Ceglia v. Zuckerberg et al
Filing
224
MEMORANDUM IN SUPPORT re 223 MOTION Order re 41 Text Order Referring Case to Magistrate Judge,,,,, Notice of Motion for Order Prohibiting Defendants from Reliance on Argument that Ceglia Zuckerberg email exchanges in Amended Complaint are Frauds in any dispositive motion MOTION Order re 41 Text Order Referring Case to Magistrate Judge,,,,, Notice of Motion for Order Prohibiting Defendants from Reliance on Argument that Ceglia Zuckerberg email exchanges in Amended Complaint are Frauds in any dispositive motion byPaul D. Ceglia. (Attachments: # 1 Exhibit A, # 2 Exhibit B, # 3 Certificate of Service)(Boland, Dean)
UNITED STATES DISTRICT COURT
WESTERN DISTRICT OF NEW YORK
PAUL D. CEGLIA,
Civil Action No. : 1:10-cv-00569-RJA
Plaintiff,
v.
MARK ELLIOT ZUCKERBERG, Individually, and
FACEBOOK, INC.
Defendants.
MEMORANDUM IN SUPPORT
OF MOTION FOR ORDER
PROHIBITING DEFENDANTS
FROM RELIANCE ON
ARGUMENT THAT CEGLIA
EMAILS ARE FRAUDS IN ANY
DISPOSITIVE MOTION FILED
DURING OR AT THE END OF
EXPEDITED DISCOVERY
MEMORANDUM
Mr. Ceglia filed the amended complaint in this matter on April 11, 2011.
Doc. No. 39. Included with that filing were the text of email exchanges between Mr.
Ceglia and Mr. Zuckerberg. Id.
Since the filing of that document, Defendants have maintained a steady
barrage of unsupported claims those emails are frauds.
Defense Counsel Oren Snyder has repeatedly claimed these emails are not
authentic.
“[F]abricated emails.”
Doc. No. 94 at 5.
“The emails are outright
fabrications.” Id. at 15. “[S]upposed emails.” Id. at 16. “[S]o called emails exist.”
Id. at 17. “[F]ake emails.” Id. at 19. “[T]he emails are fake.” Id. at 72. [B]ogus
emails.” Id. at 108. “Fraudulent emails.” Id. at 111. “[T]hese emails are bogus.”
Id. at 115.
“[F]raudulent emails.”
concocted.”
Id. at 135.
Id. at 127 and 135.
“[T]hose emails were
“[A]lleged emails in the complaint, in addition to be
1
fraudulent….” Id. at 136. “[B]ogus emails.” Id. at 138. “[H]is fraud on the court
based on these emails….” Id. at 149. “[H]is so-called emails.” August 17, 2011
Transcript at 42. “[S]o called emails.” Id. at 44, 63. “[M]ade-up emails.” Id. at 49.
“[P]urported emails.” Id at 63. “[T]he so-called emails.” Id. at 108, 109.
THE EMAIL EXCHANGES BETWEEN CEGLIA AND ZUCKERBERG
ARE AUTHENTIC
Plaintiff and Defendants have a contrast in style. Plaintiff presents evidence
supporting his arguments or claims. This motion continues that approach. In 2003
and 2004 Mr. Ceglia used MSN webmail to exchange emails with Mr. Zuckerberg.
Declaration of Paul Ceglia at ¶4. Those programs routinely deleted email content to
maintain user account sizes. Id. at ¶6. During and just after Mr. Zuckerberg and
Mr. Ceglia discontinued regular email communication, Mr. Ceglia decided to
preserve his email exchanges with Mr. Zuckerberg. Id. at ¶7. He copied the text
and header information from each of the emails between the two of them and pasted
that content into a Microsoft Word document. Id. He then saved those files to
floppy disks. Id. at ¶8. Those emails include various discussions about the terms
and effect of the Facebook Contract that was an exhibit to the original complaint
filed in New York State Court. Id. at ¶9. Those emails included discussions
between Mr. Ceglia and Mr. Zuckerberg where they expanded the concepts of
Facebook’s original idea. Id. at ¶10. In those emails, Mr. Ceglia clearly established
that Mr. Zuckerberg was to use Mr. Ceglia’s previously developed search engine to
quickly implement the start up of Facebook. Id. at ¶11.
