AustLII Home | Databases | WorldLII | Search | Feedback

Supreme Court of New South Wales

You are here: 
AustLII >> Databases >> Supreme Court of New South Wales >> 2021 >> [2021] NSWSC 726

Database Search | Name Search | Recent Decisions | Noteup | LawCite | Download | Context | No Context | Help

Seven Network (Operations) Ltd v Dowling [2021] NSWSC 726 (21 June 2021)

Last Updated: 21 June 2021



Supreme Court
New South Wales

Case Name:
Seven Network (Operations) Ltd v Dowling
Medium Neutral Citation:
Hearing Date(s):
1 and 2 February 2021; last submissions received 23 February 2021
Date of Orders:
21 June 2021
Decision Date:
21 June 2021
Jurisdiction:
Equity
Before:
Rees J
Decision:
Defendant found guilty of contempt.
Catchwords:
COURTS AND JUDGES – apprehended bias – application for recusal – applicant published disparaging statements about judge and other judges of the court – statement by applicant about judges did not lead to apprehension that presiding judge may decide the case other than on its merits – judge determined earlier motion – principles at [12]-[18] – earlier motion on different subject matter – applicant did not give evidence – no findings of fact – no credit findings – no matter determined on a final basis – application refused.

CIVIL PROCEDURE – transfer of proceedings for apprehended bias – principles at [25] – application previously made – no change in circumstances since earlier application – Court should determine charge of contempt of its orders – application refused.

CONTEMPT – criminal contempt – orders restraining publication of text messages and blog – order to remove blog from website – orders served on publisher of website – blog continued to be published – evidence established that defendant was publisher of the website – criminal contempt proved.
Legislation Cited:
Cases Cited:
Australasian Meat Industry Employees Union v Mudginberri Station Pty Ltd (1986) 161 CLR 98; [1986] HCA 46
Australian National Industries Ltd v Spedley Securities Ltd (in liq) (1992) 26 NSWLR 411
Barakat v Goritsas (No 2) [2012] NSWCA 36
British American Tobacco Australia Services Ltd v Cowell (2002) 7 VR 524; [2002] VSCA 197
Capilano Honey Ltd v Mulvany (No 3) [2018] NSWSC 767
Chamoun v District Court of New South Wales [2018] NSWCA 187
Commonwealth Bank of Australia v Salvato (No 4) [2013] NSWSC 321
Doe v Dowling [2017] NSWSC 1793
Doe v Dowling [2017] NSWSC 202
Doe v Dowling [2019] NSWSC 1222
Dowling v Seven Network (Operations) Ltd; Dowling v Capilano Honey Ltd; Dowling v Jane [2019] HCASL 311
Ebner v Official Trustee in Bankruptcy (2000) 205 CLR 337; [2000] HCA 63
Fairfax Digital Australia & New Zealand Pty Ltd v Ibrahim (2012) 83 NSWLR 52; [2012] NSWCCA 125
Farahbakht v Midas Australia Pty Ltd [2006] NSWSC 1322
Furlong v Wise & Young [2019] NSWSC 1718
Green v The Queen (1971) 126 CLR 28; [1971] HCA 55
Hills Shire Council v Mouawad [2014] NSWLEC 59; (2014) 203 LGERA 233
In the matter of Jimmy’s Recipe Pty Ltd [2020] NSWSC 93
Kirby v Centro Properties Ltd (No 2) (2011) 202 FCR 439; [2011] FCA 1144
Lunn v The Commissioner for Public Employment [2009] NSWSC 19
McLean v Nicholson [ 2002] VSC 446 
Michael Wilson & Partners Ltd v Nicholls (2011) 244 CLR 427; [2011] HCA 48
Mirus Australia Pty Ltd v Gage [2017] NSWSC 1046
News Digital Media Pty Ltd v Mokbel (2010) 30 VR 248; [2010] VSCA 51
Nominal Defendant v Manning (2000) 50 NSWLR 139; [2000] NSWCA 80
O’Connor v Nationwide News Pty Ltd (1995) 128 FLR 61
Prothonotary of the Supreme Court of New South Wales v Dowling [2017] NSWSC 392
R v Chatzidimitriou (2000) 1 VR 493; [2000] VSCA 91
R v Dookheea (2017) 262 CLR 402; [2017] HCA 36
R v Hinch [2013] VSC 520
RPS v The Queen (2000) 199 CLR 620; [2000] HCA 3
Seven Network (Operations) Ltd v Dowling [2018] NSWSC 1890
Seven Network (Operations) Ltd v Dowling [2019] NSWSC 1760
Shepherd v The Queen (1990) 170 CLR 573; [1990] HCA 56
Trustees of the Christian Brothers v Cardone [1995] FCA 1309; (1995) 57 FCR 327
Category:
Principal judgment
Parties:
Seven Network (Operations) Ltd (First Plaintiff)
Seven West Media Ltd (Second Plaintiff)
Shane Dowling (Defendant)
Representation:
Counsel:
Mr K Smark SC (Plaintiffs)
Defendant (Self Represented)

Solicitors:
Addisons (Plaintiff)
File Number(s):
2017/00116771

JUDGMENT

  1. By motion dated 21 July 2017, the plaintiffs, Seven Network (Operations) Limited and Seven West Media Limited, seek to prosecute the defendant, Shane Dowling, for contempt. It is said that, in contempt of orders made by this Court on 19 April 2017 (the Orders), the defendant used or disclosed the content of text messages in a blog (the Fifth Blog Post) posted on a website of which the defendant was the sole owner or publisher (the Website) and, contrary to the Orders, did not remove the Fifth Blog Post from the Website.
  2. Rather, the Fifth Blog Post remained published on the Website until the plaintiffs obtained the domain name for the Website, following which the defendant established another website (the Second Website) on which the Fifth Blog Post continued to be published until 20 July 2017, being three months from the date of the Orders. The defendant disputes that he operated the Website or the Second Website and, further, that he was served with the Orders.
  3. Before the hearing had progressed beyond the plaintiffs moving on their motion, the defendant made an application that I disqualify myself for perceived bias and renewed an earlier application made to Kunc J (Seven Network (Operations) Ltd v Dowling [2019] NSWSC 1760) that these proceedings be transferred to Queensland. I refused both applications and said that I would publish my reasons with my judgment. My reasons follow.

APPLICATION FOR RECUSAL

  1. The relevant principles concerning recusal for apprehended bias are stated by Gleeson JA (with whom Hulme and Button JJ agreed) in Chamoun v District Court of New South Wales [2018] NSWCA 187 at [35]- [38]:
35 The test for determining whether a judge is disqualified by reason of the appearance of bias is “whether a fair-minded lay observer might reasonably apprehend that the judge might not bring an impartial and unprejudiced mind to the resolution of the question the judge is required to decide”: Johnson v Johnson (2000) 201 CLR 488; [2000] HCA 48 at [11]; Michael Wilson & Partners v Nicholls (2011) 244 CLR 427; [2011] HCA 48 at [31].
36 The test of apprehension of bias is objective. It does not require an assessment of the state of mind of the judge in question, as is necessary on an inquiry about actual bias: Johnson v Johnson at [12]; Michael Wilson & Partners v Nicholls at [33].
37 The application of the apprehension of bias principle requires two steps. The first is the identification of what it is said might lead the judge to decide a case other than on its legal and factual merits. The second is that there must be an articulation of the logical connection between that matter and the feared deviation from the course of deciding the case on its merits: Ebner v Official Trustee in Bankruptcy (2000) 205 CLR 337; [2000] HCA 63 at [8]; Michael Wilson & Partners v Nicholls at [63].
38 Accordingly, an allegation of apprehended bias requires an objective assessment of the connection between the facts and circumstances said to give rise to the apprehension and the asserted conclusion that the judge might not bring an impartial mind to bear upon the issues that are to be decided. The question is not whether the judge had in fact prejudged an issue: Michael Wilson & Partners v Nicholls at [67].
  1. The defendant applied for my recusal on, essentially, two bases.

Defendant’s allegations against other judges of this Court

  1. First, no judge of this Court is said to be able to bring an impartial mind to the matter given allegations which the defendant has made against officers of this Court, including the Chief Justice of New South Wales. These allegations were repeated during the hearing, albeit unaccompanied by any evidence to support the substance of the allegations.
  2. As I observed in Seven Network (Operations) Ltd v Dowling [2018] NSWSC 1890 at [58]- [62], ordinarily, an application that a judge recuse themselves for bias is based upon something that the judge has said or done. Here, the defendant does not point to anything said by a judicial officer but, rather, to what he has said about judicial officers as somehow preventing other judges of this Court fairly deciding proceedings in which he is a party. Similar applications failed in Attorney General v Markisic [2011] NSWSC 1436 and Prothonotary of the Supreme Court of New South Wales v Dowling [2017] NSWSC 392.
  3. I do not consider that a reasonable bystander would apprehend that, as a consequence of the defendant’s remarks about judicial officers, my ability to determine a case concerning the defendant in a neutral and dispassionate manner would be impeded. Indeed, a reasonable bystander would be unlikely to assume that I was particularly interested in the defendant’s remarks. Were it otherwise, all someone would need to do to avoid their matter being heard would be to make allegations about the Court. As Gleeson CJ, McHugh, Gummow and Hayne JJ observed in Ebner v Official Trustee in Bankruptcy (2000) 205 CLR 337; [2000] HCA 63 at [19]- [20]:
19 Judges have a duty to exercise their judicial functions when their jurisdiction is regularly invoked and they are assigned to cases in accordance with the practice which prevails in the court to which they belong. They do not select the cases they will hear, and they are not at liberty to decline to hear cases without good cause. Judges do not choose their cases; and litigants do not choose their judges. If one party to a case objects to a particular judge sitting, or continuing to sit, then that objection should not prevail unless it is based upon a substantial ground for contending that the judge is disqualified from hearing and deciding the case.
20 ... if the mere making of an insubstantial objection were sufficient to lead a judge to decline to hear or decide a case, the system would soon reach a stage where, for practical purposes, individual parties could influence the composition of the bench. That would be intolerable.
  1. I declined to recuse myself on this basis.

