Professional Documents
Culture Documents
Motion To Dismiss, Answering Brief
Motion To Dismiss, Answering Brief
Transaction ID 70932587
Case No. S22C-10-012 RHR
IN THE SUPERIOR COURT OF THE STATE OF DELAWARE
Plaintiff/Counterclaim
Defendant,
C.A. No. S22C-10-012 RHR
v.
Hon. Robert H. Robinson, Jr.
CABLE NEWS NETWORK, INC.,
POLITICO LLC,
ROBERT HUNTER BIDEN, and
BFPCC, INC.,
Defendants/Counterclaim
Plaintiff Biden.
Page
PRELIMINARY STATEMENT ...............................................................................1
FACTUAL BACKGROUND ....................................................................................3
ARGUMENT .............................................................................................................7
I. MOTION TO DISMISS STANDARD. ................................................7
II. MR. BIDEN’S COUNTERCLAIMS ARE TIMELY UNDER
DELAWARE’S TWO-YEAR STATUTE OF LIMITATIONS
FOR INVASION OF PRIVACY. .........................................................9
III. IT IS REASONABLY CONCEIVABLE THAT MAC ISAAC
INVADED MR. BIDEN’S PRIVACY WHEN HE INTRUDED
ON HIS SECLUSION. ........................................................................14
A. Mr. Biden’s Electronically Stored Data Was Intentionally
Invaded By the Prying Eyes of Mac Isaac. ...............................14
i. Mac Isaac has no contractual right to Mr. Biden’s
private data......................................................................14
ii. By rummaging through Mr. Biden’s data immediately
after coming into possession of it, Mac Isaac invaded
Mr. Biden’s privacy. .......................................................17
B. A Reasonable Person Would Find a Stranger Combing
Through Their Personal Communications, Memories, and
Finances Highly Offensive. ......................................................19
IV. MAC ISAAC INVADED MR. BIDEN’S PRIVACY WHEN HE
PUBLISHED DETAILS OF MR. BIDEN’S PRIVATE LIFE. .........21
A. By Sending Copies of Mr. Biden’s Data to Family,
Friends, and Individuals with Large Public Profiles and
then Publishing the Data in a Tell-All Book, Mac Isaac
Revealed Mr. Biden’s Private Information in a Manner
“Sure to Reach the Public.” ......................................................22
B. A Subjective Reasonableness Standard Is Inapplicable in
Privacy Cases, Especially Where, as Here, the Defendant
Is a Reasonable Person Mercilessly Subjected to Highly
Offensive Actions. ....................................................................24
i
C. Mr. Biden Is a Private Person Whose Intimate Photos and
Videos and Private Finances Are of No Legitimate Public
Concern. ....................................................................................25
D. Mac Isaac Disclosed Electronically Stored Information of
Unknown Origin, Some of Which Includes Accurate
Copies of Mr. Biden’s Personal Data. ......................................27
V. MAC ISAAC CONSPIRED WITH FRIENDS, FAMILY, AND
INDIVIDUALS WITH LARGE PUBLIC PROFILES TO
INVADE MR. BIDEN’S PRIVACY BY REVIEWING AND
THEN PUBLICIZING MR. BIDEN’S PERSONAL DATA. ............28
VI. BY ASSISTING NUMEROUS INDIVIDUALS IN SECURING
AND THEN DISSEMINATING PRIVATE ELECTRONIC
DATA, MAC ISAAC AIDED AND ABETTED THE INVASION
OF MR. BIDEN’S PRIVACY. ...........................................................31
CONCLUSION ........................................................................................................32
ii
TABLE OF AUTHORITIES
Page(s)
Cases
AB Stable VIII LLC v. Maps Hotels & Resorts One LLC,
2020 WL 7024929 (Del. Ch. Nov. 30, 2020), judgment entered
(Del. Ch. 2021), and aff’d, 268 A.3d 198 (Del. 2021) .......................................15
Atamian v. Gorkin,
1999 WL 743663 (Del. Super. Ct. Aug. 13, 1999), aff’d, 746 A.2d
275 (Del. 2000) .............................................................................................21, 27
Lee ex rel. B.L. v. Picture People, Inc.,
2012 WL 1415471 (Del. Super. Ct. Mar. 19, 2012) ...........................................18
Barker v. Huang,
610 A.2d 1341 (Del. 1992) .................................................................................21
iii
Farrell v. A. C. & S. Co.,
1989 WL 70870 (Del. Super. Ct. June 12, 1989) ...............................................20
Spence v. Cherian,
135 A.3d 1282 (Del. Super. Ct. 2016) ................................................................23
Other Authorities
iv
Miranda Devine, Hunter Biden claims he was ‘embarrassed’ by
laptop in deposition – but still denies it or contents are his, N.Y.