2
Shortly after the filing of the amended complaint, Mr. Ceglia provided those
floppy disks to computer forensics expert Jerry Grant. Id. at ¶12.
CEGLIA AND ZUCKERBERG DISCUSS FACEBOOK
Ceglia exchange numerous emails with Mr. Zuckerberg discussing aspects of
the emerging Facebook website and social network. Exhibit A.
On November 22, 2003, Defendant Zuckerberg asks Mr. Ceglia for more
money to continue funding development of the Facebook social networking site:
Paul, I have recently met with a couple of upperclassmen here at
Harvard that are planning to launch a site very similar to ours. If we
don't make a move soon, I think we will lose the advantage we would
have if we release before them. I've stalled them for the time being
and with a break if you could send another $1000 for the
facebook project it would allow me to pay my roommate or Jeff to
help integrate the search code and get the site live before them.
Please give me a call so that we can talk more about this. Best,
Mark Exhibit A at 5-6.
In 2004 following the emergence of The Facebook social network, two
Harvard upper classmen sued Defendant Zuckerberg and Facebook claiming he had
stolen the idea for Facebook from them. See ConnectU, LLC v. Mark Zuckerberg, et.
al. Civil Action No. 04-11923-DPW.
During the development of the Facebook social network Defendant
Zuckerberg acknowledged using the search engine code designed for Paul Ceglia in
the Facebook social network design.
The possibility of working in the Carribean coding for you is
something to consider, though I would prefer that it was in the winter.
That said, I've been tweaking the search engine today and I'm pleased with
3
its results. I'd like to use it for the Harvard site, I think it will really help
people find each other, even if they spell names incorrectly. Would it be
agreeable with you if I adapt the source code? Thanks!
>Mark Exhibit A at 6.
Defendant Zuckerberg also negotiated with Mr. Ceglia regarding the
Facebook Contract’s terms regarding ownership and penalties for Defendant
Zuckerberg’s late completion of various programming and design tasks.
From: Mark Elliot Zuckerberg
To: paul ceglia
Subject: Going live
Date: Mon, 2 Feb 2004 09:18:25 -0400
Paul, I have a rather serious issue to discuss with you, according to
our contract I owe you over 30% more of the business in late
penalties which would give you over 80% of the company. First I
want to say that I think that is completely unfair because I did so
much extra work for you on your site that caused those delays in the
first place and second I don't even think it is legal to charge such a
huge penalty. Mostly though I just won't even bother putting the site
live if you are going to insist on such a large percentage. I'd like to
suggest that you drop the penalty completely and that we officially
return to 50/50 ownership. Exhibit A at 9.
Defendant Zuckerberg mentions stealing some code from the two
upperclassmen, obviously referring to the Winklevoss’ twins whom sued him
previously.
From: Mark Elliot Zuckerberg
To: paul ceglia
Subject:
Date: Fri, 28 Nov 2003 18:47:06 -0400
4
I've been using some of Jeffs old code for different parts of the site,
I'm hoping he will be able to write something for us.I'm not sure
what course of action I should take regarding the upperclassmen.
they have given me a bunch of their code to read and it is really an
amateur attempt at best, though there is some functionality I think
I'll borrow. I don't think database functionality has even crossed
their underdeveloped minds. I feel like they are my two dumb ox and
I will steer them where ever I please. Since they trust me (and think
I'm so grateful to them for including me) I am sure that I can delay
them beyond our own sites release. I'm questioning if I should just
pull their plug and hack the code I want or just stall them and see
how far I can lead them along. Best,
Mark Exhibit A at 5.
The email exchanges swing between StreetFax related discussions and
Facebook related discussions.