Judge has determined another interlocutory application

  1. Second, the defendant contended that I could not hear the matter given my earlier judgment and orders in Seven v Dowling [2018], when I determined an interlocutory motion filed by the defendant seeking orders that an interstate judge be appointed to hear the matter or that the matter be transferred to the Federal Court of Australia, and that a subpoena issued by the plaintiffs to the Commissioner of Police be set aside (the subpoena sought production of material including a hard drive belonging to the defendant (the Hard Drive)). At that hearing, the defendant contends that I denied him natural justice and his human rights and gave instructions to prison guards to threaten him “to participate, to go get the court books from my cell and all that”. The defendant elaborated on his concerns in an article published on his website shortly before this hearing, which included his views about my ability to hear the motion and my abilities generally.
  2. The plaintiffs submitted that the steps taken in Seven v Dowling [2018] were to dispose of the Court’s business, including to ensure that the defendant had the court book and was in a position to deal with the matter. The fact that the defendant had made strong criticisms of me in his recent article would not lead ordinary people to assume that I could not deal with this matter properly: Ebner at [20].
  3. As the High Court noted in Michael Wilson & Partners Ltd v Nicholls (2011) 244 CLR 427; [2011] HCA 48, the making of an interlocutory order does not, of itself, preclude the judge from sitting on the trial of that matter, as an interlocutory order will not usually require a judge to determine any matter on a final basis: at [68] per Gummow ACJ, Hayne, Crennan and Bell JJ. Something more is required, such as making a determination on an issue that is to be decided at trial, making a finding about the reliability of a party or witness, making a choice between competing versions of events, or making a decision as to the credit of a witness beyond determining that unchallenged evidence given on an interlocutory application was apparently credible: at [72]-[73].
  4. The example oft-cited is Australian National Industries Ltd v Spedley Securities Ltd (in liq) (1992) 26 NSWLR 411, where a series of cases arising from complex company litigation were assigned to Cole J of the Commercial Division. In some of the proceedings, Cole J made findings in which he was critical of the recollection, credit and commercial conduct of the parties. Mahoney JA (with whom Meagher JA agreed) considered that it was proper to approach a question of this kind upon the basis that, where decisions of fact or credibility had been made, a lay person may consider the judge will subsequently decide the same issue in the same way, that is, to have pre-judged the matter, contrary to the duty of impartiality imposed upon judges in the Australian court system: 435, 442. As Mahoney JA summarised the relevant principles at 438:
(a) the disqualification of a judge for apprehended pre-judgment depends on form rather than substance; (b) whether there is an unacceptable appearance of pre-judgment is to be decided, not according to likelihood, but according to possibility; (c) it is to be judged, not according to what the court and the parties know, but according to the impressions of a lay person who does not know the facts; and (d) there will be an unacceptable appearance of pre-judgment if the judge has previously dealt with the issue of fact or credibility which is before him in the instant case.
  1. The Court of Appeal held in Spedley Securities that Cole J should have disqualified himself from hearing related matters in which the same issues and the credit of the same witness would arise for determination as a fair-minded observer would conclude that Cole J had formed opinions which might affect his determination of outstanding matters.
  2. Thus, in Kirby v Centro Properties Ltd (No 2) (2011) 202 FCR 439; [2011] FCA 1144, Middleton J recused himself from hearing a trial on the basis that he had made factual findings and rulings in two previous cases that were relevant to and disputed in the upcoming trial: at [61]-[64]. Likewise, in Hills Shire Council v Mouawad [2014] NSWLEC 59; (2014) 203 LGERA 233, Pepper J recused herself by reason of an adverse finding made in respect of Mr Mouawad’s credit in earlier, unrelated proceedings.
  3. The Court of Appeal formulated the question in Barakat v Goritsas (No 2) [2012] NSWCA 36 at [11] per Basten JA, with whom Young JA and Sackville AJA agreed:
... the term "prejudgment" ... must refer to the apparent formation of a view on the part of the trial judge in respect of an issue which will (or may) need to be determined at the trial. Adapting the "central and determinative question" identified by the plurality in Michael Wilson & Partners, at [68], it is necessary to ask, "might what was done in connection with [the interlocutory] applications reasonably cause a fair-minded lay observer to apprehend that the judge might not bring an impartial mind to the resolution of a question for decision at the trial?"
  1. In Barakat, the applicants relied upon a series of disparaging remarks made by the judge of the applicants’ senior counsel during the course of a series of interlocutory applications. The judge’s remarks were said to reflect scepticism and disdain for the applicants’ case. As to how such evidence should be analysed, Basten JA observed at [13]:
... The fair-minded lay observer must be taken to have heard the whole of the exchanges between counsel and the bench on the relevant days, with some understanding of what was appropriate conduct for both counsel and the court and what was not. The fair-minded lay observer is unlikely to apprehend bias against one party merely because the trial judge describes the behaviour of counsel for that party as disgraceful or tendentious, unless the observer would consider such epithets inapt to the extent of being unreasonable and indicative of an inability to bring an impartial mind to bear on the issues in dispute. For example, to describe as "tendentious" a submission which did not come to grips with the issues which has been identified, or needed to be identified might be seen as reasonable, particularly if counsel had been given more than one opportunity to address the issue. To describe the labelling of a submission by counsel as "tendentious" as "a very serious accusation" might itself fall into the characterisation it sought to dismiss: applicants' written submissions at par 80. That is because the complaint failed to identify in what way the "accusation" was not reasonable, given the context in which it was used.
  1. The Court of Appeal concluded in Barakat that the judge’s comments were not sufficient to demonstrate that a fair-minded lay observer might hold the opinion that the judge might not determine fairly the issues on the basis of the evidence and arguments as to the facts and law presented to him: at [66].
  2. Returning to Seven v Dowling [2018], when the motion came before me for hearing on 13 September 2018, the defendant was in gaol. In preparation for the hearing, a court book had been prepared and supplied to him in gaol: Seven v Dowling [2018] at [38]-[39]. The hearing is described in Seven v Dowling [2018] at [40]-[41]:
[40] On 13 September 2018, the hearing of the Transfer Motion was listed before me. The defendant appeared by audio visual link. The defendant informed me that he did not have the Court Book with him in the video booth and had only been given 10 minutes’ notice of the hearing by prison officers. The defendant said he was not in a position to proceed with the hearing and would not be in a position to do so until he was released from gaol. I indicated that I was not minded to adjourn the hearing of the Transfer Motion given the procedural history of the matter. The defendant said he had been denied natural justice, did not have access to all of his documents, was otherwise engaged in preparing for other court proceedings, repeated his remarks about judicial officers and lay on the floor of the video booth. The court adjourned until a correctional officer provided the defendant with the Court Book in the video booth and he was given an opportunity to resume his seat.
[41] After the adjournment, the defendant declined to participate in the proceedings and declined to identify the affidavits which he relied upon in support of the Transfer Motion. The defendant sought an adjournment of the hearing of the Transfer Motion until he was out of gaol which “should be 21 September 2019” which was, obviously, a year away. ...
  1. The hearing was adjourned for two weeks. In the meanwhile, the defendant filed an Application for Removal to the High Court of Australia and sought to stay his motion. At the adjourned hearing of the defendant’s motion on 27 September 2018, I refused the defendant’s application for the proceedings to be stayed until the defendant’s application for removal to the High Court of Australia had been determined. (That application was ultimately refused with costs: Dowling v Seven Network (Operations) Ltd; Dowling v Capilano Honey Ltd; Dowling v Jane [2019] HCASL 311.) The hearing then proceeded as described in Seven v Dowling [2018] at [45]:
The defendant again indicated in no uncertain terms that he was not going to proceed on his motion. I informed him that, if he refused to participate in the hearing of the Transfer Motion, I may dismiss the motion because he declined to progress it. I asked him to identify the evidence that he relied upon in support of the Transfer Motion and he declined to do so. He declined to deal with the Transfer Motion.
  1. I refused the defendant’s application to adjourn the hearing of his motion until he was out of gaol, expected to be in about a year. I dismissed the defendant’s motion: Seven v Dowling [2018] at [69]. I also declined the plaintiffs’ request for an order for general access in respect of the Hard Drive. Instead, I appointed an independent solicitor to inspect the Hard Drive and identify any records over which the defendant may be entitled to claim legal professional privilege and to copy the non-privileged records onto a separate storage device, to be made available for inspection by the plaintiffs.
  2. Applying the principles set out at [12]-[18] to the case at hand, the motion which was the subject of Seven v Dowling [2018] concerned different subject matter to the contempt motion presently before the Court. The defendant did not give evidence. I made no findings of fact. I made no credit findings. I did not determine any matter on a final basis. I did not even determine the defendant’s motion but dismissed it for want of prosecution.
  3. As to whether, by reason of what was said and done during the hearings on 13 and 26 September 2018, prejudgment is indicated in respect of the contempt motion, the defendant’s central complaint is that I pressed him to proceed with his motion notwithstanding that he was then in gaol but appearing by AVL link and with the relevant materials before him in a Court Book. The fair-minded lay observer must be taken to have heard the whole of the exchanges between the defendant and the bench during those hearings, with some understanding of what was appropriate conduct for the defendant and the Court and what was not, in particular, having regard to the procedural history of the defendant’s motion documented in Seven v Dowling [2018] at [6]-[39], [67]-[68]. I do not consider that a fair-minded observer would be concerned that, having dismissed the defendant’s motion, I would not bring a fair and impartial mind to hear the evidence and submissions from the plaintiffs and defendant in respect of the contempt motion and to determine that motion according to law. I declined to refuse myself on this basis.

APPLICATION TO TRANSFER

  1. The defendant submitted that these proceedings should be transferred to Queensland because of perceived bias by the Court given his comments about judicial officers of this Court. A recent judgment by Kunc J refusing an earlier transfer application was said to be tainted with perceived bias: [2019] NSWSC 1760. As to why I should entertain a fresh application, the defendant submitted that Kunc J did not make a decision on whether to transfer the substantive proceedings (that is true, but his Honour did decide not to transfer the contempt motion). Further, since Kunc J’s judgment, the defendant had published a book on the subject of his allegations about judicial officers. The plaintiffs submitted that the basis of the present transfer application was the same as that earlier refused by Kunc J. In any event, the defendant had not shown a sufficient basis warranting a transfer.
  2. Where application is made to transfer proceedings between courts under cross-vesting legislation by reason of embarrassment or apprehended bias, an important consideration is whether a party is in a position to exercise authority over every judge of the Court. Collegiality between members of a Court, or the fact that a witness is known to all judges of the Court, is not sufficient: Lunn v The Commissioner for Public Employment [2009] NSWSC 19 at [21] (“special relationship of [a party] to the Judges” may warrant transfer); Trustees of the Christian Brothers v Cardone [1995] FCA 1309; (1995) 57 FCR 327 at 336 (“[t]here is no general rule that a judge is disqualified from hearing a case in which a witness known to him or her will be called”); McLean v Nicholson [ 2002] VSC 446  at  [17]  (proceedings transferred where “[a]s the Chief Executive Officer of this Court the plaintiff's father is the person principally responsible for the day to day operation of the Court in its non-judicial activities”); O’Connor v Nationwide News Pty Ltd (1995) 128 FLR 61 at 70 (“I do not consider that the judges of this or of the Federal Court are necessarily disqualified for apprehended bias merely by reason of their common membership with the plaintiff on the Federal Court”).
  3. As I understand it, the defendant contends that he is universally disfavoured by judges of this Court such that the motion should be transferred to Queensland. However, just such an application was recently refused by Kunc J. Generally, a court will only entertain further interlocutory applications if there has been a material change in circumstances or new evidence: Nominal Defendant v Manning (2000) 50 NSWLR 139; [2000] NSWCA 80 at [10]- [11] (Mason P); [72] (Heydon JA); [118] and [121] (Foster AJA). The matters that the defendant raises in support of his present transfer application were, by and large, raised and considered by Kunc J (see [2019] NSWSC 1760 at [6], [17] and [18]). In refusing the application, Kunc J followed Capilano Honey Ltd v Mulvany (No 3) [2018] NSWSC 767, where McCallum J observed at [34]:
...this Court is clearly the “more appropriate” Court to determine a question of contempt of its own orders. Indeed, it is doubtful whether the Court of another State would have authority to determine that question.
  1. Likewise, I note that, in Prothonotary of the Supreme Court of New South Wales v Dowling [2017] NSWSC 392, Adamson J observed at [9]:
... the power of a particular court to deal with proceedings for contempt is pre-eminently one which in my view ought be dealt with by the court itself as constituted by judges whose commissions are to the particular court.
  1. Kunc J considered that it was difficult to imagine a set of circumstances where it would be in the interests of justice for a court other than the court whose orders are alleged to have been contemptuously breached to determine a contempt motion: [2019] NSWSC 1760 at [24]. His Honour could see no proper basis to transfer the contempt motion to Queensland but left it open as to whether the substantive proceedings, as distinct from the contempt motion, should be transferred to Queensland: at [25]-[26].
  2. The only additional matter which has occurred since Kunc J dismissed the application to transfer is that the defendant has published a book making allegations concerning judicial officers of this Court. This does not seem to me to change the position. The appropriate court to determine a charge of contempt in respect of disobedience to this Court’s orders is this Court. For these reasons, I refused the defendant’s application to transfer the contempt motion to Queensland.

