springer-Verlag Lecture Notes in Computer Science, Vol. 201, pp. 382-389. "Experiments in Diffused Combinator Reduction," with P. Hudak, Proceedings of the ACM Symposium on Lisp and Functional Programming, August 1984, pp. 167-176. Keynote Addresses, Invited Talks and Tutorials Keynote Address, "Software Pipelining and Loop Optimizations in the Presence of Memory Aliasing'', 8th Workshop on Compiler Techniques for High Performance Computing, Hualien, Taiwan, March 2002. Invited Talk, ''Translation Validation of Loop Optimizations'', Ecole Normale Supérieur, Paris. July 2003. Invited tutorial, ''The Trimaran Compiler Research Infrastructure'', given at at the following conferences: • IEEE Symposium on Parallel Architectures and Compiler Techniques (PACT'98), Paris, October 1998. • IEEE Symposium on Microarchitecture (MICRO-31), Dallas, December 1998. • 1999 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'99), Atlanta, June 1999. Tutorial, ''Functional Programming'', 1994 ACM SIGPLAN Conference on Programming Language Design and Implementation (PLDI'94). Orlando, June 1994. Research Grants and Contracts “Property-Based Development of reactive and Embedded Systems”, with A. Pnueli and L. Zuck. National Science Foundation, August 2007 – May 2009. “PTV: Translation Validation in the Phoenix Compiler Framework”, with A. Pnueli (coordinated proposal with L. Zuck of U. Illinois-Chicago). Microsoft, April 2006. "A Methodology for Establishing the Dependability and Security of Telecommunication Protocols", with A. Pnueli and L. Zuck. Office of Naval Research, July 2003 – June 2005. "Towards a Seamless Process for the Development of Embedded Systems'', with A. Pnueli and L. Zuck. National Science Foundation, September 2002 - August 2005. ''Translation Validation of Advanced Compiler Optimizations'', with L. Zuck and A. Pnueli. National Science Foundation, June 2001 – May 2006. ''Algorithmic Techniques for Compiler Controlled Caches'', with K. Palem. Air Force, July 1999 June 2002. ''Parallel Extensions of the MSTAR System'', with E. Freudenthal. AFOSR, August 1999 - July, 2001. ''A Computational Laboratory for Automatic Target Recognition'', with D. Geiger and E. Freudenthal. AFOSR, March 1998 - March 1999. 6 APP. 1999 ''Mobile and Stationary Target Acquisition and Recognition'', DARPA/Air Force, June 1997March 2000. "An Integrated Parallel Programming Environment for High Performance Parallel Computing on Workstation Clusters", Department of Energy. May 1994. With Los Alamos National Laboratory and IBM. "GRIFFIN - A Common Prototyping Language: Design, Implementation, and Assessment", with R. Dewar, M. Harrison, E. Schonberg and D. Shasha. DARPA/Office of Naval Research, May 1992 April 1995. "Research Training in Software Prototyping Languages and Environments". DARPA/ONR May 1992 - April 1995. "Studies in Automatic Dynamic Load Balancing on Large Loosely-Coupled Multiprocessors", National Science Foundation Research Initiation Award. September 1989 - June 1992. "GRIFFIN: a Common Prototyping Language", with R.Dewar, E. Schonberg, M. Harrison, and D. Shasha. DARPA/ONR September 1989 - April 1992. New Courses Developed “Object Oriented Programming”. An undergraduate course covering Java, C++, UML, and object oriented programming techniques. Also developed an MS-level OOP course. "The Design and Programming of Embedded Systems''. A graduate course addressing the computing hardware and software designs in handheld devices, cell phones, appliances, etc. "Compilers for Advanced Computer Architectures". A graduate course in optimization techniques for emerging microprocessors. "Honors Programming Languages''. A Ph.D. course in Programming Language Design and theory. 7 APP. 2000 EXHIBIT CCC APP. 2001 List of Materials Considered Plaintiffs’ Motion for Class Certification (filed November 13, 2015) Report of Dr. Jennifer Golbeck In Support of Plaintiffs’ Motion for Class Certification and Documents Cited Therein (filed November 13, 2015) Facebook source code made available for review to Plaintiffs in this case Publicly available Facebook Website FB000014178-FB000014215 FB000027011-FB000027189 Facebook’s Supplemental Responses to Plaintiffs’ First Set of Interrogatories (September 8, 2015) Facebook’s Second Supplemental Responses and Objections to Plaintiffs’ Narrowed Second Set of Interrogatories (October 29, 2015) June 1, 2015 Declaration of Alex Himel and accompanying Exhibits A-G October 6, 2015 Declaration of Dale Harrison January 2016 Declaration of Michael Adkins (filed concurrently with this report) January 2016 Declaration of Alex Himel (filed concurrently with this report) January 2016 Declaration of Dan Fechete (filed concurrently with this report) Deposition of Michael Adkins (October 28, 2015) Deposition of Ray He (September 25, 2015) Deposition of Ray He (October 28, 2015) Deposition of Jennifer Golbeck (December 16, 2015) Original Complaint (filed December 30, 2013) Consolidated Amended Complaint (filed April 25, 2014) Court’s Order on Motion to Dismiss (December 23, 2014) All documents cited in the body of this report APP. 2002 Expert Witness Report: Campbell vs. Facebook, Inc. Catherine Tucker January 15, 2016 App. 2003 TABLE OF CONTENTS Page I. INTRODUCTION .............................................................................................................. 