THE EMAIL CONTENT CONFIRMS MR. CEGLIA
Contrary to Defendants’ claims of fraud with regard to the emails, Jerry
Grant, a computer forensics expert, analyzed the floppy disks onto which Mr. Ceglia
copied the email content in 2003 and 2004. Exhibit B
Jerry Grant has more than 25 years of professional computer forensic expert
and systems analysis experience. Declaration of Jerry Grant at ¶3. He is currently
a computer forensics investigator for the Western District of New York’s Federal
Defender’s Office. Id. at ¶4. He has conducted training and lectures on computer
forensics topics nationwide. Id. at ¶6-7. His experience ranges from working with
operating systems, all popular software applications, computer hardware and
configurations to the technical workings of a computer hard drive. Id. at ¶8.
On Thursday March 31, 2011 he received 41 floppy disks from Mr. Ceglia for
review. Id. at ¶9. On the next day, he created forensically sound, bit by bit, images
5
of each floppy disk for analysis. Id.
Following the creation of the forensic copies, he performed an initial review of
the floppy diskettes and determined that the first two were relevant to this matter.
Id. at ¶10. He further analyzed the two relevant disks to determine the dates and
times that various documents on those disks were created. Id. He also analyzed
those disks specifically examining them for the following forensically relevant
items:
a.
File Allocation Tables (FAT 12)
i.
The File allocation Table is the area of the drive that contains the name,
date and location of files on the floppy disk (similar to the table of
contents of a book). This is reviewed to compare the contents of the
actual files that exist to the names in the FAT for discrepancies. It is
also reviewed to determine if any residual information exists indicating
duplicate files and or the names of previously deleted files that might be
of interest. In this case nothing was located that would indicate fraud.
Id. at 11(a)(i)
b.
File Dates/Times (Created, Modified Accessed)
i.
The File dates/times are the actual dates/times on the physical files that
reside on the floppy disk. These are compared to any internal dates
found within the document content themselves to determine if there are
any discrepancies. This is used to determine if the content matches the
timeframe that the files were created and/or edited. In this case, no
6
discrepancies existed that would indicate fraud. Id. at 11(b)(i)
c.
Metadata Dates/Times (Created, Modified, Accessed, Printed)
i.
Like the file dates/time, Metadata dates/times are internal to the
document and do not change if a document is copied from one device to
another. The are reviewed and compared to the File Dates/Times as
well to determine the sequence of events. In this case nothing was
located that would indicate fraud. Id. at 11(c)(i)
d.
Total Edited Time Metadata Field
i.
This field is part of the internal Metadata of the document and is
updated by the Word Processing program that is used to create/edit the
document. The field was reviewed to determine the actual time spent
editing the content. In this case, the content of the documents was large
compared to the logged editing time which is consistent with the pasting
of data from the clipboard instead of typing or manually editing the
content. Id. at 11(d)(i)
e.
All Other Metadata fields
i.
Any additional fields that contain data are reviewed for additional
information related to the origin of document and/or the machine
created on.
In this case additional information on other computers,
users and companies was located, but nothing was found indicating
fraud. Id. at 11(e)(i)
f.
Fonts Used
7
i.
The font types are reviewed and compared to the fonts available at the
time of the create/modify date of the document.
This is done to
determine if the document was created at a later date and the actual file
and metadata dates were false. In this case all fonts were correct and
nothing indicated any signs of fraud. Id. at 11(f)(i)
g.
Allocated Space
i.
The allocated space is the space that is taken up on the floppy disk from
existing files. This is reviewed to determine what parts of the actual
floppy disk the data resides on as well as to determine if any hidden or
encrypted data exists. In this case nothing was located to indicate any
fraud. Id. at 11(g)(i)
h.
Unallocated Space
i.
The unallocated space is the space that may contain data from
previously deleted files. It is examined to review deleted data and to
perform keyword searches for the content of deleted files. This is also
done to look for any forensic artifacts of a file wiping process or to locate
relevant data for comparison. In this case nothing was found that would
indicate any fraud. Id. at 11(h)(i)
i.
Slack Space
i.
The Slack Space is similar to the unallocated space but is the leftover
data from another file that is at the end of an existing file. This is
similar to a 2 hour movie on a VCR tape that was overwritten by a 1
8
hour movie. The first hour of the tape is the new movie but the last
hour is the leftover last half of the old movie. This is examined to look
for pieces of deleted data to compare to the actual files on the floppy disk
to uncover evidence of file versions/editing. In this case, nothing was
found to indicate that. Id. at 11(i)(i)
j.