CONTEMPT MOTION

  1. The plaintiffs seek a declaration that the defendant was in contempt of Court for breach of orders made on 19 April 2017 (the Orders) including:
4 ... until further order, the defendant, by itself, its servants or agents, be restrained from using or disclosing, the content of text messages described in Confidential Exhibit RMK1 to the affidavit of Richard Michael Keegan sworn 19 April 2017 in this proceeding.
5 ... until further order, the defendant, by itself, its servants or agents be restrained from using or disclosing, the content of the [Fifth Blog Post] as defined in the affidavit of Richard Michael Keegan sworn 19 April 2017 in this proceeding.
6 ... until further order, the defendant forthwith remove from the [Website] [the Fifth Blog Post] as defined in the affidavit of ... Richard Michael Keegan sworn 19 April 2017 in this proceeding.
  1. According to the Statement of Charge:
3 The defendant was at all material times the sole owner and publisher of the [Website] ...
4 On 19 April 2017, the defendant was served with a sealed copy of the 19 April Orders by email in accordance with order 9 thereof.
5 The defendant was aware of the 19 April Orders:
a. Having been served as set out above; and
b. Having been sent a copy of the Orders to his email address
shanedowling@outlook.com on 26 April 2017 following the defendant's request to be provided with a copy of the orders in these proceedings.
6 From 6pm on 19 April 2017 in contumacious disobedience of Order 4 of the 19 April Orders, and thereby committing a contempt of the Court, the defendant disclosed and published the content of text messages described in Confidential Exhibit RMK1 to the affidavit of Richard Michael Keegan sworn 19 April 2017 in this proceeding.
7 From 6pm on 19 April 2017 in contumacious disobedience of Order 5 of the 19 April Orders, and thereby committing a contempt of the Court, the defendant disclosed and published the content of the [Fifth Blog Post] as defined in the affidavit of Richard Michael Keegan sworn 19 April 2017 in this proceeding.
8 From 6pm on 19 April 2017 in contumacious disobedience of Order 6 of the 19 April Orders, and thereby committing a contempt of the Court, the defendant failed to remove from the Website the [Fifth Blog Post] as defined in the affidavit of Richard Michael Keegan sworn 19 April 2017 in this proceeding.
...
12 From 8pm on 19 April 2017 until approximately 14 June 2017, the defendant continued to publish the [Fifth Blog Post] on the Website which published and disclosed the content of text messages subject to the suppression order in Order 7.
  1. The charge is of criminal contempt, being contumacious disobedience to the Orders that exhibits defiance of the Court, being wilful and not merely casual, accidental or unintentional. The plaintiffs seek that the defendant be punished for contempt, together with an order that he pay the plaintiffs’ costs of the motion forthwith and on an indemnity basis.

WITNESSES

  1. The plaintiffs relied on the evidence of solicitors, Richard Keegan and Alexander Latu, and digital forensic expert, Dr Bradley Schatz, each of whom were cross-examined.
  2. Mr Keegan was an honest and credible witness.
  3. Mr Latu was an honest, impressive witness and I accept his evidence.
  4. Dr Schatz has a Bachelor of Science (Computer Science) from the University of Queensland and a Doctor of Philosophy (Digital Forensic) from Queensland University of Technology. He is widely published, sits on the board of professional journals and conferences and is Adjunct Associate Professor at the Queensland University of Technology. Dr Schatz gave evidence in a fair and reasonable manner. He was an impressive witness and I accept his evidence.
  5. The defendant called no witnesses. It should be immediately noted that, this being a charge of criminal charge, the defendant has a right to silence and a privilege against self-incrimination: British American Tobacco Australia Services Ltd v Cowell (2002) 7 VR 524; [2002] VSCA 197 at [174]; Mirus Australia Pty Ltd v Gage [2017] NSWSC 1046, Ward CJ in Eq at [120]-[122]. As to the inference, if any, which may be drawn against a person who choses to exercise that right, Gaudron ACJ, Gummow, Kirby and Hayne JJ explained in RPS v The Queen (2000) 199 CLR 620; [2000] HCA 3, at [27]-[28]: (emphasis in original)
27 ... it will seldom, if ever, be reasonable to conclude that an accused in a criminal trial would be expected to give evidence. The most that can be said in criminal matters is that there are some cases in which evidence (or an explanation) contradicting an apparently damning inference to be drawn from proven facts could come only from the accused. In the absence of such evidence or explanation, the jury may more readily draw the conclusion which the prosecution seeks. As was said in Weissensteiner v The Queen:
“[I]n a criminal trial, hypotheses consistent with innocence may cease to be rational or reasonable in the absence of evidence to support them when that evidence, if it exists at all, must be within the knowledge of the accused.”
28 ... The observations by the Court in Jones v Dunkel must not be applied in criminal cases without taking account of those considerations.
  1. As such, I draw no adverse inference against the defendant by reason of his decision not to give evidence.

COMPUTER FILES, WEBSITES AND BLOGS

  1. The central question is whether the defendant operated the Website which published the plaintiffs’ confidential information in the Fifth Blog Post, contrary to the Orders. To this end, the plaintiffs retained Dr Schatz to analyse the Hard Drive and other material in order to ascertain whether the defendant published material on the Website. Some of the material found on the Hard Drive and relied upon by the plaintiffs on their contempt motion concerned material published by the defendant in respect of separate legal proceedings. The relevance of this material was that it was said to link the defendant to the Website.
  2. Some complexity and detail was involved in Dr Schatz’s evidence, including of a technical nature concerning computer files, websites and blogs.

Metadata

  1. According to Dr Schatz, computer files, such as Word and Excel documents, have internal and external “metadata” which assists in determining when the file was created, when the file was last modified and whether the file was sent, received or downloaded.
  2. As to internal metadata, computer files regularly store within them metadata that records the time and date of the last modification to the document (the Last Modified timestamp) and the author of the document, amongst other things. This metadata travels with the document when it is emailed, copied or moved. Editing and saving a document will generally update the Last Modified timestamp to the time and date the document was last saved.
  3. As to external metadata, computer files generally have associated with them metadata that records the time and date of creation (the Creation timestamp) and the time and date of the last modification of the file (the Last Modified timestamp) amongst other things. This metadata is wholly separate from the internal metadata.
  4. The value of the external Last Modified timestamp is dependent on the actions that have occurred in the file’s history.

(a) In general, while a file remains on a storage device, the Last Modified timestamp will not change, unless the file has been modified by the actions of a user or other process.

(b) When a file moves from one computer to the next using a storage device such as a USB drive, or from one disk to another within a computer, the Last Modified timestamp travels with the file, such that the new copy retains the same or nearly the same Last Modified timestamp as the original. Likewise, when a file is transferred within a ZIP file, the Last Modified timestamp usually travels with the file, however the precision of the new timestamp is significantly less than the original.

(c) However, when a file is downloaded from the internet or detached from an email, the Last Modified timestamp of the original file does not travel with the copy and the Last Modified timestamp is set to the time of the download or detachment.

  1. Recent versions of computers running Windows generally save documents downloaded from websites (using a web browser like Chrome, Firefox or Internet Explorer) in a folder named “Downloads”, where the associated Last Modified timestamp records when the file was downloaded. When the web browser downloads a file with the same name as a file that already exists in the “Downloads” folder, a new copy will be created with a file name having a number in parentheses appended to the original file name. For example, the first download of a file may have a file name “MER16_7457.pdf” and the second download of the same file will be named “MER16_7457 (1).pdf”. The content of the files is the same. The “Last Modified timestamp” indicates when the file was downloaded. The internal metadata of the document may contain an earlier Last Modified timestamp which may indicate, for example, when the file was last edited by its creator or publisher.
  2. In digital forensics, metadata is analysed according to these principles to form hypotheses regarding the history of particular files. Context is valuable in forming opinions on the meaning of the time and date stamps of specific files, as is the content of the files.

Websites

  1. Computers communicating on the Internet are uniquely identified by a unique internet address called an Internet Protocol (IP) address. IP addresses are to computers as mobile phone numbers are to mobile phones. The defendant is an account holder with Telstra. Telstra allocated the IP address 121.209.47.66 to the username shane-dowling@bigpond.com from 18 July 2016 until 12 May 2019. Dr Schatz concludes that this IP address was assigned to the defendant’s Telstra internet service.
  2. The Domain Name System (DNS) enables the unique IP address of a computer to be associated with a unique name (Domain Name), just as a telephone directory allows one to find the unique phone number associated with a person by name.
  3. To publish a website, one requires content, an internet connected computer with an IP address on which to host the content (a Webserver), configuration of the Webserver to display the content of the website when requested, a domain name and configuration of the DNS such that requests destined for the website go to the IP address of the Webserver.
  4. The content published on websites is under the control of the publisher of the website and may change over time or wholly disappear based on their actions. The archive.org Wayback Machine is an internet archive service which makes copies of websites, enabling one to retrieve the snapshot content of the website from an earlier point in time. The Wayback Machine does not archive copies of media such as pictures using webpages that it archives.

Blogs

  1. Web logs (Blogs) are a category of website generally focussed on publishing articles of a size smaller than a page. A single article is referred to as a Post and will generally be published on the Blog website in several locations such as the main landing (homepage) of the Blog website, along with other posts, for a time after it is published. In addition, the Blog may appearing via a permanent link residing on its own exclusive page. The publisher of a website can delegate the ability to post on that website.
  2. Operation of a Blog generally requires the installation of Blog application software along with Webserver software. Blog applications assemble posts into various pages and provide functionality to create, edit and delete posts using a simple word processor-like means. A commonly deployed Blog application is called Wordpress. The makers of the Wordpress software offer a service at Wordpress.com which outsources all of the technical aspects of running a Blog, enabling one to create a Blog and edit posts with a minimum of technical ability.
  3. When publishing posts using the Wordpress.com service, the publishing date appears in three places: the face of the Blog post, within the Blog post as internal metadata, and within the address of the Blog post. When publishing a post using Wordpress.com, the author can backdate a post by choosing the apparent time of publishing using the “Choose a date to schedule” date picker. When backdating Blog posts, all three publishing dates will be set to the backdated time and date. The actual time and date of publishing a Blog may be ascertained in two ways. First, the internal metadata of the page records the actual time and date of publishing using the “article:modified_time” metadata. However, this metadata is updated whenever the article is modified and so cannot be used to conclusively identify backdated pages. Second, when creating a backdated Blog post that includes uploaded photographs, traces of the actual month and year of publishing are automatically left in the addresses of the photographs.
  4. If multiple people are using a computer, it makes it much more difficult to ascertain who is responsible for a particular post, although it is easier to ascertain on a computer than where multiple persons have access to a website on which blogs are posted. Although two people could be logged into a computer at the same time, you would see one person doing things while the other person was not, or one would be logged out from the computer while the other was operating. Websites are more open to people accessing and working in parallel. Dr Schatz did have the possibility of multiple users in mind when performing his analysis.

FACTS

  1. Much of the evidence relied upon by the plaintiffs came from the Hard Drive. The provenance of the Hard Drive should be considered at the outset.