1 II. ASSIGNMENT ................................................................................................................... 2 III. SUMMARY OF CONCLUSIONS ..................................................................................... 3 IV. BACKGROUND TO THE SPECIFIC FACTS IN THIS CASE ....................................... 5 V. THE USE OF BEHAVIORAL INFORMATION TO ORGANIZE THE INTERNET ......................................................................................................................... 7 VI. MANY PROPOSED CLASS MEMBERS WERE UNAFFECTED, SOME BENEFITED, AND QUANTIFYING BENEFITS OR LACK THEREOF REQUIRES INDIVIDUALIZED INQUIRY ................................................................... 11 A. Some potential class members were unaffected by the challenged practices ....... 11 1. 2. B. Potential class members were unaffected if the website did not have a relevant social plugin ..................................................................... 11 Potential class members were unaffected due to the aggregate and anonymous nature of the data used ........................................................... 16 Some potential class members benefited from the challenged practices .............. 18 1. 2. C. Some proposed class members benefited directly from incremental publicity .................................................................................................... 18 Some proposed class members benefited indirectly from incremental publicity ................................................................................ 21 It is difficult to determine the effect of the at-issue practices on some potential class members ........................................................................................ 23 1. 2. Due to the use of aggregate counts it is very unlikely any single increment of the social plugin counter had a negative effect for that individual .................................................................................................. 26 3. VII. A “Like” button does not necessarily imply endorsement........................ 25 It is difficult to determine potential negative effects of any sharing of a URL without intrusive inquiry ........................................................... 27 REBUTTAL TO MR. TORRES’S REPORT ................................................................... 32 A. Mr. Torres estimated “benefits” to Facebook, not “damages” suffered by putative class members ......................................................................................... 33 B. It is not clear what the proposed methodology relating to the Social Graph is or why the alleged practices are being related to advertising ........................... 34 1. Summary of Mr. Torres’s method for estimating the alleged benefit to Facebook of enhancing the “Social Graph” .......................................... 34 2. Mr. Torres’s method is based on a false assumption ................................ 35 i App. 2004 TABLE OF CONTENTS (continued) Page 3. C. The parts of the proposed methodology where Mr. Torres does give details have several flaws .................................................................. 38 It is not clear how the proposed methodology related to allegedly inflated social plugin counters is linked to the disputed practice....................................... 43 1. Summary of Mr. Torres’s method for estimating the alleged benefit to Facebook related to allegedly “inflated” social plugin counters .......... 43 2. The analysis focuses on the value of “Likes” to website owners, which has no reliable link to Plaintiffs’ allegations of harm .................... 43 3. The analysis fundamentally misunderstands or distorts why website owners value “Likes” ................................................................... 46 D. Mr. Torres’s two potential methodologies cannot be reconciled with each other ...................................................................................................................... 