-2-
IN THE UNITED STATES DISTRICT COURT
FOR THE NORTHERN DISTRICT OF TEXAS
DALLAS DIVISION
NETSPHERE, INC., §
MANILA INDUSTRIES, INC., and §
MUNISH KRISHAN, §
Plaintiffs. §
§ Civil Action No. 3-09CV0988-F
v. §
§ Motion for Expedited Relief
JEFFREY BARON, and §
ONDOVA LIMITED COMPANY, §
Defendants. §
MOTION FOR LEAVE TO FILE: EXPEDITED MOTION TO COMPEL
PETER VOGEL TO PRODUCE RECORDS OF TWO E-MAILS
TO THE HONORABLE JUDGE ROYAL FURGESON:
COMES NOW JEFF BARON, and moves this Court to grant leave to file the
following expedited motion to compel Peter Vogel to produce records of two e-mails.
The records have been subpoenaed from the receiver, but he has refused to produce
them. (See Exhibit A).
A. BACKGROUND
The background of this motion is as follows:
The receiver represented to this Court that they did not circulate a conference
number to Jeff. The receiver represented that Jeff got the number (supposedly via a
conspiracy with Harbin) and called uninvited to the conference call in a despicable”
effort to threaten and harass. Then, the undersigned counsel produced two e-mails
proving that the receiver's story was a fabrication. The e-mails proved that the receiver
(1) had directed Jeff first on March 30, 2010 to call the phone conference to be held on
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 1 of 24 PageID 17288
-3-
April 1st, and then (2) again on April 1st directed Jeff to call a new number for the
conference.
The receiver is an official of the Court. Accordingly, a receiver who makes
false representations to the Court has lost all legitimacy as a receiver. Further, if a
receiver falsely represents the facts in carrying out the official business of the Court,
the integrity of the Court is itself threatened. The matter is relevant and serious.
At this point the receiver has been confronted with the evidence against them,
and has had the full opportunity to investigate and formulate their response. The
receiver has filed a least two 'explanations' (one under seal) digging in as to their
position.
The evidence and the receiver's explanation do not reconcile. On one side is the
evidence. The evidence includes an e-mail sent from the receiver on March 30, 2011
directing Jeff to call a conference call on April 1st. There is no ambiguity. The e-mail
was clearly sent on March 30. On the other side is the receiver, who insists that what
actually happenedwas that on April 1st a conference number was circulated and Mr.
Baron was “inadvertently included”. The timing clearly does not line up. Someone is
not telling the truth if the e-mails are authentic, the receiver has been caught in a
pattern of false representations to this Court.
Notably, there is no confusion over the date of the first e-mail evidence. The e-
mail clearly states it was received March 30th. The receiver has been requested to
produce the e-mail log for the dalexht2 Gardere e-mail server (that appears in the e-
mails “fingerprint”) for March 30, 2011. The receiver has refused.
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 2 of 24 PageID 17289
-4-
The receiver has steadfastly denied the timing of the first e-mail and steadfastly
denies sending the second email. Yet, the receiver offers no credible explanation for the
e-mail evidence. When asked to produce copies of the two e-mails and the server logs
for the two dates on which the e-mails were sent, the receiver has refused.
If the e-mails are authentic, the receiver has been caught not telling the truth. In
the face of the email evidence, the receiver’s response has been to insist more fervently
in the ‘truth of their position: ‘We swear, we didn’t send that email.’ As for explaining
the black and white evidence that they did, the receiver can only offer us a “Mystery
(the receiver’s own words). While they seem to deny the authenticity of the e-mail, the
receiver speculates that maybe ‘The computer went and sent the second email to Jeff all
by itself.’ (the receiver’s own explanation).
Peter Vogel and his firm put themselves forth as experts on computer
technology, the forensics of electronic discovery, and the like. Yet, the best explanation
the receiver has to offer for the email evidence proving that they misrepresented the
truth to the Court is that it is a “Mystery”. Anyone who has used a computer
understands that there is a sent mail box. The receiver noticeably failed to mention
whether they have a copy of the ‘mystery e-mail in their sent mail box.
The receiver clearly did not understand that their E-mail has fingerprints.
Specifically, the receiver’s e-mail has both a thread index, <AcvvChO6Zczmw3xlQPK
2Qv1TKFaqkABgJY8g> and <AcvvChPDNJD+wBrwQiGLidYCi7IzIg==> and a
unique message ID, <B984C59883B3594BA31144D0472BDF1C8024B9B5@dalexm
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 3 of 24 PageID 17290
-5-
b2.Gardere.com> and <B984C59883B3594BA31144D0472BDF1C8024B94E@dalexmb2.
Gardere.com>.
These unique numbers will locate the e-mail within 10 seconds of effort by doing
a search for them in the receiver's e-mail. These unique numbers will also be found in
the receiver's e-mail server logs, showing information about the e-mail including when
the e-mails were sent, from whom, and to whom. The receiver has been requested to
produce those logs, and the receiver has refused. In the end, the receiver's attempt to
hide the evidence will be futile. Google mail has a copy of Google’s server logs, which,
if necessary, will prove the authenticity of the e-mail exhibits including the date and
origin of the e-mails. The receiver has been caught red handed, and in the end, there is
no way out of the falsehoods they have put forth to this Court.
B. THE PRODUCTION REQUEST
The receiver has been requested to produce a copy of the e-mail with Message-
IDs <B984C59883B3594BA31144D0472BDF1C8024B9B5@dalexmb2.Gardere.com>
and <B984C59883B3594BA31144D0472BDF1C8024B94E@dalexmb2.Gardere.com>.
These are the two unique fingerprints of the two e-mails in question. These can be
found easily by the date of the e-mails, or by a search based on the ID numbers. The
receiver has refused to produce the e-mails.