The Hard Drive

  1. The defendant published articles on the internet from time to time, on a website which he acknowledged is his. On 21 June 2017, the NSW Police executed a search warrant at the defendant’s apartment and took his computer. The plaintiffs came to learn of this fact from an article published by the defendant on his website. On 5 July 2017, at the plaintiffs’ request, a subpoena was issued to the Commissioner of Police for production of the following material:
1. Documents recording the results of any inspection or analysis of the computers, hard drives, electronic devices or storage devices obtained pursuant to a search warrant executed on the address [at] Bondi Beach ... on or around 21 June 2017.
2. Any computers, hard drives, electronic devices or storage devices obtained by NSW Police, or copies of any of the information found on same made by NSW Police, as a result of the search warrant executed on the address [at] Bondi Beach ... on or around 21 June 2017.
  1. The Commissioner of Police produced a laptop and the Hard Drive to the Court in answer to the subpoena. As described in Seven v Dowling [2018] at [13], on 17 July 2017, the laptop was returned to the defendant. In his submissions, the defendant said that he disposed of the computer as he was concerned that it may have been loaded with spyware or malware as it had been in the hands of people about whom he had written.
  2. That left the Hard Drive. The journey of the plaintiffs’ efforts to obtain access to the Hard Drive is charted in Seven v Dowling [2018] at [10]-[46]. In short, the plaintiffs were initially given general access to the Hard Drive by the registrar on 14 July 2017. The plaintiffs arranged for the Hard Drive to be uplifted and copied by approved copiers. Both the Hard Drive and the copy were returned to the Court on 17 July 2017, when McCallum J revoked the general access order. There the Hard Drive stayed, until I made the following orders in Seven v Dowling [2018] on 7 December 2018:
3 Pursuant to Rule 31.54 of the Uniform Civil Procedure Rules 2005 (NSW), appoint [independent solicitor] to provide assistance in these proceedings as follows:
(a) uplift packet S-5 (the Hard Drive) from the Exhibits Office;
(b) inspect the contents of the Hard Drive and identify any records to which the defendant may be entitled to claim client legal privilege under section 118 or 119 of the Evidence Act 1995 (NSW);
(c) copy the records identified in (b) onto an electronic storage device to be clearly labelled “Privileged Data: No access is to be granted without leave of the Court”;
(d) copy any remaining records on the Hard Drive to a second electronic storage device to be clearly labelled “Available Data: general access pursuant to orders made on 7 December 2018”;
(e) return the Hard Drive to the Exhibits Office; and
(f) provide to the Court by 28 February 2019:
(i) the two electronic storage devices described in (c) and (d); and
(ii) a report as to how the task described in this Order was completed.
4 Grant the plaintiffs access to the electronic storage device labelled “Available Data: general access pursuant to orders made on 7 December 2018” on and from 1 March 2019.
  1. The independent expert completed the task and provided the report on 28 February 2018, noting that examination of the Hard Drive revealed 5 privileged documents. The independent expert made a copy of the non-privileged material. In March 2019, the plaintiffs obtained access to the electronic storage device containing a copy of the non-privileged material found on the Hard Drive. The term “Hard Drive” is used in this judgment hereafter to refer to the copy of non-privileged material on the Hard Drive to which the plaintiffs were given access.
  2. The defendant submitted that the Hard Drive had been handed over to the plaintiffs in scandalous circumstances, which I take to be a reference to my decision in Seven v Dowling [2018]. Further, the Hard Drive should not be relied upon as it was “severely tainted as half of Sydney had access to it”, including officers of this Court against whom he had made allegations and who had access to the Hard Drive for over a year before the plaintiffs were given access.
  3. Dr Schatz agreed that anyone who had access to the Hard Drive with significant technical ability had the ability to modify it. I do not doubt that, if a person with such skills had accessed the Hard Drive whilst it languished in the Exhibits Office before being uplifted by the independent expert, then such a person could have modified the Hard Drive. There is no evidence that anyone did. Nor is there any indication in Dr Schatz’ report or oral evidence that he detected any such modifications. I do not draw any inference against the defendant for failing to call evidence that the Hard Drive was modified by a third party. The onus of proof remains on the plaintiffs in all respects. But I can only proceed on the basis of evidence before the Court, which is that the Hard Copy is a proper copy of the defendant’s documents and files as at 21 June 2017, seized by the police when executing a search warrant at the defendant’s residence.

Employee dispute

  1. In July 2014, the plaintiffs had a dispute with an employee (the Employee). In November 2014, following mediation, the plaintiffs and the Employee entered into a Deed of Release, the terms of which were confidential and included an agreement by the Employee not to publish “Confidential Information”, being a term defined in the deed.
  2. It appears that the Employee did not comply with the deed. As I understand it, the Employee filed a complaint with the Australian Human Rights Commission in respect of her employment with the plaintiffs. The complaint alleged that other women working for the plaintiffs had also experienced the same behaviour about which the Employee complained.

First Blog Content

  1. On the Hard Drive is a JPEG file, being a photograph of two of the women referred to in the Employee’s complaint to the Australian Human Rights Commission (First Blog Content). The First Blog Content has a Last Modified timestamp of 10.14 pm on 20 December 2016 and was later used in the first Blog Post on the Website (First Blog Post): see [88(a)].

Jane Does proceedings

  1. On 21 December 2016, the defendant published an article on the internet which, as I understand it, made similar allegations to those contained in the Employee’s complaint to the Australian Human Rights Commission. The same day, the two women referred to in the article – and photographed in the First Blog Content – commenced defamation proceedings against the defendant in the Common Law Division of this Court. The women were permitted to sue by the names “Jane Doe 1” and “Jane Doe 2” in order to ensure that they would not suffer further damage through publicity that might be given to the proceedings: Doe v Dowling [2019] NSWSC 1222 at [2] per Fagan J. (Two further women were later added to the proceedings as “Jane Doe 3” and “Jane Doe 4”.)

Second Blog Content

  1. On 12 February 2017, two JPEG images were stored on the Hard Drive, being page 5 and page 6 of the Employee’s complaint to the Australian Human Rights Commission (Second Blog Content). These pages had two distinctive formatting features: as the footer of the pages was partially cropped; and, grey borders appeared down the left and right side of each page. The Last Modified timestamps of the two JPEG images were 1.43pm and 5.59pm on 12 February 2017 respectively. Dr Schatz says the Last Modified timestamps may be the times of creation of the two screen shots, the time of download of the screenshots from an unknown third-party website or the time of detachment from an email.
  2. The Second Blog Content later formed part of the First Blog Post: see [88(b)].

Employee proceedings

  1. On 13 February 2017, the plaintiffs commenced proceedings against the Employee seeking orders restraining use of Confidential Information in breach of the Deed (Employee proceedings). On 13 February 2017, McDougall J made interim orders restraining the Employee from using the Confidential Information.

Third Blog Content

  1. On the Hard Drive are five files dated from 17 February 2017 in which a composite picture of Jane Doe 3 and Jane Doe 4 was compiled.
  2. First, the Hard Drive has a JPEG file containing a photograph of Jane Doe 3, with a Last Modified timestamp of 10.37 pm on 17 February 2017.
  3. Second, the Hard Drive had a JPEG file containing a photograph of Jane Doe 4, with the Last Modified timestamp of 10.38 pm on 17 February 2017.
  4. Third, the Hard Drive had a JPEG file containing the two photographs referred to at [70]-[71] aligned side-by-side, with a Last Modified timestamp of 10.46 pm on 17 February 2017. The file is called “[Jane Doe 3 and Jane Doe 4].jpg”.
  5. Fourth, the Hard Drive has a Microsoft Publisher file entitled “[Jane Doe 3 and Jane Doe 4].pub”, with the Last Modified timestamp of 10.47.08pm on 17 February 2017. The internal Last Modified timestamp for the “[Jane Doe 3 and Jane Doe 4].pub” file was also 10.47.08 pm on 17 February 2017.
  6. The internal Author metadata for the “[Jane Doe 3 and Jane Doe 4].pub” file is “SHANE DOWLING”. Dr Schatz says that the internal metadata “Author” field is generally set when a file is created, based on the User Name that a copy of Microsoft Office is personalised to. This is generally set once and forgotten about but can be changed by the user.
  7. Dr Schatz filtered the Word Excel and Publisher documents on the Hard Drive for documents which had their “Author” or “Last Author” internal metadata as “SHANE DOWLING”. There were 769 such documents on the Hard Drive. The most straightforward explanation is that the documents were authored on the defendant’s computer. Other possibilities include that the documents were purposefully modified to reflect the defendant as the author, or the documents are derivatives of wholly different documents authorised by the defendant.
  8. Fifth, the Hard Drive has a JPEG file containing a photograph of Jane Doe 3 and a photograph of Jane Doe 4, aligned side-by-side. The file name is “[Jane Doe 3 and Jane Doe 4] 2.jpg” (Third Blog Content). The Last Modified timestamp of the Third Blog Content is 10.49 pm on 17 February 2017. The Third Blog Content was used in the First Blog Post: see [88(c)].
  9. Dr Schatz regarded the internal and external Last Modified timestamps as equivalent and best explained by the file having come into existence on the computer from which the Hard Drive is derived. Other less likely possibilities include that the files were copied from a third-party hard drive with the same temporal precision characteristics, for example, an external NTFS formatted USB drive, although external hard drives generally do not have this characteristic. Or, the files could have been transported to the computer via an unknown server that accurately preserved timestamps of such precision. Dr Schatz is not aware of any generally used file transfer methods which are able to preserve such precision when transferring files. Based on the timestamps, Dr Schatz is of the opinion that it is unlikely that this is consistent with a download.
  10. According to Dr Schatz, the most straightforward interpretation of the timestamp for these files in this context is the time at which each picture or document was last saved. The documents and timestamps are also consistent with the production of the composite picture from the individual photographs, using the program Microsoft Publisher.
  11. Two days later, on 19 February 2017, the defendant published an article on the internet, which referred to Jane Doe 3 and Jane Doe 4. On 20 February 2017, the defendant issued a Tweet in respect of the Employee proceedings. On 21 February 2017, McDougall J extended the interim orders and the defendant issued a second Tweet on the subject. On 21 February 2017, an amended statement of claim was filed in the Jane Does proceedings, joining two additional plaintiffs under the pseudonyms Jane Doe 3 and Jane Doe 4: Doe v Dowling [2017] NSWSC 1793 at [4]. A non-publication order was made in favour of Jane Doe 3 and Jane Doe 4. An injunction was ordered restraining the defendant from publishing the 19 February 2017 article in any form which included the names of Jane Doe 3 or Jane Doe 4, or any secondary article in any form which included their names: Doe v Dowling at [4].
  12. On 21 February 2017, two JPEG images were stored on the Hard Drive with Last Modified timestamps of 10.36pm and 10.37pm respectively, being page 5 and page 6 of the Employee’s complaint to the Australian Human Rights Commission. The file name for each JPEG was the same as for the Second Blog Content, with the additional word, “cropped”. The grey borders are gone. Mr Latu says the JPEG images have been stretched so that the partially cropped footers are not visible. On 22 February 2017, a Microsoft Word document containing the defendant’s defence in the Jane Does proceedings was Last Modified at 11.23pm on the Hard Drive. The defence incorporated pages 5 and 6 of the Australian Human Rights Commission complaint as “cropped”.
  13. On 23 February 2017, the defendant filed a defence in the Jane Does proceeding, which incorporated pages 5 and 6 of the Australian Human Rights Commission complaint as “cropped”. (The defence on the Hard Drive is an unsigned version of the defence filed on 23 February 2017). The defendant tweeted a copy of his defence, being a PDF file containing a scan of the sealed defence. The tweet contained a URL link to the defence. The first time Mr Latu became aware that pages 5 and 6 from the Employee’s complaint to the Australian Human Rights Commission had been published online was when the defendant tweeted a copy of his defence.

Fourth Blog Content

  1. The Hard Drive contains a JPEG image for a LinkedIn screen image with a Last Modified timestamp of 9.02 pm on 23 February 2017 and another JPEG for a Twitter image with a Last Modified timestamp of 9.03 pm on 23 February 2017 (Fourth Blog Content). The Fourth Blog Content concerned a television producer. The Fourth Blog Content was later used in the second Blog Post on the Website (Second Blog Post): see [95].