POST (Sept. 7, 2023)..............................................................................................8
v
Defendant/Counterclaim Plaintiff Robert Hunter Biden (“Biden”) respectfully
John Paul Mac Isaac’s (“Mac Isaac”) Motion to Dismiss Mr. Biden’s Counterclaims
PRELIMINARY STATEMENT
In his Motion, Mac Isaac attempts to paint himself as an innocent bystander
to the media frenzy swirling around Mr. Biden’s private life. In truth, his intentional
Until Mac Isaac’s November 22, 2022 publication of his book, American
Injustice: My Battle to Expose the Truth (Post Hill Press 2022), Mr. Biden was
blamelessly unaware of the particularity with which Mac Isaac handled his private
data, including the scale and scope of Mac Isaac’s repeated strategic and intentional
Mac Isaac attempts to shroud his voyeurism, explaining that he needed to view
Mr. Biden’s files to check for corrupt data. Such a justification, in light of his
into their private life. And signing a work-order form, let alone one that contravenes
1
read to give unlimited access and ownership of one’s electronic data to a repair
Privately sifting through Mr. Biden’s data pales in comparison to what Mac
Isaac did next. He copied the data and distributed it far and wide, including to close
friends and family and people he knew would use it to attack his purported customer,
among these, allies of then-President Trump, who published the information for
political gain. Mac Isaac then went on tour with the data using it for media
appearances, podcast content, and even as the basis for an entire book.
By sharing Mr. Biden’s data with six other individuals, with the knowledge
that they too would scrutinize and further disseminate the data, Mac Isaac conspired
and thus necessarily aided and abetted others in invading Mr. Biden’s seclusion.
Indeed, Mac Isaac assisted these individuals to further publicize the data through
creation of additional copies and communications with several news outlets and
congressional offices. In so doing, Mac Isaac then too conspired and aided and
Mac Isaac, who shared Mr. Biden’s private photographs (including those of
communications with the world, dares to say mere embarrassment does not create a
cause of action. But the consequences of Mac Isaac’s acts are severe: Mr. Biden is
harassed and berated online and offline, requires his immediate family to have
2
security even when not with him, and has been forced to move homes three times.
And Mac Isaac—the eye of this hellish storm—is responsible for the harm.
FACTUAL BACKGROUND
shop, or, more likely, by some other potentially nefarious method), came into
possession of certain electronic data, at least some of which belonged to Mr. Biden,
in or before April 2019. 1 (¶ 4.)2 Mac Isaac claims that he obtained lawful possession
of data belonging to Mr. Biden because it was contained on a laptop left at his repair
shop (The Mac Shop) in Delaware. His theory is that, under the terms of a repair
authorization form, because Mr. Biden did not return to the repair shop to retrieve
his equipment within 90 days, Mac Isaac became the rightful owner, not just of the
equipment, but of all its underlying data. 3 (Mot. at 7.) The form states that The Mac
Shop will make every effort to “secure your data” when performing any “data
1
This is not an admission by Mr. Biden that Mac Isaac (or others) in fact possessed
any particular “laptop” containing electronically stored data belonging to Mr. Biden.
Rather, Mr. Biden acknowledges that at some point, Mac Isaac obtained
electronically stored data, some of which belonged to Mr. Biden.
2
Unless otherwise noted, references to “¶” refer to Mr. Biden’s Counterclaims, filed
on August 8, 2023.
3
The Repair Authorization form (SAC Ex. A) states that “equipment left with the
Mac Shop after 90 days of notification of completed service will be treated as
abandoned.” (¶ 5) (emphasis added).