The receiver was also requested to produce the e-mail threads to which those
emails belong. Those threads will show the exact sequencing of the e-mails within the
thread. Each thread covers the same topic, so that no information beyond the subject of
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 4 of 24 PageID 17291
-6-
the e-mails and proof of their authenticity would be disclosed by such a production. The
receiver has refused to produce the e-mail threads.
The receiver was requested to produce the logs of its e-mail sending program,
which tracks by Message-ID who sent each email, when, to whom (what IP and server)
the e-mail message was delivered. The logs would provide a list of Message-ID
numbers and technical information about the sending of those messages. The logs are
useless for discovering information about the content of any e-mail unless someone is
in possession of a specific email and can track the Message-ID in the log. That is the
case here. The logs themselves reveal no confidential information or the contents of
any correspondence. However, the logs’ checksum information can be used to
establish the authenticity of any particular e-mail if that e-mail is also available. The
log file is readily available and can be copied by a server technician in less than three
minutes of effort. The receiver has refused to produce the e-mail server logs.
C. THE RECEIVER’S PATTERN OF FABRICATION
The receiver filed a motion with the court affirmatively representing they did not
set up Mr. Baron to join the conference call, and he did so as part of a pattern of
intimidation. The receiver used the words "scare" and "intimidate" almost a dozen times
in their motion to discredit Mr. Baron and his counsel. The e-mail evidence is significant
because it proves (1) Mr. Baron was set up by the receiver—the call was placed because
the receiver made repeated efforts for Mr. Baron to place the call and (2) the receiver has
made repeated untrue representations to this Court. When confronted with the hard
evidence, the best the receiver could come up with is an entrenched denial. The
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 5 of 24 PageID 17292
-7-
receiver implies that the email evidence is fake. When requested to produce the e-mail,
the logs of the specific e-mail fingerprints, etc., the receiver has stonewalled and refused
to produce.
This incident is part of a pattern of fabrication on the part of the receiver. For
example, the receiver came up with the accusation against the undersigned counsel of
calling the Court a nazi officer. The receiver in multiple filings repeatedly made that
accusation to this Court. As another example, the receiver fabricated a claim that Mr.
Baron created and controls the Cook Islands manager of the LLC companies (CMDS).
The receiver just made up that claim out of thin air and falsely represented the
receiver’s fabricated ‘fact to the Court.
Here, once again, the receiver has continued that same pattern: fabrication
combined with the characterization of facts stretched beyond the point of legitimacy.
This includes also the following:
(1) The receiver’s characterization as a “threat and intimidationan email
sent to Ms. Schurig clarifying that Mr. Baron was not authorizing waiver of
attorney-client privilege. The text of the e-mail sent by Ms. Schurig, does not
match the recitations of the receiver of ‘threat and intimidation’.
(2) The receiver’s representation that Jeff sent an email “threatening them
not to provide the Receiver with privileged information”. The evidence
discredits the receiver’s representation. Jeff never told anyone not to provide
information, and he never threatened anyone with anything. The only thing Jeff
has ever done was, through his counsel, to state his position on the key issuesin
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 6 of 24 PageID 17293
-8-
response to written requests inquiring as to his position and to notify those
holding his privilege that he was not authorizing waiver of that privilege. Not
only was there no threat, no position was expressed as to the attorney’s
obligations.
(3) The receivers representation that Jeff accused “Ms. Schurig of
stealing $2 million from Mr. Baron [Docket No. 337] ("Felony Threat")”. Again
the receiver is fabricating accusations. Jeff took no position as to culpability or
the cause of the missing funds.
D. THE RELIEF REQUESTED
Jeff Baron moves jointly and in the alternative for the Court to order the receiver to
immediately:
(1) Produce copies of the emails with the message-id’s
<B984C59883B3594BA31144D0472BDF1C8024B9B5@dalexm
b2.Gardere.com> and <B984C59883B3594BA31144D0472BDF1C80
24B94E@dalexmb2.Gardere.com>;
(2) produce the receiver’s e-mail server logs for two specific days:
March 30, 2011 and April 1, 2011, specifically the logs of
dalexht1.Gardere.com and dalexmb2.Gardere.com for April 1 and
dalexht2.Gardere.com for March 30.
(3) produce a copy of all emails, and all server logs containing the
email Thread Indexes <AcvvCh06Zczmw3xlQPK2Qv1TKFaqk
ABgJY8g> or <AcvvChPDNJD+wBrwQiGLidYCi7IzIg==>;
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 7 of 24 PageID 17294
-9-
and
(4) produce the server logs containing the e-mail message-IDs:
a. <B984C59883B3594BA31144D0472BDF1C8024B9B5@dale
xmb2.Gardere.com> or
b. <B984C59883B3594BA31144D0472BDF1C8024B94E@dalexmb2
.Gardere.com>.
Respectfully submitted,
/s/ Gary N. Schepps
Gary N. Schepps
Texas State Bar No. 00791608
5400 LBJ Freeway, Suite 1200
Dallas, Texas 75240
(214) 210-5940 - Telephone
(214) 347-4031 - Facsimile
E-mail: legal@schepps.net
COURT ORDERED TRIAL
COUNSEL FOR JEFF BARON
CERTIFICATE OF SERVICE
This is to certify that this brief was served this day on all parties who receive
notification through the Court’s electronic filing system.
CERTIFICATE OF CONFERENCE
This is to certify that I was unable to obtain the receiver’s agreement to produce
the requested documents.
CERTIFIED BY: /s/ Gary N. Schepps
Gary N. Schepps
Case 3:09-cv-00988-F Document 455 Filed 04/18/11 Page 8 of 24 PageID 17295