The Website

  1. The plaintiffs became aware of the Website, which contained commentary on the Employee proceedings. The “About” section of the Website indicated that the publisher was aware of the orders made by McDougall J in the Employee proceedings. The “About” page also provided a contact email address, ending “gmx.com”.
  2. Mr Keegan did a “whois” search on icann.org (ICANN is the Internet Corporation for Assigned Names and Numbers). Dr Schatz says such searches return historical and current information related to the registration of domain names. The search indicated that the registrar of the domain name for the Website was Automattic Inc, a web host based in the United States, and the domain name for the Website was registered on 25 February 2017. Dr Schatz says it is likely that the domain for the Website was created on or about 25 February 2017, assuming the relevant registrars and information services were maintaining accurate records.
  3. Mr Latu agreed that he had never seen a receipt saying that the defendant owned the Website, nor did Mr Latu expect to find a copy of such a receipt on the Hard Drive. He did not specifically look for a receipt, nor did he think it was in “standard course” to look for a receipt to prove ownership of a website. Mr Latu considered the possibility of other persons owning the Website “but no-one emerged to follow up on”.
  4. Dr Schatz was not asked to look for a receipt, although he had looked for a receipt a number of times in the past, “although it is often very difficult to find the operators of websites when they hide behind anonymising services.”

First Blog Post

  1. The First Blog Post to appear on the Website was dated 6 January 2017, although the domain name for the Website was not registered until 25 February 2017 and, in Dr Schatz’s experience, a website cannot generally be published to a website address without the domain in the website address first having been registered. As noted at [53], it is possible to backdate a post, and that is what happened here.
  2. Dr Schatz found an archived copy of the First Blog Post using the archive.org Wayback Machine. The internal metadata of the file contains a Publication timestamp of 6 January 2017 but an internal Last Modified timestamp of 10.12 pm on 27 February 2017. The First Blog Post contains a title and a single introductory sentence followed by:

(a) the First Blog Content;

(b) the Second Blog Content; and

(c) the Third Blog Content.

  1. As noted at [66], the Last Modified timestamps on the Second Blog Content is after the apparent publication time of the Blog post but before the Last Modified time of the First Blog Post. Dr Schatz considered that this supported a conclusion that the First Blog Post had been backdated by the publisher. If the images were already published to the Website, it is also possible that they were downloaded from the Website, however, this would require the party downloading the pictures to have named them differently to published file names.
  2. According to Dr Schatz, the “[Jane Doe 3 and Jane Doe 4] 2.jpg” file appears identical to the Third Blog Content, when taking into account Wordpress.com’s media renaming. The composite image of Jane Doe 3 and Jane Doe 4 is the only time of which Mr Latu is aware that the image has been published online, having made searches for the image elsewhere.
  3. Dr Schatz has reviewed archived copies of the First Blog Post for references to the pictures viewable in the screenshot copy. The addresses for the pictures contain embedded dates indicating that the First Blog Content was first uploaded to Wordpress in January 2017, while the Second Blog Content and Third Blog Content were first uploaded in February 2017. The differing upload dates for the pictures is best explained, according to Dr Schatz, either by:

(a) the First Blog Post having been created on 6 January 2017 and edited in February 2017 to add the Second Blog Content and the Third Blog Content;

(b) the First Blog Post having been backdated to appear to have been created on 6 January 2017 at some time in January 2017, and edited in February 2017 to add the Second Blog Content and Third Blog Content;

(c) the First Blog Post having been backdated to appear to have been created on 6 January 2017 by reusing a picture that was uploaded in January 2017 and then edited in February 2017 to add the remaining pictures.

  1. Dr Schatz considers that the evidence does not conclusively support the First Blog Post having existed on 6 January 2017, due to the potential for backdating and evidence of modification of the post. It is possible to create a blog on Wordpress.com without publishing via top level domain such as the Website. One may use a sub-domain of Wordpress.com such as [Website].wordpress.com. It is possible that, prior to 25 February 2017, the First Blog Post existed as a sub-domain-based blog, and was then published and publicly accessible via the Website on registration of the domain.
  2. Having regard to the fact that the domain name for the Website was not registered until 25 February 2017 (before which the Website could not be published to a website address), the Second Blog Content was Last Modified on the Hard Drive on 12 February 2017, the Third Blog Content was created on 17 February 2017, and the internal Last Modified timestamp of the First Blog Post was 27 February 2017, I consider it is much more likely that the First Blog Post was posted on or about 27 February 2017 and backdated. Whilst the First Blog Content had a Last Modified timestamp of 20 December 2016, being before the stated date of the First Blog Post, this is the only component of the First Blog Post which pre-dated the stated publication date and was a photograph likely uploaded to Wordpress in January 2017 for use in publications in respect of Jane Doe 1 and Jane Doe 2 other than the First Blog Post.
  3. The plaintiffs submitted that the defendant had reason to create the misleading impression that the blog was been published before 23 February 2017. The defendant was aware of orders made in the Employee proceedings that limited the ability of the obvious source of the complaint to the Australian Human Rights Commission – the Employee – to publish the document. The links between the Employee and the defendant’s website limited his ability to publish it on his own website without creating difficulties for the Employee. Whilst this submission makes sense, the link between the Employee and the defendant was not established by evidence and so I have not taken this suggestion into account.

Second Blog Post

  1. On 27 February 2017, the Website published the Second Blog Post, which was an article concerning the Employee proceedings. In the article, following the words “Below are screenshots taken on the 23/2/2017”, are embedded images of web search results of LinkedIn and Twitter, being the Fourth Blog Content.
  2. The Second Blog Post indicates that the article was published on 27 February 2017 and the address contains an embedded date of the same date. Dr Schatz obtained an archived copy of the page using the Archive.org Wayback Machine. The internal metadata of the file contained a Publication date of 11.51 pm on 27 February 2017 and an internal Last Modified timestamp of 12.19 am on 28 February 2017.
  3. The addresses associated with the Fourth Blog Content bore the same file names as on the Hard Drive when taking into account the naming scheme applied by the Blog provider, Wordpress.com. The Fourth Blog Content was captured on 23 February 2017, being the same date as reflected on the Last Modified timestamps of the two files found on the Hard Drive. The content of the files on the Second Blog Post and the Hard Drive appear exactly the same.
  4. The Last Modified timestamps for the Fourth Blog Content are approximately four days earlier than the Publishing date of the Second Blog Post. Based on the timestamps, the possible interpretations of the Last Modified timestamp include the times of creation of the two screen shots, the time of download of the screenshots from an unknown third-party website, or the time of detachment from an email.
  5. Whilst Dr Schatz says it is possible that the Fourth Blog Content was downloaded from the Second Blog Post, this would require the party downloading the pictures to have named them differently to published file names. In addition, the clock of the computer on which they were downloaded would have to have been at least four days slow and, in his experience, modern internet-connected computers generally keep good time. I consider that it is far more likely that the Fourth Blog Content came from the defendant’s computer.
  6. On 5 March 2017, the defendant published an article on the internet which was in similar terms to the Second Blog Post.

Fifth Blog Content

  1. The Hard Drive contains PNG images with a Last Modified timestamp of 7.35 am on 4 March 2017, with one image for each page of the complaint to the Australian Human Rights Commission from page 3 to page 29: the footers of each page are partially cropped; there are grey borders on each side of the page (Fifth Blog Content).
  2. According to Dr Schatz, the internal DateCreated metadata for each PNG file ranges from 8.29 pm to 8.34 pm on 3 March 2017. The internal metadata also includes “exif:UserComment: Screenshot”. In Dr Schatz’s opinion, the DateCreated metadata is best explained by the time of creation of each manual snapshot from a source document. The Fifth Blog Content was used in the third Blog Post on the Website (Third Blog Post): see [104].
  3. The Last Modified timestamps for the PNG files all fall between 7.35.29 am and 7.35.30 am on 4 March 2017. According to Dr Schatz, the Last Modified timestamp may refer to the time of downloading the screenshots from somewhere other than the Website or the time of detachment from an email.

Third Blog Post

  1. On 5 March 2017, the Third Blog Post was published on the Website, containing pages 3 to 29 of the complaint to the Australian Human Rights Commission, with the footers of each page partially cropped and with grey borders on each side, that is, the Fifth Blog Content. Other than the Fifth Blog Content, the Third Blog Post comprised a title and two introductory sentences identifying what followed.
  2. While it is possible that the Fifth Blog Content was downloaded from the Website, Dr Schatz considers that, as the publication time (being 1.18 pm on 5 March 2017) was after the hypothetical download time, this would require the party downloading the pictures to have named them differently to the published file names, and the clock of the computer on which they were downloaded to have been at least one day slow. According to Dr Schatz, the PNG files on the Hard Drive appear to be identical to the images found on the Third Blog Post. The file names are consistent with the addresses of the pictures referenced by the Third Blog Post. That is, the Fifth Blog Content most likely came from the defendant.

Fourth Blog Post

  1. On 10 March 2017, in the Jane Does proceedings, McCallum J heard applications by Jane Doe 3 and Jane Doe 4 to continue the interlocutory injunction against the defendant until further order whilst the defendant sought a review of the non-publication and pseudonym orders given in favour of all Jane Does. As McCallum J later noted in Doe v Dowling at [47]:
On the first day of the hearing before me, [the defendant] foreshadowed adducing evidence that the continuation of the injunction would be futile because the allegations made in his articles are “all over the internet”.
  1. On 16 March 2017, a blog was posted on the Website (the Fourth Blog Post) which contained a photograph of Jane Doe 1 and Jane Doe 2, which was similar to but not the same as the First Blog Content and appears to have been taken on the same occasion. There is no suggestion that this photograph was found on the Hard Drive. However, the Fourth Blog Post asserted that allegations concerning Jane Doe 1 and Jane Doe 2 were “all over the internet”. Further, the defendant later included the Fourth Blog Post in his written submissions in the Jane Doe proceedings, described as one of “my articles”: see [147].

Complaint about domain name

  1. The plaintiffs’ solicitors submitted a complaint to the World Intellectual Property Organisation (WIPO) concerning the domain name for the Website. The name and contact details of the domain name registrar (the respondent to the WIPO complaint) were protected by an anonymisation service (privatewho.is) at the time the complaint was made. The complaint was sent to only two email addresses, being domain.disputes@wipo.int and icann@automattic.com, the latter being the domain name registrar.
  2. On 22 March 2017, the WIPO case manager informed the plaintiffs that the registrant’s contact details had been obtained from the domain name registrar. The registrant’s email address was that ending in “gmx.com”, which also appeared on the “About” page of the Website: see [83]. The WIPO case manager’s email was copied to the “gmx.com” email and to the anonymisation service, “privatewho.is”. The plaintiffs were invited to re-submit their complaint based on the registrant information.
  3. On 27 March 2017 at 9.26 pm, Mr Keegan sent an email to the WIPO case manager copied to the “gmx.com” and “privatewho.is” email addresses, attaching an amended complaint together with annexures. Mr Keegan’s email and its attachments are on the Hard Drive. The “Downloads” folder contains a file entitled “message-rfc822- attachment”. Dr Schatz says “rfc822” is a standard related to email and the content of the file is consistent with a received email as it includes both email metadata and attachments. The time and date of sending the email is 9.26 pm on 27 March 2017, based on the internal metadata in the email. The Last Modified timestamp is 12.14 am on 28 March 2017, less than three hours later. The discrepancy between the dates is due to daylight saving.
  4. The plaintiffs provided Dr Schatz with a copy of the email and attachments, from Mr Keegan’s records, which Dr Schatz has compared with the email and attachments found on the Hard Drive. The body of the email, the attachments and all fields compared were materially the same with the exception of the MessageID. Dr Schatz concluded that the copy supplied by Mr Keegan was the sender’s version and the email found on the Hard Drive was a recipient’s version of the same email.
  5. On 29 March 2017 at 7.34 pm, the plaintiffs’ solicitor received a response from the WIPO case manager, copied to the “gmx.com” and “privatewho.is” email addresses only. The email attached three PDFs: a Notification of Complaint, the Complaint and the Amended Complaint. Two of these documents, being the Notification of Complaint and the Complaint, are on the Hard Drive in the “Downloads” folder. Dr Schatz has compared the files, which are “exactly the same”. The Last Modified timestamp of the Notification of Complaint on the Hard Drive is 8.17 pm on 29 March 2017, being approximately 44 minutes after the email was sent. The Last Modified timestamp of the Complaint on the Hard Drive is 8.18 pm on 29 March 2017, being approximately 45 minutes after the email was sent. In Dr Schatz’s opinion, the Last Modified timestamps are likely to correspond to either the time the attachment was downloaded to the computer from Webmail or the time the attachment was detached from the email and saved to the computer.
  6. On 17 April 2017, at 6.45 pm and 9.31 pm, WIPO received two emails in response to the plaintiffs’ complaint concerning the domain name, “the first containing a number of spelling errors and the second being a (partially) corrected version of the first – from a ‘Ron McDonald’, stating: ‘I would like you to dismiss the complaint against my website name for being frivolous. ...’”