3
Upon obtaining the equipment, Mac Isaac disclosed in his book, American
Injustice: My Battle to Expose the Truth, published on November 22, 2022, that he
began accessing Mr. Biden’s data as early as April 13, 2019—the day after allegedly
receiving the equipment. (¶ 9.) Mac Isaac admitted that he “dove into the laptop
every evening,” and that he examined “emails and files, matching places and names
with dates and times,” all of which left him “speechless.” (¶¶ 11–13 (quoting
American Injustice at 29, 52).) He, for example, examined a file titled, “income.pdf”
containing Mr. Biden’s private tax-related information. (¶ 12.) The data Mac Isaac
reviewed and shared, including photos and videos of Mr. Biden naked “hitting a
crack pipe” and having intercourse, was of such a private nature that it made him
“uncomfortable.” (¶¶ 10, 14 (quoting American Injustice at 30, 46).) In his own
At no time did Mr. Biden grant Mac Isaac permission to review, copy, or disseminate
any electronically stored data ever created, received, or maintained by Mr. Biden.
(¶ 16.)
As first revealed in his book in 2022, Mac Isaac took deliberate steps to
distribute copies of the personal data to various people without Mr. Biden’s consent.
(¶ 17.) For example, Mac Isaac discussed working with an individual named Yaacov
Apelbaum in October 2020 (at his home in Delaware) to attempt to create a forensic
image of the data in Mac Isaac’s possession, and allowed Apelbaum to retain a copy
4
of that data thereafter. (¶ 19.) He shared copies of the data with his father, Richard
Steve Mac Isaac (¶ 22); with his friend Kristen Riley, who he gave a “secret” copy
of the drive for Rudy Giuliani, “should something happen to” Mac Isaac (¶ 26
(quoting American Injustice at 76)); with his uncle, Ronald J. Scott, who sent
and with Robert Costello, with whom he “agreed” to FedEx a copy of the hard drive,
knowing full well that Costello was working with then-President Trump’s lawyer
and ally, Rudy Giuliani, “to get the information to the right places.” (¶¶ 29–33
In September 2020, Mac Isaac conspired with his family to get a copy of the
data to a former Fox News executive (Ken LaCorte), to share with Tucker Carlson.
(¶ 28.) He also provided Costello “instructions on how to safely access it and avoid
to help Costello create “bootable copies of the drive” so others could gain access.
informed U.S. Senator Ron Johnson’s staff that he possessed data he claimed came
4
Costello would later share a copy of the data with Steve Bannon, and Bannon would
go on to pass a copy of the data to others, including Guo Wengui and Jack Maxey.
(¶¶ 37–38, 42.)
5
Mac Isaac initially wished to keep his role in accessing Mr. Biden’s data
secret, and a few days prior to an October 14, 2020 New York Post story, Costello
reassured Mac Isaac that the New York Post had “agreed to keep [Mac Isaac’s name]
out.” No one would know he was “the source” for it all. (¶ 39 (quoting American
Injustice at 72).) Yet, the data Mac Isaac copied, manipulated, and distributed would
ultimately become the source material used by many Trump allies, including Garrett
videos. (¶ 41.)
appearances revealing his intrusion into, and publication of, Mr. Biden’s sensitive
data, even participating in a campaign rally for then-U.S. Senate candidate Jackson
Lahmeyer where attendees could purchase a thumb drive containing Mr. Biden’s
data. (¶¶ 54–57.) In April 2023, Mac Isaac appeared alongside Giuliani to accept
an honor at a Republican fundraiser, which billed him as the “Hunter Biden Laptop
the pain and suffering he caused Mr. Biden (Mr. Biden has been chased and harassed
by people yelling “Laptop from Hell” and “pedophile” and has had to move homes
three times), Mac Isaac continues to promote and re-publish the contents of the data
6
ARGUMENT
LLC, 2014 WL 904251, at *3 (Del. Super. Ct. Mar. 7, 2014). “A complaint will
Dover Fed. Credit Union, 2017 WL 2615748, at *5 (Del. Super. Ct. June 15, 2017)
(quoting Winshall v. Viacom Int’l Inc., 76 A.3d 808, 813 n.12 (Del. 2013)). A court
must “limit its review of the motion to dismiss to the well-pleaded allegations in the
complaint, but will draw all reasonable factual inferences in favor of the non-moving
party.” O’Neill v. AFS Holdings, LLC, 2014 WL 626031, at *3 (Del. Super. Ct. Jan.