49 E. Rebuttal to Mr. Torres’s analysis as it pertains to statutory damages .................. 51 1. 2. VIII. Factor 1: Actual damage to the victim ...................................................... 52 Factor 2: Whether the Defendant profited from the alleged violation .................................................................................................... 52 CONCLUSION ................................................................................................................. 53 ii App. 2005 I. INTRODUCTION 1. I am the Sloan Distinguished Professor of Management Science and Professor of Marketing at MIT Sloan at the Massachusetts Institute of Technology (“MIT”) in Cambridge, Massachusetts. I received an undergraduate degree in Politics, Philosophy and Economics from Oxford University in the United Kingdom. I received a PhD in Economics from Stanford University in 2005. I have been at MIT since completing my PhD. 2. My academic specialty lies at the intersection between the economics of the new digital economy and advertising. I have conducted multiple studies on the diffusion of new advertising technologies and have published various papers which examine how marketing communications, in the form of advertising, perform, and which delineate the factors that relate to their performance. 3. I am Co-Editor of the Journal of Quantitative Marketing and Economics. I was an Associate Editor at Management Science and a Co-Editor of the recent National Bureau of Economics Research volume on the Economics of Digitization. I am also Associate Editor for the Information Systems Research Special Issue on Social Media and Business Transformation and Co-Editor of the Information Economics and Policy Special Edition on the Economics of Digital Media Markets. I have published multiple academic papers in leading marketing journals, including Marketing Science, the Journal of Marketing Research, Management Science and the Journal of Marketing. I received a National Science Foundation CAREER Award, which is the National Science Foundation’s most prestigious award in support of junior faculty who “exemplify the role of teacher-scholars through outstanding research, excellent education and the integration of education and research within the context of the mission of their organizations.” I teach the core class on “Strategic Marketing” to our Executive MBAs at MIT Sloan, as well as being the lead faculty for marketing of the MIT Sloan specialized executive education offerings on marketing, where senior executives come in for one or two day courses to refresh their skills and discuss the current state of the art in marketing. I also teach a specialized class on “Platform Strategy: Building and Thriving in a Vibrant Ecosystem” which discusses strategies for building data-rich digital platforms. App. 2006 4. I have received a Paul Green Award for the paper “most likely to influence marketing practice” for research I did on new kinds of online targeting. I also received the 2015 Erin Anderson Award for the most notable Female Emerging Marketing Scholar and Mentor. 5. I have testified on factors influencing privacy regulation before Congress and have presented my research on privacy to the Federal Trade Commission, the Federal Communications Commission, the European Commission, and the OECD. 6. Further details of my experience are in my curriculum vitae, which I attach as Exhibit DDD to my report. A list of my prior testimony is attached as Exhibit EEE. 7. I am being compensated for my services in this matter at my customary hourly rate of $1,050. While preparing this report, I have been assisted by certain employees of Analysis Group. I receive compensation based on the professional fees of Analysis Group. No compensation is contingent on the nature of my findings or on the outcome of this litigation. 8. Since my work on this matter is ongoing, I may review additional materials produced subsequent to the issuance of this report, and/or conduct further analysis. I reserve the right to update, refine, or revise my opinions, or form additional opinions, including in response to further information from Plaintiffs’ experts, further clarification of Plaintiffs’ requested relief, and any additional information I may receive. 