Temporary Files
i.
The temporary files are those that are created during the editing/
printing of a document.
These are then normally deleted after the
document is saved or printed.
These were reviewed, similar to the
remnants of the slack space, to look for evidence of versions and/or
editing. In this case, nothing was found to indicate other edited versions
of any document relevant to fraud. Id. at 11(j)(i)
k.
Carved Files
i.
The carved files are the files/remnants that were deleted on the floppy
disk but could be recovered. These were reviewed like the Slack Space
and Temporary Files for evidence of file versions and editing. In this
case, nothing was found to indicate fraud. Id. at 11(k)(i)
l.
Carved Folders
i.
Carved folders are folders that were once deleted but could be recovered
similar to the carved files. Recovering a folder could uncover evidence of
the actual files that once existed in them for comparison like the other
processes. In this case, nothing was found to indicate fraud. Id. at 11(l)
9
(i)
m.
File Header Information
i.
The file header information is the beginning of a file that is unique and
determines the type of document (Word 97, Rich Text, etc). These were
compared to the versions of software that existed on the date/time the
document was created. This is done to determine if the file was created
with a program that did not exist at that time indicating fraud. In this
case, all file headers matched the available versions of the programs at
that time so nothing was found to indicate fraud. Id. at 11(m)(i)
n.
File Comparisons for changes
i.
I compared files with the same and/or similar names to determine if
they were exact. This was done to determine if there were multiple
versions of the files or slightly modified versions that would indicate
manipulation. In this case nothing was found to indicate fraud. Id. at
11(n)(i)
o.
Versions of Programs/Documents (Word 97, Word 2002, Word 6.0, Microsoft
RTF, Works 5.0)
i.
Similar to comparing the File Header Information, the versions of the
programs indicated by the headers were compared to make sure they did
indeed exist at the date/time of the file creation. The programs matched
the header information, so in this case nothing was found to indicate
fraud. Id. at 11(o)(i)
10
p.
OLE Streams (Individual Components of Documents)
i.
The OLE Streams are individual parts of a file/document within the file
itself. These were reviewed to compared the types of OLE that existed
at the time and to match them to the programs used. In this case,
nothing was found to indicate fraud. Id. at 11(p)(i)
q.
0 Length Files (Remnants of deleted files)
i.
The 0 Length Files are names of deleted files that were leftover in the
File Allocation Table. These items are individually carved to recover any
dates and/or information for comparison.
In this case, nothing was
found to indicate fraud. Id. at 11(q)(i)
r.
Pasted E-Mail header contents
i.
He compared the portions of the pasted e-mails that contained actual email header information. This would be the underlying information that
the e-mail servers would use to actually deliver the e-mail. This was
compared to determine if the format, and information pasted, matched a
true e-mail header format. In this case, they appear to be formatted
properly and nothing was found to indicate fraud. Id. at 11(r)(i)
s.
RTF Specification Versions and Dates
i.
The RTF Specification is the blueprint of the Rich Text Format files that
were located on the floppy disks. He reviewed the actual versions of the
file format that existed at the time the files were created. This was done
similar to comparison to the versions of the software used to determine
11
if the physical structure of the file matched the specification out at the
time. In this case, nothing was found to indicate fraud. Id. at 11(s)(i)
t.
DOC Binary File Format Specification Versions and Dates
i.
Similar to the RTF Specification, one exists for the DOC files (Microsoft
Word). This was reviewed and compared to the existing files on the
floppy disks and in this case, nothing was found to indicate fraud. Id. at
11(t)(i).
It is apparent from this analysis that Mr. Ceglia copied the text of email
exchanges with Defendant Zuckerberg onto these floppy disks in 2003 and 2004.
These emails, as one would expect from typical email inbox content, include
Facebook related exchanges and those that are unrelated to Facebook.
They
contain harsh language exchanged, at times, between two partners working
together on at least two projects, including Facebook, working out the typical issues
of a start-up business. In contrast, Defendants’ experts alternate between a selfstyled thorough analysis of email evidence applicable to Mr. Ceglia’s claims and a
superficial style of analysis when checking Defendant Zuckerberg’s email records.