Sixth Blog Content

  1. The landing page of the Website had a composite picture of two people as a thumbnail image for an article dated 17 April 2017, that date being overlaid over the composite image (Sixth Blog Content).
  2. The Sixth Blog Content is on the Hard Drive. It is a Microsoft Publisher file, with a Last Modified timestamp of 5.05 pm on 17 April 2017. The document properties include “Author: SHANE DOWLING”. The Sixth Blog Content as appearing on the Website is the only time of which Mr Latu is aware that the image has been published online, having made searches for the image elsewhere.
  3. Dr Schatz says the internal Last Modified timestamp of the Sixth Blog Content is 5.05.55 pm on 17 April 2017 and, for the same reasons expressed in relation to the Third Blog Content, Dr Schatz is of the view that it is unlikely that the timestamps are consistent with the image having been downloaded by the defendant but rather that the composite image was created on the defendant’s computer.

Fifth Blog Post

  1. On 14 April 2017, the defendant sent an email to the plaintiffs’ directors and solicitors posing various questions about the content of text messages relating to the Employee (the Original Email). The text messages are said to contain Confidential Information.
  2. On 17 April 2017, the defendant published a screenshot of a version of the 14 April 2017 email via Twitter (the Tweeted Email). On the Hard Drive is a JPEG file “SWM email 14-4-17.jpg” which, according to Dr Schatz, appears exactly the same in appearance to the screenshot in the Tweet. Similarities in appearance go beyond the textual content; what appears to be red underlining associated with spelling or grammar correction appears to be exactly the same in both. The Last Modified timestamp of the JPEG file is 10.57 am on 17 April 2017, being six minutes before the Tweet was published.
  3. On 17 April 2017, a Blog was posted on the Website (the Fifth Blog Post). The Fifth Blog Post referred to the text messages and “the below email which was Tweeted” by the defendant. Dr Schatz found an archived copy of the page using the archive.org Wayback Machine. The internal metadata of the file contains a Publication timestamp of 5.34 pm on 17 April 2017 and a Last Modified timestamp of 10.21 pm on 17 April 2017.
  4. The Fifth Blog Post contains an email which appears to be a near exact copy of the Original Email and Tweeted Email. The key differences between the emails are:

(a) The “From:” header on the first line of the Original Email includes the defendant’s email address, whilst the email as it appears in the Fifth Blog Post contains the defendant’s name but not his email address.

(b) In the Original Email, the size of font used in the “From:”, “Send:”, “To:”, “Cc:” and “Subject:” fields is smaller than in the body of the email whilst, in the email appearing in the Fifth Blog Post, the font size is the same throughout. The font in the Fifth Blog Post is also italicised.

(c) Whilst the Tweeted Email is a picture, the email appearing in the Fifth Blog Post is a letter-by-letter copy of the text in the Original Email.

(d) The Tweeted Email does not include any information related to the defendant’s website, while the email in the Fifth Blog Post contains a hyperlink to the defendant’s website.

  1. In Dr Schatz’s opinion, the most straightforward means of production of the email appearing in the Fifth Blog Post would be to cut and paste the Original Email if it were available to the creator of the Fifth Blog Post. The email contained in the Fifth Blog Post could have been produced from a picture version of the email by manually transcribing, letter-by-letter (including punctuation) the content, but this would also require knowledge of the presence of the underlying link to the defendant’s website.
  2. Dr Schatz agreed that the text could have been cut and paste from any computer. He was not aware of everyone who had received the Original Email, “It depends on who has forwarded it where”. Dr Schatz agreed that it was possible that the plaintiffs’ solicitors could have posted the Fifth Blog Post:
I suppose what I would say to that suggestion is the - the starting point of any analysis that I do is that I look at all of the possibilities, and that's what I mean by saying, "It's possible, I suppose”.
...
But for that to happen, there would be traces that would be left behind on digital evidence that would either support it or discount it?
  1. As to whether it was the defendant who published the Fifth Blog Post, Dr Schatz agreed that one of the hardest questions in computer forensics is knowing who was sitting in front of the computer when documents were prepared and files created, as computers can be shared by people and people can access computers remotely. Dr Schatz was not able to say beyond all reasonable doubt who was sitting in front of the computer when the data was entered based on the data he had been given, “And I think that in essence that’s ... something that the Court is going to have to come up with an opinion for, given the evidence that I’ve put forward.”
  2. On 18 April 2017, the plaintiffs became aware of the Fifth Blog Post. Given the nature and timing of the material contained in the Original Email, the Tweeted Email and the Fifth Blog Post, the plaintiffs believed that the Fifth Blog Post had been authored and published by or at the direction of the defendant. The information referred to in the Tweeted Email and the Fifth Blog Post had not been published by any media outlet in Australia. The plaintiffs were concerned to prevent any further or continued publication in breach of the orders of McDougall J.
  3. At 2.46 pm on 18 April 2017, Mr Keegan sent an email to the defendant demanding removal of the Tweet. At 9.11 pm on 18 April 2017, the defendant advised that he had deleted the Tweet. In addition, Mr Keegan sent an email to the “gmx.com” email address, attaching copies of McDougall’s orders made on 13 February 2017 and 21 February 2017. Mr Keegan advised that publication of the information in the Fifth Blog Post was publication of Confidential Information and demanded that the Fifth Blog Post be removed, failing which legal proceedings would be commenced on an urgent basis. There was no response to the “gmx.com” email.

These proceedings

  1. On 19 April 2017, the plaintiffs commenced these proceedings against the publisher of the Website, seeking an order restraining the use or disclosure of text messages and the contents of the Fifth Blog Post, and an order to remove the Fifth Blog Post from the Website. At this time, the publisher of the Website had not been ascertained with any certainty and was simply referred to in the pleadings and orders as “Publisher X”. The Orders were made by Ward CJ in Eq, restraining the publisher of the Website from using or disclosing the confidential information and ordering the removal of the Fifth Blog Post from the Website. In addition to the Orders reproduced at [30], her Honour made the following order:
9 The summons, orders and supporting material to be served on the defendant, by email at the email address [ending “gmx.com”] by 6pm on Wednesday, 19 April 2017.
  1. The Orders concluded:
If The Publisher, [the Website] disobeys paragraph 4, 5, 6 or 7 of this order, then The Publisher, [the Website] and its directors will be liable to sequestration of property and the said directors to imprisonment.

Service of Orders

  1. At 1.14 pm on 19 April 2017, Mr Keegan sent an email to the “gmx.com” address attaching the summons, motion, orders and Mr Keegan’s affidavit of 19 April 2017, noting that orders had been made requiring immediate removal of the Fifth Blog Post. It was not removed.
  2. On 22 April 2017, the defendant published a Tweet which Mr Keegan considered breached the Orders. On 24 April 2017, Mr Keegan sent an email to the defendant informing him accordingly, to which the defendant replied on 25 April 2017:
I am not a party to the proceedings that you refer to nor am I in receipt of the court orders you mention. Can you please supply me with a copy of the court orders and advise which court order I have breached given I am not even involved in the matter?
...
Why you have not sent me the court orders this time to verify your claims is rather odd to say the least.

The Orders were duly supplied on 26 April 2017 by an email from Mr Keegan to the defendant directly.

  1. The defendant submitted that he was not properly served with the Orders as there was no service of a signed hard copy of the court orders with the court’s official seal. Emailing the orders was not proper service. Nor was he named as a defendant when served.
  2. Rule 10.14 of the Uniform Civil Procedure Rules 2005 (NSW) provides:
Substituted and informal service generally
(1) If a document that is required or permitted to be served on a person in connection with any proceedings—
(a) cannot practicably be served on the person, or
(b) cannot practicably be served on the person in the manner provided by law,
the court may, by order, direct that, instead of service, such steps be taken as are specified in the order for the purpose of bringing the document to the notice of the person concerned.
(2) An order under this rule may direct that the document be taken to have been served on the person concerned on the happening of a specified event or on the expiry of a specified time.
...
(3A) An application for an order under this rule must be supported by an affidavit by the applicant that includes—
(a) a statement as to the applicant's knowledge of the whereabouts of the person to be served, and
(b) a statement as to any communications that have occurred between the applicant and the person to be served since the cause of action in the proceedings arose (including any communications by telephone, fax or electronic mail).
(4) Service in accordance with this rule is taken to constitute personal service.
  1. The plaintiffs’ application to Ward CJ in Eq for the Orders included an order for substituted service, supported by an affidavit complying with rule 10.14(3A). Her Honour made an order for substituted service. The Orders, together with supporting material, was served in accordance with order 9 made on 19 April 2017 to the email address associated with the Website, being the email ending “@gmx.com”. The defendant was served in accordance with the order for substituted service, and thus the defendant, then named “Publisher X”, is taken to have been personally served: rule 10.14(4). The Orders were in the proper form issued by the Court; the absence of a seal does not prevent service having taken place.
  2. In addition, the defendant requested, and was provided with, the Orders on 26 April 2017 to an email address used by the defendant. By this means, the Orders were brought to the notice of the defendant. As will be seen, service of the Orders in accordance with the orders for substituted service also brought the Orders to the defendant’s notice.

Tracking email

  1. There is a way to identify the IP address associated with anonymised online identities. A tracking code may be embedded in emails. The tracking code sends a response and notification when the email is opened, read or forwarded. This tracking code notifies details such as the duration of time that an email was opened for, the IP address of the device used to open the email, and the suburb or city the email was opened in.
  2. Mr Keegan sent an email to the “gmx.com” email address that contained a tracking code which would send notifications upon the opening, forwarding or reading of the email. On 10 May 2017, Mr Keegan received a notification that the email was opened for the first and only time by a person able to operate the account associated with the “gmx.com” address. The notification indicated that it was opened using a device assigned the IP address 121.209.47.66, being the IP address allocated by Telstra to the defendant: see [47].
  3. Dr Schatz has reviewed Telstra’s IP records and the IP tracking record produced by Mr Keegan and concludes that the email sent by Mr Keegan to the “gmx.com” email was opened from a computer associated with the IP address of the defendant on 10 May 2017. Based on documents produced by Telstra in answer to a subpoena, Dr Schatz says that it appears that the IP address was associated with a Telstra cable broadband service, generally associated with a single residence. Within the residence, the assigned IP address is generally shared across multiple devices by the residents.