9. A list of the materials I have considered to date in developing the opinions contained in this report is attached as Exhibit FFF. II. ASSIGNMENT 10. I have been asked by counsel for Facebook to: a. Use my knowledge of the economics of digitization to lay out the appropriate economic framework for analyzing the use of aggregate behavioral information on Internet link-sharing behavior. b. Assess whether proposed class members were commonly affected by the practices challenged in the operative Complaint and the Motion for Class Certification, the use of counts of URL links that are formed as URL message attachments to 2 App. 2007 provide “recommendations” to people who use Facebook, to provide analytics to third-party websites and developers, as well as to increment the “Like” social plugin counter.1 c. Assess the framework for potential damages put forward in the Expert Report of Fernando Torres submitted in support of Plaintiffs’ Motion for Class Certification.2 III. SUMMARY OF CONCLUSIONS 11. Below is a summary of my opinions as of the date I submit this report. If additional documents or information become available after I submit this report, I will review the material and update my opinions as appropriate. 12. The use of popularity information to organize content on the Internet is both ubiquitous and helpful. It leads to a democratizing process, where content that may not usually have been highlighted is brought to potential readers’ attention. 13. The alleged practices, including the incrementing of the social plugin counter next to the “Like” button, affected potential class members in a variety of ways. Though many of the proposed class members were unaffected, some may have benefited, and in a few cases some may have been harmed, individual inquiry is necessary to determine in which group individual class members belong. 14. Many potential class members were unaffected by the alleged practices. The fact that many websites did not have social plugins that display counters limits the effects of the practices. Furthermore, the aggregate and anonymous nature of the data means that any of the incremental data stored may have had no practical effect even if a social plugin 1 2 See Plaintiffs’ Consolidated Amended Complaint ¶¶ 2, 4, 31, 38; Plaintiffs’ Motion for Class Certification at 2, 5-10. I understand that Mr. Torres has filed a second report in this case; however, I received it only two days prior to the filing of this report and my references and responses in this report are to his first report. 3 App. 2008 App. 2009 App. 2010 App. 2011 V. THE USE OF BEHAVIORAL INFORMATION TO ORGANIZE THE INTERNET 22. Over the past two decades, consumption of information has been revolutionized by the Internet. The Internet has, of course, directly reduced the cost of disseminating and receiving information, as digital data is virtually costless.8 However, another key advance has been the use of user behavioral information to ease the process of social discovery of content. 23. Prior to the Internet, curation and recommendations were usually done by specialized experts in the field. For example, newspaper editors decided what stories to feature on the front page in order to attract occasional purchasers. Similarly, department store managers decided which products to highlight in a store entry display that would appeal most and induce browsing customers to purchase. Even in the non-digital world, organizations used popularity information to help them connect with customers. For example, musicians vied to make sure their songs ranked highly on the Billboard Hot 100 so they would receive more exposure.9 National Public Radio (NPR Books) ranked books on the basis of anonymous sales counts at independent booksellers.10 Similarly, toy shops would examine sales data to identify a “hot toy” and feature it more prominently on their display.11 8 9 10 11 Greenstein, Shane M., Avi Goldfarb, and Catherine E. Tucker, editors, The Economics of Digitization, Edward Elgar Publishing, 2013. As described here, the Billboard chart uses anonymized counts of streaming, sales and air-play to determine its rankings. See Trust, Gary, “Ask Billboard: How Does the Hot 100 Work?” Billboard, September 29, 2013, http://www.billboard.com/articles/columns/ask-billboard/5740625/ask-billboard-how-does-the-hot-100-work, viewed December 11, 2015. The NPR Bestseller Lists are compiled from weekly surveys of close to 500 independent book-stores nationwide in collaboration with the American Booksellers Association. See, e.g., “NPR Bestseller List: Week of Oct. 1, 2015,” NPR, http://www.npr.org/books/bestsellers/2015/week40/, viewed December 11, 2015. An evolution of this is Kmart’s website: “2015 Fab 15 Toys,” Kmart, http://www kmart.com/en_us/dap/fab-15toys html, viewed January 3, 2016. For a discussion, see “Behind Kmart’s Fab 15 List: How We Identify Hot Toy Trends,” SEARS HOLDINGS: SHC Speaks, September 24, 2014, http://blog.searsholdings.com/insideshc/behind-kmarts-fab-15-list-how-we-identify-hot-toy-trends/, viewed on January 15, 2016. 