DEFENDANTS’ COMPUTER EXPERTS SUPERFICIAL WORK
A representative of computer forensics firm Stroz Friedberg, Mr. Bryan Rose,
has offered two declarations in this matter. Doc. Nos. 47 and 73.
In Doc. No. 47, he summarizes the assignment given to him by Defendants as
follows:
“On April 15, 2011 at the direction of Gibson Dunn, Stroz Friedberg
12
preserved the contents of a Harvard University email account assigned to and used
by Mr. Zuckerberg.” Doc. No. 47 at ¶4. How did he “preserve” this information?
From what source? Was he directly obtaining this information from Harvard’s
servers? Were these the same servers used back in 2003 and 2004 when Mr.
Zuckerberg’s email exchanges with Mr. Ceglia occurred?
What’s missing from this assertion by Mr. Rose is a declaration from someone
at Harvard attesting to the accuracy or completeness of whatever source Mr. Rose
“collected” his information from. Who told Mr. Rose that what he was preserving,
on whatever computer, was, in fact, the entire contents of Mr. Zuckerberg’s Harvard
University email account? What were the qualifications of that hearsay declarant
to know that Mr. Rose was “collecting” the entire contents of Mr. Zuckerberg’s email
account? Mr. Rose does not declare that he knows these “contents” to be everything
that ever existed in Mr. Zuckerberg’s email account. What backups did Harvard
periodically make of user email accounts? Are those backups available to be
examined by a computer forensics expert? Is Harvard saying that no emails were
deleted from Mr. Zuckerberg’s account at any time?
This email account “contents” was only the information that “resided on
Harvard’s server at the time of collection, including both sent and received email.”
Id. Mr. Rose can only say that his collection obtained everything on Harvard’s
server, at the time of collection. He cannot assure this court that he has reviewed
all emails that have ever been exchanged using this account. He cannot assure this
court that no emails were ever deleted from the account before he obtained his
13
“collection” or before Harvard, somehow, preserved the “contents” of Mr.
Zuckerberg’s email account. Certainly a large institution like Harvard regularly
made backups of user email accounts. How often were they made and where are
those backups stored now? Mr. Rose does not know and does not indicate he even
asked these questions of the Harvard person, (perhaps a technical person or
perhaps office staff) who directed him to wherever the “contents” of the account
were that he preserved. Mr. Rose fails to confirm that his “preservation” of the
email accounts was an accurate forensic copy1 of the data on the computer he
accessed.
Making matters tenuously worse, in the very next paragraph, Mr. Rose
acknowledges that he has to rely on the honesty, integrity and competence of some
unnamed person who “provided Stroz Friedberg with a copy of Mr. Zuckerberg’s
Harvard email account as it resided on Harvard’s server in October 2010.” Id. at
¶5. Nowhere in any declaration does Mr. Rose assure the court he confirmed the
accuracy or completeness of that email record. Garbage in, garbage out, is often the
phrase used in the computer world for not conferring a computer’s output with any
more reliability than its input. If Mr. Rose was provided a partial, incomplete,
inaccurate, erroneous copy of Zuckerberg’s account data as of October 2010, his
evaluation of that data is flawed from the start.
Forensic Copy is defined as an exact copy of an entire physical storage media (hard drive, CD-ROM,
DVD-ROM, tape, etc.), including all active and residual data and unallocated or slack space on the
media. Compresses and encrypts to ensure authentication and protect chain of custody. Forensic
copies are often called “image” or “imaged copies.” See Bit Stream Back-up and Mirror Image.
Sedona Glossary of ESI Terms, 2007.
1
14
Did Harvard IT staff search unallocated space2 for deleted emails from Mr.