Decision on domain name complaint

  1. On 14 June 2017 at 5.24 pm, the plaintiffs’ solicitors received an email from the WIPO case manager, copied to the “gmx.com” and “privatewho.is” email addresses, attaching two PDFs, a Decision and Annex to Decision. WIPO concluded, on the balance of probabilities and for the purposes of the complaint only, that the defendant was the person responsible for the registration of the disputed domain name, and responsible for the written submissions made in the name “Ron McDonald”. WIPO ordered that the disputed domain name be transferred to the plaintiffs.
  2. The defendant submitted that WIPO’s report should be rejected as biased and indicating collusion with the plaintiffs. The relevance of WIPO’s decision is not the conclusion reached, to which I pay no regard, but the fact that the Decision is on the Hard Drive, in a unique form not widely available. The Decision, as attached to WIPO’s email of 14 June 2017 comprised seven pages and was signed. So far as the plaintiffs are aware, the signed Decision was only published to the plaintiffs and the other email recipients “gmx.com” and “privatewho.is”. A copy of the Decision is published online by WIPO and a related webpage, but the decision as it appears on those websites is in a different format and unsigned.
  3. The signed Decision is on the Hard Drive in two locations. First, the “Downloads” folder contains a file with the same file name as the attachment to WIPO’s email. Dr Schatz has compared the email attachment and the version in the Downloads folder, “The files are exactly the same”. The internal Last Modified timestamp on the file is 4.54 pm on 14 June 2017. The Last Modified timestamp of the file on the Hard Drive is 6.35 pm on 14 June 2017, being 71 minutes after the email was sent.
  4. Second, within the “Downloads” folder on the Hard Drive is a ZIP folder, “WIPO – Decision D2017-0498-signed.zip”. Within the ZIP folder are seven JPEG images, one for each page of the signed Decision. Dr Schatz says that each of these picture files appears to be an exact copy of the corresponding page of the PDF file. In his experience, while PDF files are generally the format of choice for sharing documents via email, they are unsuitable for publishing within web pages, where the format of choice is picture files such as JPEG and PNG. ZIP containers are regularly used to package together sets of related files for sharing, emailing and publishing. The Last Modified timestamp stored within each of these JPEG files ranges between 8.32.34 pm to 8.32.37 pm on 14 June 2017. The Last Modified timestamp associated with the ZIP container is 8.32.53 pm on 14 June 2017.
  5. In Dr Schatz’s opinion, the Last Modified timestamps of the JPEG files are likely the time of creation of each file through an automated process. As the ZIP file which contains the JPEG snapshots has a Last Modified timestamp 24 seconds after the JPEG files, in Dr Schatz’ opinion, the Last Modified timestamp is either the time of creation of the ZIP file or download of the ZIP file.
  6. It was also apparent that the WIPO officer contacted the defendant directly. During closing submissions, the defendant submitted:
Just on that, that WIPO guy actually contacted me, and he ended up handing down a judgment - I didn't contact me; he contacted me. So he got all me details. ... - and I gave a mouthful, and he ended up handing down a judgment, "Mr Dowling didn't deny it, so he must be the owner." Well, I didn't deny, but I just basically told him to piss off when he contacted me.
He's thinking he's a judge. He thinks he can run around and say, "Look, I'm contacting you. Here's the allegation. Answer the questions." Who is this arsehole?

Second Website

  1. On the same day as WIPO’s decision, a second website was created, using a similar domain name (the Second Website). The registrant was, again, Private Whois. The registrar was, again, Automattic Inc. The Second Website contains the same information in the “About” page as was contained on the Website. The Fifth Blog Post was published on the Second Website. On a number of occasions since 15 June 2017, Mr Keegan has typed in the address of the Website into a browser and been automatically re-directed to the Second Website. Mr Latu has had the same experience.
  2. At about the time that the Second Website was made available, a new article appeared on the Second Website which included the seven-page signed WIPO decision. Based on a screenshot of the Second Website’s landing page, the article was published on 14 June 2017. The article published the signed copy of the WIPO decision, both by way of hyperlink (“Click here for a PDF version”) and embedded in the article itself. As mentioned, there are few places where a signed copy of the WIPO decision can be found, and one of them is on the Hard Drive.
  3. On 22 June 2017, Mr Keegan sent an email to the defendant in relation to these proceedings, advising that the matter was listed before the Duty Judge on 23 June 2017 and attaching proposed orders. “You will note that it is sought now to name you explicitly as the defendant in this proceeding.” The defendant replied, “I do not own the website which I am sure you know.” The defendant referred to the fact that the plaintiffs now owned the domain name, presumably because WIPO had ordered that the disputed domain name be transferred, albeit this was not achieved until several days after the defendant’s email. On 23 June 2017, Slattery J granted leave to amend the Summons to refer to the defendant by name, instead of “Publisher X”. On 27 June 2017, the formalities of the domain name transfer for the Website were concluded and the Website was configured to no longer publish the contentious publications, nor re-direct to the Second Website.
  4. As already mentioned, the plaintiffs came to learn that NSW Police had executed a search warrant at the defendant’s apartment and issued a subpoena to the Commissioner of Police, who produced the defendant’s laptop and Hard Drive to the Court. On 17 July 2017, the laptop was returned to the defendant, which he apparently disposed of. On about 20 July 2017, material ceased to be published on the Second Website.
  5. On 21 July 2017, the defendant put on written submissions in the Jane Does proceeding, where he submitted that the plaintiffs “have copied 2 of my articles on [Jane Doe 1 and Jane Doe 2] as per below”. Extracts from three articles were then set out, of which one was The Australian Financial Review. Of the two remaining articles extracted, one was the Fourth Blog Post. The plaintiffs rely on this as an admission by the defendant that the Fourth Blog Post was one of “my articles”.
  6. On 27 September 2017, the plaintiffs’ solicitors accidentally published a website containing an article about the plaintiffs and the Employee. Mr Keegan said the page was set up by a law clerk doing some work on how Go Fund Me pages work, being an internal piece of work done within the law firm to try and understand how the platform worked, under what circumstances donations were made, and the terms and conditions under which people were donating money. The law clerk cut and pasted certain material from the Employee’s Go Fund Me page and, accidentally, the page went live. The website was removed immediately.
  7. Mr Latu said that he became aware of this in a matter of days, by which time the Go Fund Me page had been taken down. As Mr Keegan remembered it, Mr Latu gave instructions to the law clerk for the work to be done, “I think it was [Mr Latu]. I don’t know, but I think it was Alex that actually spoke to the clerk about the task.”
  8. The defendant submitted that the evidence of Mr Keegan and Mr Latu should be rejected given their inconsistent evidence about the Go Fund Me page. Further, it was submitted that the fact that the plaintiffs’ solicitors set up a fake Go Fund Me page should lead the Court to consider that they may also have set up the Website.
  9. I am not overly troubled by Mr Latu and Mr Keegan’s evidence on this subject. Mr Keegan did not know, but thought, that Mr Latu instructed the clerk to set up a Go Fund Me page, whilst Mr Latu said he only became aware of the Go Fund Me page after it had been taken down. There is no inconsistency: Mr Keegan did not pretend to know who had instructed the clerk and what he thought was, in fact, incorrect. Nor does the fact that the plaintiffs’ solicitors set up a Go Fund Me page lead to an available inference that the plaintiffs’ solicitors set up the Website.

CONSIDERATION

  1. The defendant submitted that, as the plaintiffs have owned the Website since the determination of the WIPO dispute, the plaintiffs were suing themselves and the proceedings were an abuse of process. The defendant submitted that the case was circumstantial and depended on the Hard Drive, which should not be relied upon (I have considered this submission at [56]-[61]). The fact that material in relation to the Jane Does was found on the Hard Drive was said to be unsurprising in circumstances where this was potential evidence for him to use in defending the Jane Does proceeding (this submission may not be easily reconciled with the preceding submission that the contents of the Hard Drive had been modified by others).
  2. The defendant submitted that the plaintiffs had not proved their case to the requisite standard, noting that Dr Schatz did not believe beyond a reasonable doubt that the defendant was the one in front of the computer uploading and managing the Website. Nor did Dr Schatz look for a receipt to prove ownership of the Website.
  3. The defendant submitted that the fact that someone other than the defendant published at least one article on the defendant’s website whilst he was in gaol showed that other people had access to his accounts and his computer. The plaintiffs replied that, whilst it was admitted that there was at least one article posted on the defendant’s website when the defendant was in goal, this suggests that the defendant provided some other person with the means to do so at that time and for that purpose. The fact that a person may have had access to the defendant’s website in late 2017 led to no conclusion that any other person had access to the Website in April to June 2017. Whilst the defendant might have authorised such posting because of his gaoling, this said nothing about the prior period when he was at liberty. In any event, the contempt alleged was a failure to take down a particular post from the Website. If the defendant was the publisher of the Website, it scarcely mattered if some other person had power to post on it.

Defendant was the publisher

  1. The central issue is whether the defendant was, at the relevant times, the publisher of the Website. Where an alleged contempt involves publication, R v Hinch [2013] VSC 520 explains at [53]-[54]: (emphasis added)
[53] In the context of the law of contempt, an article, which appears on the internet, is regarded as being published during the period in which the person responsible for maintaining the article on the internet makes the information, contained in the article, available on the internet. ...
[54] For that reason, it is accepted that, for the purpose of the law of contempt, publication of material on the internet is considered to be a continuing act, so that the person responsible for maintaining the matter on the internet is considered to thereby publish it for so long as the material is available for access by the public on the internet.
  1. It was unnecessary to prove that any third party in fact read the offending publication: Doe v Dowling [2017] NSWSC 202 at [50] per Harrison J, citing The Queen v Hinch at [53]-[54]; News Digital Media Pty Ltd v Mokbel (2010) 30 VR 248; [2010] VSCA 51 and Fairfax Digital Australia & New Zealand Pty Ltd v Ibrahim (2012) 83 NSWLR 52; [2012] NSWCCA 125 at [43].
  2. My factual findings in respect of this evidence are set out in detail at [64]-[151], which enables me to now be brief. There are four categories of evidence which point to the defendant being the publisher of the Website (and a further category which points to him being the publisher of the Second Website).

Content for blogs

  1. Blogs posted on the Website contained content found on the Hard Drive, which contained the defendant’s documents and files. In most cases, this content was not readily available elsewhere. The file names of the content establish that the content was uploaded from the defendant’s computer to the Website rather than downloaded from the Website to his computer. This points to the defendant as providing content to the publisher of the blogs, or indeed being the publisher.
  2. There were six items of content. The First Blog Content and Second Blog Content were on the Hard Drive. The fact that the images in the Second Blog Content (pages 5 and 6 from the Employee’s complaint to the Australian Human Rights Commission) were first published online when the defendant tweeted a copy of his defence in the Jane Doe proceedings, with a “cropped” version of the Second Blog Content (see [80]), indicates that these images were not readily available.
  3. The Third Blog Content was not only on the Hard Drive but was also brought into existence on the defendant’s computer using Microsoft Publisher to combine two JPEG files before creating a composite photograph in a JPEG file which formed part of the First Blog Post. According to the internal Author metadata, the defendant was the author of the Microsoft Publisher file. The fact that this composite image of Jane Doe 3 and Jane Doe 4 has only been seen on the Website (see [90]) is also consistent with the defendant having created the composite image rather than having obtained it from another source.
  4. The Fourth Blog Content and Fifth Blog Content were on the Hard Drive.
  5. The Sixth Blog Content is a unique image not found elsewhere on the internet which was created on the defendant’s computer, with document properties including “Author: SHANE DOWLING”. It was published on the Website, rather than downloaded by the defendant from the internet. This is consistent with the defendant publishing content on the Website, either as a provider of content or, more likely, the publisher of the Website, noting that the Sixth Blog Content is an image used on the landing page of the Website rather than as part of any blog posted on the Website.

Author of blogs

  1. The First Blog Post comprised a title, one sentence, then the First Blog Content, the Second Blog Content and the Third Blog Content. The fact that the First Blog Post almost entirely comprised content from the defendant’s computer points to the defendant also being the author of the First Blog Post, entitled to publish on the Website either because he was the publisher of the Website or had permission from the publisher to post.
  2. The fact that the Third Blog Post almost entirely comprised the Fifth Blog Content also points to the defendant being the author of the Third Blog Post.
  3. The defendant published articles on the internet and made submissions to McCallum J in the same or similar terms to posts on the Website: see [100] and [106]-[107], suggesting he authored the posts. Consistent with this, the defendant included the Fourth Blog Post in his written submissions in the Jane Doe proceedings, described as one of “my articles”.
  4. The Fifth Blog Post contained a near exact copy of the Original Email and Tweeted Email, both emails having emanated from the defendant. The most obvious means of production of the email in the Fifth Blog Post was to cut and paste the Original Email, which was readily available to the defendant. No other media outlet published the information. This points strongly to the defendant as the author of the Fifth Blog Post.