7 App. 2012 24. However, the Internet has both automated and further democratized this process of social discovery. Media websites can now organize their content based on popularity.12 Recommendation systems on websites such as Amazon now display automated suggestions of products that might interest consumers based on other customers’ purchasing behavior.13 25. Partly responding to and partly facilitating this general shift online in using digital behavioral data to organize the Internet and facilitate social discovery, has been the advent of electronic lists automatically recommending Internet content. A similar evolution has taken place in the form of “counters” of social media website activity surrounding a particular website. These counters take a variety of forms. The simplest form they might take is as a simple counter at the bottom of the webpage. Figure 1 depicts such a counter for a fetal health charity that I support.14 Sadly, the Fetal Health Foundation is a small charity which does not receive much publicity or support from the general public, so its counts of social media support are negligible. However, if I shared the link on my Facebook page, retweeted the link using Twitter, shared the link on Google Plus or posted the website on my Pinterest page, I might be able to build interest and support for this charity, and also potentially inform those who are pregnant or who know people who are pregnant who may face such conditions. 26. I can achieve the aim of increasing interest and readership of this website from my sharing the URL through a Facebook message in two ways. The first way is the direct effect I would have from sharing the URL with my friends and relatives. The second way is the indirect effect I would have from an increment of the social plugin counter from “Likes” from three to four, should I have sent the email in the limited period such a share would have affected the count. Though individually my share is unlikely to have any 12 13 14 Even news websites which stick to the traditional curation model also feature browsing and sharing information to help customers identify news articles. For example, the New York Times lists the ranking of the top ten most shared articles: “New York Times Most Popular Articles,” The New York Times, http://www nytimes.com/mostpopular, viewed December 11, 2015. For more details, see Berger, Jonah, and Katherine L. Milkman, “What Makes Online Content Viral?,” Journal of Marketing Research, Vol. 49, No. 2, April 2012, pp. 192-205. See Resnick, Paul, and Hal R. Varian, “Recommender Systems,” Communications of the ACM, Vol. 40, No. 3, March 1997, pp. 1-3. The Fetal Health Foundation is focused on advances in technology that help prevent babies dying in utero. 8 App. 2013 effect, if one hundred thousand people also shared this website it would help it gain more general prominence as visitors may take the website more seriously upon observing the high count when visiting the website. Figure 1: Snapshot of Social Media Counters from Charity Website15 15 “Amniotic Band Syndrome,” Fetal Health Foundation, https://web.archive.org/web/20150910004526/http://www fetalhealthfoundation.org/amniotic-band-syndrome/, viewed January 6, 2016. Interestingly, I initially viewed the image for this URL on October 29, 2015. When I returned to the website in January 2016, the site had experienced a redesign – quite unrelated to anything to do with this case – and there was no longer this visible social plugin counter. This change illustrates the extent to which it can be problematic to identify whether or not a particular social plugin was or was not on a website over time, which I discuss below. 9 App. 2014 27. In general, this personal example shows three things: 28. First, the use of data and anonymous counts on the sharing of content online is ubiquitous. Social media platforms such as Facebook, Twitter, Google and other websites such as Pinterest all offer such data. Second, behavioral data relating to the sharing of website URLs is useful for identifying which websites may be of most interest. Third, the process is somewhat democratizing. Websites or niche causes such as the Fetal Health Foundation find it hard to attract attention, but if they can achieve shares and signal their popularity and relevance on social media this can help them spread their message. Indeed, my own research shows that the release of popularity information benefits niche products or less common websites most. Everyone expects a major website such as CNN.com to be visited, shared, and “Liked” a great deal; information that a smaller or unusual website is also