Zuckerberg’s account in preparing that October 2010 data set? Was there any
evidence Harvard has about remote connection by anyone to Mr. Zuckerberg’s email
account from an Internet connected computer somewhere on campus or off campus
at any time since Mr. Zuckerberg opened his Harvard email account? Were any
devices connected to the Harvard email server at any relevant time that could have
retained copies of Mr. Zuckerberg’s deleted or un-deleted emails? Stroz Friedberg
has provided extensive data about devices attached to various computers provided
by Mr. Ceglia and his parents. It curiously provides zero information about this
relevant fact relating to the Harvard email server. Purely an oversight on their
part, or perhaps no “direction” was given to Mr. Rose to fully investigate the email
records he was provided. Mr. Rose examined whatever it was that Harvard told
him was responsive to his request. We do not even know what Mr. Rose requested
from Harvard, therefore, we do not know what is yet to be discovered about Mr.
Zuckerberg’s email account still retained by Harvard.
Mr. Rose then lists all the search terms he used in searching the incomplete
email records. Doc. No. 47, Exhibit B. Who provided him with these search terms?
If defense counsel provided those search terms, they have waded into expert witness
Unallocated space is defined as the area of computer media, such as a hard drive, that does not
contain normally accessible data. Unallocated space is usually the result of a file being deleted.
When a file is deleted, it is not actually erased, but is simply no longer accessible through normal
means. The space that it occupied becomes unallocated space, i.e., space on the drive that can be
reused to store new information. Until portions of the unallocated space are used for new data
storage, in most instances, the old data remains and can be retrieved using forensic techniques.
Sedona Glossary of ESI Terms, 2007.
2
15
territory and are now arguably subject to interrogatories and deposition to inquire
about their role in what is an expert function, i.e. searching email records
electronically. If Mr. Rose chose these search terms it is quite odd indeed how he
came to choose such random phrases out of the blue. Id. The court can examine
that exhibit for itself and reasonably conclude that someone provided these terms to
Mr. Rose and that he did not simply wake from a strategizing dream and roll over to
scribble them on his bedside notepad.
Who told Mr. Rose to only complete these rudimentary search tasks? Why
did he not search unallocated space or ask to have access to the servers at Harvard
and “collect” his data from there. Why no questions about backups, or copies of
email records in other places than just on Harvard’s servers? Why no questions
about whether Mr. Zuckerberg or anyone else ever connected to that email server
from various other Internet connected computers in the world?
As case law has held, computer forensics is not reduced to a keyboard jockey
poised in front of a monitor awaiting supplies of search terms from lawyers. No
expert is needed if that is the entirety of the domain of such experts.
Whether search terms or "keywords" will yield the information
sought is a complicated question involving the interplay, at least, of the
sciences of computer technology, statistics and linguistics. See George L.
Paul & Jason R. Baron, Information Inflation: Can the Legal System
Adapt?; 13 Ricn. J.L. & TECH. 10 (2007). Indeed, a special project team of
the Working Group on Electronic Discovery of the Sedona Conference is
studying that subject and their work indicates how difficult this question
is. See The Sedona Conference, Best Practices Commentary on the Use of
Search and Information Retrieval, 8 THE SEDONA CONF. J. 189 (2008),
available at http://www.thesedonaconferen ce.org/content/miscFiles/
Best_Practices_Retrieval_ Methods_revisecLcover_and_preface.pdf. Given
16
this complexity, for lawyers and judges to dare opine that a certain search
term or terms would be more likely to produce information than the terms
that were used is truly to go where angels fear to tread. This topic is
clearly beyond the ken of a layman and requires that any such conclusion
be based on evidence that, for example, meets the criteria of Rule 702 of
the Federal Rules of Evidence. U.S. v. O’Keefe, 537 F.Supp.2d 14 (2008).
Mr. Rose never accounts for the ability of Mr. Zuckerberg, or Harvard staff or
some third party intruding Mr. Zuckerberg’s email account to hit the “delete” key
and destroy Ceglia emails forever. The absence of the Ceglia/Zuckerberg emails at
issue in Mr. Zuckerberg’s email account inbox (which has not been conclusively
examined back to 2003 in any event) is not proof that the emails were never
exchanged with Mr. Ceglia. It is not proof that Mr. Ceglia’s emails are fakes at all.