Exclusive communications with WIPO

  1. The plaintiffs’ amended complaint to WIPO, being an email and attachments, was sent to only two email addresses, including the email ending in “gmx.com”, being the registrant’s contact details as ascertained by the WIPO case manager and also the contact email address appearing on the home page of Website. The email and attachments were on the defendant’s computer, being a recipient’s version of the plaintiffs’ email. This is consistent with the defendant being the registrant of the Website.
  2. Likewise, documents sent by WIPO on 29 March 2017 to the plaintiffs, the “gmx.com” and “privatewho.is” emails addresses also appear on the Hard Drive, having been downloaded to the computer from Webmail or detached from WIPO’s email and saved to the computer.
  3. The fact that the signed WIPO Decision is found on the Hard Drive when it was only circulated in that format to three recipients points to the defendant as the registrant of the domain name for the Website and thus the publisher of the offending articles. Consistently with the defendant being the registrant of the Website, the defendant admitted in closing oral submissions that the WIPO officer had contacted him: see [142].

Tracking email

  1. The fact that the defendant operated the account associated with the “gmx.com” email address – being the registrant of the Website – was put beyond doubt when, on 10 May 2017, an email sent by Mr Keegan to the “gmx.com” email address that contained a tracking code sent a notification that the email was open for the first and only time using a device assigned to the IP address allocated by Telstra to the defendant.
  2. The plaintiffs’ evidence was circumstantial, as they called no witness who had seen the defendant establishing or operating the Website. That does not mean that the plaintiffs cannot discharge the burden of proof by such evidence. As McHugh J observed in Shepherd v The Queen [1990] HCA 56; (1990) 170 CLR 573 at 589 and 592-3; [1990] HCA 56:
As Lord Simon of Glaisdale pointed out in R v Kilbourne [1973] AC 729 at 758:
Circumstantial evidence ... works by cumulatively, in geometrical progression, eliminating other possibilities.
... Ordinarily, in a circumstantial evidence case, guilt is inferred from a number of circumstances — often numerous — which taken as a whole eliminate the hypothesis of innocence. The cogency of the inference of guilt is derived from the cumulative weight of circumstances, not the quality of proof of each circumstance.
  1. The combined effect of these four categories of evidence is explicable in only one way: the defendant was the publisher of the Website. Whilst this evidence is circumstantial, it is also substantial and cumulatively eliminates the hypothesis of the defendant’s innocence. Having regard to this evidence, I find that, from the time of the Website’s creation, the defendant was responsible for maintaining the Website and the material published on the Website.
  2. Proof beyond reasonable doubt does not require proof beyond all doubt. The test remains reasonable doubt, not any doubt at all: R v Dookheea (2017) 262 CLR 402; [2017] HCA 36 at [34], citing R v Chatzidimitriou (2000) 1 VR 493; [2000] VSCA 91 at [11]. As to reasonable doubt, “fantastic and unreal possibilities ought not to be regarded ... as the source of reasonable doubt”: Green v The Queen (1971) 126 CLR 28; [1971] HCA 55 per Barwick CJ, McTiernan and Owen JJ at 33. It is for the plaintiffs to prove the allegations to this standard. I am satisfied that the plaintiffs have done so. The defendant’s submission that the plaintiffs or its solicitors or an unknown third party set up the Website is a possibility but one that can only be described as fantastic and unreal.

Second Website

  1. On the very same day as WIPO’s decision – ordering that the domain name for the Website be transferred to the plaintiffs – the Second Website was created, using the same registrant and registrar as the Website. WIPO’s decision immediately appeared on the Second Website, being in a format available to few, one of them being the defendant as registrant of the Website. Both the timing of the creation of the Second Website (being the same day as the WIPO decision) and the publication of WIPO’s decision on the Second Website link the defendant to the Second Website and I find that the defendant was the publisher of the Second Website too.

Criminal contempt

  1. The defendant is charged with criminal contempt. Drawing on my judgment in In the matter of Jimmy’s Recipe Pty Ltd [2020] NSWSC 93, as Ward CJ in Eq noted in Furlong v Wise & Young [2019] NSWSC 1718 at [94]- [95]:
94 The distinction between civil and criminal contempt is described in general terms in Witham v Holloway (1995) 183 CLR 525 at 530; [1995] HCA 3 (Witham v Holloway) as being:
... a civil contempt involves disobedience to a court order or breach of an undertaking in civil proceedings, whereas a criminal contempt is committed either where there is a contempt in the face of the court or there is an interference with the course of justice.
95 Criminal contempt includes contumacious disobedience to the court’s order that exhibits defiance of the court (see Cohen v Double Bay Bowling Club [2019] NSWSC 1625, where Henry J noted (at [202]) that traditionally a criminal contempt is committed where, inter alia, a prima facie civil contempt involves deliberate defiance or is contumacious (citing Witham v Holloway at 530; Australian Consolidated Press Ltd v Morgan [1965] HCA 21; (1965) 112 CLR 483 at 489; [1965] HCA 21); and see her Honour’s reasons at [203]).
  1. As to the requisite mens rea for criminal contempt, it was sufficient for the court to be satisfied that “the acts of the alleged contemnor were intentional and were calculated to interfere with the course of justice”: Farahbakht v Midas Australia Pty Ltd [2006] NSWSC 1322 per Brereton J at [38].
  2. Garling J summarised the relevant principles in Commonwealth Bank of Australia v Salvato (No 4) [2013] NSWSC 321 at [126]- [130]:
126 It is convenient if I set out the principles relating to contempt of court, which I understand I am bound to apply:
(a) Regardless of whether these proceedings are categorised in the historical sense, as criminal or civil contempt, it is clear that the charge must be proved beyond reasonable doubt: Witham at 529;
(b) A contempt of court can be constituted by the breach of an undertaking as well as by breach of an order of the court: Trade Practices Commission v C G Smith Pty Ltd [1978] FCA 2; (1978) 30 FLR 368; at [375]; Spindler v Balog (1959) 76 WN (NSW) 391; Circuit Finance Australia v Sobbi [2010] NSWSC 789 at [10];
...
(d) A person cannot be found guilty of a contempt of court for breach of an order or an undertaking where the terms of the undertaking are ambiguous: Australian Consolidated Press Ltd v Morgan [1965] HCA 21; (1965) 112 CLR 483 at 515-6 per Owen J. The ambiguity must be such that it cannot be said what it was that required compliance: Pang v Bydand Holdings Pty Ltd [2011] NSWCA 69 at [56]- [57] per Beazley JA;
...
127 Where the contempt of court consists of a failure to comply with an order of the court (or an undertaking), it must be demonstrated that the contempt was wilful and not merely casual, accidental or unintentional: Australasian Meat Industry Employees' Union v Mudginberri Station Pty Ltd [1986] HCA 46; (1986) 161 CLR 98. However, it is not necessary for the applicant to prove that the contemnor intended to breach an order of (or an undertaking to) the court: see Anderson v Hassett [2007] NSWSC 1310; Mudginberri at 111; Matthews at [16] per Tobias JA.
...
129 As Brereton J said in Anderson v Hassett [2007] NSWSC 1310 at [6]:
The statement in Mudginberri (at 111) that a deliberate commission or omission which is in breach of an injunctive order or an undertaking will constitute such wilful disobedience unless it be casual, accidental or unintentional, does not require proof of a specific intent but permits an alleged contemnor to show by way of exculpation that the default was “casual, accidental or unintentional” ...
  1. The Orders were made by the Court. The Orders were sufficiently clear such that one can be sure beyond reasonable doubt that the order was not complied with. The defendant did not contend otherwise. Order 4 restrained the defendant from using or disclosing the text messages, identified by reference to a confidential exhibit. If regard was had to the exhibit, the text messages were clearly identified. The notion of using or disclosing those text messages was plain; posting the contents of the text messages on the internet would amount to a "use or disclosure" and involve a breach of the Orders. Order 5 restrained the defendant from using or disclosing the Fifth Blog Post, which was identified by reference to Mr Keegan’s affidavit. If regard was had to that affidavit, identification was clear. As with order 4, there could be no doubt that posting the Fifth Blog Post on the internet would amount to a "use or disclosure" and so a breach of the orders. The first paragraph of the Fifth Blog Post was contrary to that order. Order 6 required the defendant to remove the Fifth Blog Post from the Website. Its meaning was plain.
  2. Applying these principles to the case at hand, the defendant submitted that he was not properly served with the Orders, which I have considered at [128]-[133]. The defendant was served with the Orders on 19 April 2017. The presence of emails and documents, sent by the plaintiffs and WIPO to the email ending “gmx.com”, on the Hard Drive confirm that the defendant received emails sent to that address. As such, the orders for substituted service made by Ward CJ in Eq did in fact bring the Orders to the defendant’s notice. The defendant received the Orders again on 26 April 2017.
  3. Having been served, the defendant had knowledge of the terms of the Orders. The defendant did not comply with the Orders. It is important to note that the charge of contempt is not that the defendant posted the Fifth Blog Post but that, as publisher of the Website, he did not remove the Fifth Blog Post once ordered to do so, where the Orders were brought to his attention. Instead, the defendant continued to publish the Fifth Blog Post, including the references to the content of the text messages, on the Website. By failing to take down the Fifth Blog Post, the defendant breached the Orders.
  4. The defendant’s breach of the Orders was deliberate and done with the intention of disobeying the Orders. The defendant had the means to take down the Fifth Blog Post. Failure to do so involved a deliberate step on his part. The Fifth Blog Post continued to be published on the Website via the Website domain/address (and published by redirection to the Second Website from 14 June 2017) until it was removed following the plaintiffs obtaining ownership and control of that domain/address pursuant to WIPO proceedings on about 27 June 2017. It remained published on the Second Website until about 20 July 2017, being about the time that the defendant apparently disposed of his laptop.
  5. The fact that the Fifth Blog Post remained up until the domain/address was taken over by the plaintiffs following the WIPO proceedings excluded any real possibility of inadvertence or lack of wilfulness on the defendant’s part. So too did the ongoing publication of the Fifth Blog Post via the Second Website after the transfer of the domain/address to the plaintiffs. The defendant’s disobeyance of the Orders was wilful and exhibited defiance of the Court. The defendant intended to interfere with the course of justice by refusing to comply with the takedown order over a protracted period, going so far as to establish the Second Website to continue to publish the Fifth Blog Post when the plaintiffs took down the Website themselves.
  6. Disobedience of a court order which constitutes a contempt of court is a matter which affects the administration of justice generally. The underlying rationale for the power of a court to punish for contempt is that it is necessary to uphold and protect the administration of justice. The administration of justice is brought into disrepute if disobedience to a court's order goes unpunished: Australasian Meat Industry Employees Union v Mudginberri Station Pty Ltd [1986] HCA 46; (1986) 161 CLR 98 at 106-107; [1986] HCA 46.

ORDERS

  1. For these reasons, I make the following orders:

(1) Shane Dowling is guilty of a contempt of Court as charged in the Statement of Charge, in that he breached the Orders made by this Court on 19 April 2017.

(2) Direct the plaintiffs to file and serve any affidavits and submissions in respect of penalty and costs by 4pm on 9 July 2021.

(3) Direct the defendant to file and serve any affidavits and submissions in respect of penalty and costs by 4pm on 30 July 2021.

(4) List the matter for further hearing on penalty and costs at 10am on 13 August 2021.

**********


AustLII: Copyright Policy | Disclaimers | Privacy Policy | Feedback
URL: http://www.austlii.edu.au/au/cases/nsw/NSWSC/2021/726.html