visited, shared, and “Liked” a great deal is more surprising and can therefore attract more notice.16 29. This research builds on an older (and growing) economic literature about the effects of popularity information on people’s behavior. This literature uses the insight that when quality of a product or service or piece of Internet content is uncertain, people may use others’ behavior as a guide to quality.17 Other academic papers have subsequently also noted the usefulness of such information for improving users’ browsing experience online and decision making.18 Other work has emphasized that such algorithmic rankings may improve a user’s experience by reducing the potential for information overload.19 16 17 18 19 See Tucker, Catherine, and Juanjuan Zhang, “How Does Popularity Information Affect Choices? A Field Experiment,” Management Science, Vol. 57, No. 5, 2011, pp. 828-842. The canonical academic works in this area are Bikhchandani, Sushil, David Hirshleifer, and Ivo Welch, “A Theory of Fads, Fashion, Custom, and Cultural Change as Informational Cascades,” Journal of Political Economy, Vol. 100, No. 5, 1992, pp. 992-1026, and Banerjee, Abhijit V., “A Simple Model of Herd Behavior,” Quarterly Journal of Economics, Vol. 107, No. 3, August 1992, pp. 797-817. See Tucker, Catherine, and Juanjuan Zhang, “Growing Two-Sided Networks by Advertising the User Base: A Field Experiment, Marketing Science, Vol. 29, No .5, 2010, pp. 805-814. See Ghose, Anindya, Panagiotis G. Ipeirotis, and Beibei Li, “Designing Ranking Systems for Hotels on Travel Search Engines by Mining User-Generated and Crowdsourced Content, Marketing Science, Vol. 31, No .3, May–June 2012, pp. 493-520. 10 App. 2015 Still more have shown explicitly that users make inferences from many different types of user behavior once that information is available online.20 VI. MANY PROPOSED CLASS MEMBERS WERE UNAFFECTED, SOME BENEFITED, AND QUANTIFYING BENEFITS OR LACK THEREOF REQUIRES INDIVIDUALIZED INQUIRY 30. In order to assess whether the effect of the challenged practices was common across proposed class members, I evaluate how different types of proposed class members were affected. I conclude that many of the potential class members were unaffected by these practices and some may have benefited. However, identifying whether or not, and how, they are affected requires detailed individual inquiry. A. 31. Some potential class members were unaffected by the challenged practices To understand whether a potential class member was affected, it is useful to understand and assess the likelihood of the set of coinciding circumstances that are necessary for there to be any concrete effect from the alleged practices. 1. 32. Potential class members were unaffected if the website did not have a relevant social plugin There are many potential circumstances where a URL attachment was created but where there was no actual effect on visible social plugin or visible data and therefore, there is no concrete effect on a proposed class member. To illustrate this it is useful to consider an example from one of the Named Plaintiffs. This example is shown in Figure 2, which is a : 20 See Tucker, Catherine, Juanjuan Zhang, and Ting Zhu, “Days on Market and Home Sales,” The RAND Journal of Economics, 2013. 11 App. 2016 Figure 2: Message from Plaintiff Campbell, as produced by Plaintiffs21 33. In this example, , which is shown in Figure 3. The message . However, when I visit the indicated URL in 2016, I see no social plugin counter or any evidence of the incremental “Like” generated by this share being used in any way. (See Figure 3.) I also see no social plugin which could have shown recommendations. This suggests that it is not the case that the “Like count [is] publicly displayed”22 on all websites for which a URL attachment was created as claimed in Plaintiff’s Motion for Class Certification. Similarly, when I visited the page as it was posted on August 25, 2011 through the 21 22 CAMPBELL000076-77. Plaintiffs’ Motion for Class Certification at 9. 