The defense knows this, or they should know this, if they bothered to ask Stroz
Friedberg. It is without doubt that Mr. Rose will not offer any sworn statement in
any form that makes the claim that to a reasonable degree of scientific certainty,
the absence of Ceglia’s emails in Mr. Zuckerberg’s Harvard email inbox is proof of
fraud. That claim is a legal argument, and it is a legal argument unsupported by
evidence. Arguments like these should be accorded the same weight as the evidence
supporting them - in this case, zero.
This disinformation is repeated in pleadings and Mr. Snyder’s repetitive
public pronouncements and long courtroom monologues such as those in Doc. No.
94. The sheer frequency of repetition of a claim adds no weight to its veracity
despite counsel apparently thinking this is so.
Finally, the insufficiency of Mr. Rose’s superficial evaluation of incomplete
17
evidence in Zuckerberg’s email record is exposed by his colleague, Michael
McGowan. In Mr. McGowan’s declaration, Doc. No. 51, he provides the following
explanation of where it is proper to look for evidence (Note that this long list of
details to insure a search is complete relate to Stroz Friedberg’s interest in
searching Mr. Ceglia’s email records):
[E]vidence relating to authenticity can be extracted from many locations
on any computers on which the documents in question were created,
saved, viewed or modified. These locations include the computer system,
application and security logs, the unallocated space of the computers from
which deleted files or file fragments may be recovered, the portion of the
hard drives that stores the dates and times that files were created, last
accessed, and modified; and the files that show what documents were
recently accessed. Id at ¶4.
The comparison here reveals Stroz Friedberg is an advocate for Defendants,
not a neutral expert. When Ceglia’s email record is concerned, the above paragraph
details all sorts of items to examine and consider to confirm the authenticity of that
record. By stark contrast, when Defendant Zuckerberg’s email record is to be
“examined” no such probing examination is necessary.
In its zeal to advocate for the Defendants, Stroz Friedberg forgot this Cegliarelated detailed explanation of where to look for evidence. When examining
evidence of Defendant Zuckerberg’s email record, it asked none of the above
questions, searched in none of the suggested locations and failed to disclose this to
the court when making sworn declarations purporting to be comprehensive searches
of Mr. Zuckerberg’s Harvard email account records. Either Mr. McGowan is right
about how to properly search, or Mr. Rose is right, but they cannot both be right.
18
The defense can respond when they feel it is appropriate as to which declarant
mislead the court about how to properly and completely search for email records.
Mr. McGowan’s declaration was designed to persuade the court about how
extensive a search needed to be done of Mr. Ceglia’s computers. Mr. Rose’s
declaration omitted that extensive search methodology and was designed to
persuade the court that an extensive search had been done of Mr. Zuckerberg’s
Harvard email account records. As the record reveals, the extensive search that Mr.
McGowan urged was necessary was not done at all when Mr. Rose confronted
Defendant Zuckerberg’s email records. It is not a difficult logic problem to figure
out why that disconnect exists between Mr. McGowan’s comprehensive search
methodology suggestion applicable to Ceglia’s computers and Mr. Rose’s superficial
search methodology deployed on Defendant Zuckerberg’s email records.
THE 175 SUPPOSEDLY ONLY RELEVANT EMAILS
Defendants’ claim that there are only 175 relevant emails between
Zuckerberg and Ceglia in 2003 and 2004. It is beyond doubt that these are not the
sum total of the relevant emails to be hunted for in Mr. Zuckerberg’s account. It
takes little imaginative energy to posit a range of emails that would not contain Mr.
Ceglia’s name or StreetFax and yet be discoverable, relevant and admissible in this
case. Here are a few hypotheticals to prove the point.
1. An email from Zuckerberg to someone else, anyone else, with a message that
says in part, “I am working with this New York guy, doing some other coding for
him, he gave me several thousand dollars for part of facebook, but I am just
19
leading him on. He’s not going to get anything.”
2. Email from someone else to Zuckerberg: “Are you sure that guy is going to give
you the $2,000 we need to complete the facebook site design? You said he was a
dumb wanna-be entrepreneur with some photo program for intersections and a
database, but we really need the money and don’t need problems from a guy
claiming he owns half the company.”
