
-4-
The receiver has steadfastly denied the timing of the first e-mail and steadfastly
denies sending the second email. Yet, the receiver offers no credible explanation for the
e-mail evidence. When asked to produce copies of the two e-mails and the server logs
for the two dates on which the e-mails were sent, the receiver has refused.
If the e-mails are authentic, the receiver has been caught not telling the truth. In
the face of the email evidence, the receiver’s response has been to insist more fervently
in the ‘truth’ of their position: ‘We swear, we didn’t send that email.’ As for explaining
the black and white evidence that they did, the receiver can only offer us a “Mystery”
(the receiver’s own words). While they seem to deny the authenticity of the e-mail, the
receiver speculates that maybe ‘The computer went and sent the second email to Jeff all
by itself.’ (the receiver’s own explanation).
Peter Vogel and his firm put themselves forth as experts on computer
technology, the forensics of electronic discovery, and the like. Yet, the best explanation
the receiver has to offer for the email evidence proving that they misrepresented the
truth to the Court is that it is a “Mystery”. Anyone who has used a computer
understands that there is a sent mail box. The receiver noticeably failed to mention
whether they have a copy of the ‘mystery’ e-mail in their sent mail box.
The receiver clearly did not understand that their E-mail has fingerprints.
Specifically, the receiver’s e-mail has both a thread index, <AcvvChO6Zczmw3xlQPK
2Qv1TKFaqkABgJY8g> and <AcvvChPDNJD+wBrwQiGLidYCi7IzIg==> and a
unique message ID, <B984C59883B3594BA31144D0472BDF1C8024B9B5@dalexm
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 3 of 24 PageID 17290