12 App. 2017 Wayback Machine,23 no social plugin counter or plugin which could have shown recommendations was visible.24 Figure 3: Not all websites had social plugins that featured a counter or Recommendations or Activity plugin25 23 24 A query on “https://web.archive.org/web/20110825191937/http://www.nytimes.com/2011/07/27/us/politics/27fiscal html” returns a page with no Facebook social plugin counter (viewed Jan. 6, 2016). However, the Wayback Machine reports that “[a]rchived web sites in the Wayback Machine do not always appear as they did on the live web for reasons such as the previously mentioned difficulties in archiving web sites,” and further, “difficulties in archiving web sites include the use of JavaScript, server side image maps, orphan pages (web sites that are not linked to by any other web pages), and unknown sites.” This only underscores the difficulty in determining if putative class members were affected by the alleged practices. Steinhauer, Jennifer, and Carl Hulse, “Vote on Boehner Plan Delayed Amid Opposition,” The New York Times, July 26, 2011, https://web.archive.org/web/20110825191937/http://www nytimes.com/2011/07/27/us/politics/27fiscal.html, viewed January 6, 2016. The New York Times already offers a ranking of its most emailed stories as a way of using popularity information to inform readers what story they might most enjoy. See “New York Times Most Popular Articles,” The New York Times, http://www nytimes.com/most-popular, viewed December 11, 2015 for the current list. This New York Times list of most popular emailed articles was studied in research from 2012. See “New York Times Most Popular Articles,” The New York Times, http://www nytimes.com/most-popular, viewed December 11, 2015. 13 App. 2018 App. 2019 suggests that at that time the number of websites with any social plugin was small, and that of the top 10,000 websites, 75.7 percent of them were not integrated with Facebook.29 37. One might conclude, therefore, that for approximately 75 percent of all Facebook messages with URL attachments sent in the December 2011-December 2012 period, there was no effect because there was no Facebook integration on the website, let alone a visible social plugin counter or Recommendations Feed. However, without actual data on site visitation and its relative spread over the 10,000 top websites (and websites not in this top 10,000), it is difficult to assess the extent to which the 75 percent figure applies to URLs shared in Facebook messages rather than simply the distribution of websites. Though it seems likely that smaller websites are less likely to have social plugins, it is worth noting too that many of the most popularly visited websites (as such Google, Twitter, Wikipedia, and YouTube) do not currently have Facebook integration.30 The 75 percent figure may also understate the effect because there are many different types of social plugins, and if the website only had a “Like” button and not a counter next to the “Like” button, then obviously there would not have been the effects associated with counters.31 The number of websites featuring a counter or a Recommendations Feed has 29 30 31 This website reports its methodology as follows: “We examined the HTML code of the home-pages of the top 10k sites in the world according to Alexa. To determine Facebook integration, we looked for the official ways of integrating Facebook on sites, with paths such as facebook.com/plugins, connect facebook net and graph facebook.com.” “How Many Sites Have Facebook Integration? You’d Be Surprised,” Pingdom.com, June 18, 2012, http://royal.pingdom.com/2012/06/18/how-many-sites-have-facebook-integration-youd-be-surprised/, viewed December 11, 2015. Of course since this 2012 survey, it is likely that these statistics have changed. For example as reported by He, Ray C., “Introducing New Like and Share Buttons,” Facebook for Developers, November 6, 2013, https://developers.facebook.com/blog/post/2013/11/06/introducing-new-like-and-share-buttons/, viewed December 11, 2015 by November 2013, the “Like” and “Share” buttons were being viewed over 22 billion times daily across more than 7.5 million websites. See “Top Sites in United States,” Alexa, http://www.alexa.com/topsites/countries/US, viewed on January 15, 2016 for current top websites. Based on my review on January 11, 2016, Google.com, Youtube.com, Wikipedia.org, and Twitter.com do not have Facebook integration. “Social Plugins,” Facebook for Developers, https://developers.facebook.com/docs/plugins, viewed December 12, 2015. There are not only “Like” buttons but also “Share,” “Follow,” and “Send” buttons available. The “Like” button is displayed at “Like Button for the Web,” Facebook for Developers, https://developers.facebook.com/docs/plugins/like-button, viewed December 12, 2015. That is of course supposing I get the code from Facebook directly rather than using a template – as shown on “The Best WordPress Facebook Widgets,” Elegant Themes Blog, January 15, 2015, https://www.elegantthemes.com/blog/resources/the-best-wordpress-facebook-widgets, viewed December 12, 2015, there are many other potential ways of including Facebook interactions on a website that do not involve a social plugin counter. 15 App. 2020

Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.


Why Is My Information Online?