3. Email to Zuckerberg from another early investor in Facebook: “Is that Cernia
(sp?) or whatever guy still in the company? I thought you were going to take care
of that, offer him double his investment back and just tell lie to him that the
company wasn’t going well and you felt obligated to give him his investment back.
What happened to that arrangement? Is he still doing his intersection photo
program?”
Again, Mr. McGowan of Stroz Friedberg offers this when urging the court to
permit a wide-ranging search of Mr. Ceglia’s computers:
While some information relevant to authenticity can be extracted
from individual files, much more such information is available from an
inspection of all of the computers or electronic media on which the files
were created, viewed, stored or modified. Critical information relating to
backdating or e-forgery can be gleaned from a computer’s file system; a
computer’s application, security and event logs; the metadata on unrelated
files; and the unallocated space of digital media...to name just a few. Doc.
No. 51 at ¶13.
Hypocritically, none of the above searching or inquiries were made relating to
Mr. Zuckerberg’s Harvard email accounts.
It is now obvious that a thorough review of Zuckerberg’s email inbox is
20
necessary and not merely a cherry-picked set of 175 emails that, conveniently, do
not mention his Facebook Contract with Mr. Ceglia. The Defendants’ evidence is
nothing more than diversion on this point. Ceglia exchanged emails with
Zuckerberg and has the text of those emails, contemporaneously saved, and
Zuckerberg says he never exchanged those emails with Ceglia. Mr. Ceglia
authenticates those emails by his sworn declaration. Computer expert confirms Mr.
Ceglia’s declaration by detailed, exhaustive computer analysis of the files
containing that email record. Any contrary argument or even testimony is not proof
of fraud, it is proof of a jury question.
“Defendants’ have already gathered substantial proof that Ceglia fabricated
the emails quoted in his Amended Complaint, just as he doctored the contract on
which he bases this entire lawsuit.” Doc. No. 45 at 19. Knowing what we all know
now, this statement could no longer be made by defense counsel without risking a
fraud on the court sanction himself. There is no “substantial proof”, but merely
irrelevant emails cherry-picked from an incomplete record searched with lawyer
supplied search terms probing no further. This is not “proof” much less “substantial
proof” unless by using the word “substantial,” Mr. Snyder meant, no proof at all.
Defendants now only have arguments, the same litany of repeated adjectives
(“fraud” “fabrication” “false” “doctored”) etc. they have spewed throughout this
lawsuit.
Any argument is just that - an argument.
It is not proof, it is not
substantial proof, it is the words of lawyers and up to this point, those words stand
unsupported in a sea of words the Defendants rely on instead of evidence. Without
21
a complete evaluation of all potential copies of any emails Defendant Zuckerberg
sent or received from 2003 forward, this court is unable to fully assess any email
related fraud claim from either party.
In fairness, before this court can
comprehensively rule on any fraud claim by the Defendants, Mr. Ceglia should be
given the opportunity to use a neutral expert to fully, completely and competently
examine all available email evidence relating to Mr. Zuckerberg.
CONCLUSION
For the foregoing reasons, Mr. Ceglia respectfully requests this court prohibit
Defendants from reliance on any argument that the Ceglia Zuckerberg email
exchanges are fraudulent as part of any motion to dismiss filed before full discovery
has been completed. In addition, he respectfully requests this court permit Mr.
Ceglia expedited discovery as to all potential sources of information about Mr.
Zuckerberg’s email accounts for the relevant time period of 2003 to the present time
in order to provide this court even more evidence supporting Ceglia’s established
authenticity of the email exchanges included as exhibits to this motion.
Respectfully submitted,
/s/Dean Boland
Paul A. Argentieri
188 Main Street
Hornell, NY 14843
607-324-3232 phone
607-324-6188
paul.argentieri@gmail.com
Dean Boland
18123 Sloane Avenue
Lakewood, Ohio 44107
216-236-8080 phone
866-455-1267 fax
dean@bolandlegal.com
22
Disclaimer: Justia Dockets & Filings provides public litigation records from the federal appellate and district courts. These filings and docket sheets should not be considered findings of fact or liability, nor do they necessarily reflect the view of Justia.
Why Is My Information Online?