15, 2014). This “conceivability” pleading standard asks whether there is “any, even
well-pleaded allegations in the complaint, Mac Isaac improperly asserts his own new
set of factual allegations, not included in either the Counterclaims or SAC. This
Court cannot consider these new “facts,” which represent nothing more than an overt
political stunt. Specifically, Mac Isaac uses his Motion to shoehorn what he labels
“actual facts” into the pleadings, offering his own assertions about, for instance,
Giuliani’s role in the relevant events, Mac Isaac’s “financial capitalization,” and two
7
paragraphs about “Biden’s Book.” (Mot. at 7–13.) He also relies upon Wells Fargo
“financial records” neither incorporated in nor attached to the SAC. (Mot. at 17.)
Improper motives and political agendas aside,5 these tactics by Mac Isaac are
added for gratuitous consumption by right-wing press and hardly used in the
testimony from May 31, 2023. For example, Mac Isaac muses in his Motion that,
“[t]he best files to use in this verification [of data] are video files” and he “opened
some of the larger video files” to check whether corrupted. (Mot. at 9.) Yet, he
testified under oath that sometime in April 2019, he studied a PDF file titled
“income.pdf” because he was curious about Mr. Biden’s wealth. See Mac Isaac Dep.
5
Mac Isaac admits that he has recently been coordinating and communicating with
Republican Congressional representatives, including “[a] staff member from Darrell
Issa’s office[,] [a] staff member from Jim Jordan’s office[,] [a] staff member from
Gaetz’s office[,] [a]nd [staff in] Comer’s office,” who are using the data Mac Isaac
copied and distributed as fuel for their Biden family investigation. (¶ 60); Mac Isaac
Dep. Tr. at 415:7-17.
6
Playing partisan politics, at the time of filing his Motion, Mac Isaac teamed up with
the New York Post to publicize select portions of Mr. Biden’s deposition testimony,
to discredit and ridicule Mr. Biden. Mac Isaac relies upon these new allegations in
Section III of his brief, even though they were not included in the SAC or Mr.
Biden’s Counterclaims, and thus cannot be offered in Mac Isaac’s Motion or
considered by this Court. (Mot. at Sec. III). See generally Miranda Devine, Hunter
Biden claims he was ‘embarrassed’ by laptop in deposition – but still denies it or
contents are his, N.Y. POST (Sept. 7, 2023), https://nypost.com/2023/09/07/hunter-
biden-says-he-was-embarrassed-by-laptop-in-deposition/.
8
Tr. at 45:4-8 (explaining that he opened the document because it was peculiarly “out
of [Mr. Biden’s] folder full of faces files” and “was the only one with a purple dot.
So . . . I chose to click on it.”). Mac Isaac also writes that he “now know[s] who
[Mr. Biden] was when he walked into the shop” (Mot. at 8), despite admitting under
oath that he “wasn’t a hundred percent sure” who walked into his shop when
speaking with reporters on October 14, 2020. (Mac Isaac Dep. Tr. at 70:2-6). And,
as to The Mac Shop, Mac Isaac claimed that he closed his business “[o]ut of concerns
for his own safety” and “as a result of the Biden Presidential campaign-led
backlash.” (Mot. at 12.) Yet, in sworn testimony, when asked why the shop closed
in November 2020, Mac Isaac would not claim backlash under oath and instead
simply said, “I told [the co-owners] it was time to close the shop” and they agreed.
(Mac Isaac Dep. Tr. 378:19-379:4). By inserting “actual facts,” Mac Isaac exposes
his Motion for what it really is: a political mouthpiece, riddled with inconsistencies
privacy claims, and Delaware courts apply the “time of discovery” rule to such
invasions. Wal-Mart Stores, Inc. v. AIG Life Ins. Co., 860 A.2d 312, 319 (Del. 2004)
(“[T]he statute will begin to run only ‘upon the discovery of facts constituting the
9
basis of the cause of action or the existence of facts sufficient to put a person of
ordinary intelligence and prudence on inquiry which, if pursued, would lead to the
also Del. Code Ann. tit. 10, § 8119 (West). “This tenet, well recognized in
‘inherently unknowable injury,’ that statute of limitations does not begin to run until
the ‘harmful affect first manifests itself.’” White v. Riego, 2005 WL 516850, at *2
(Del. Super. Ct. Mar. 3, 2005) (in denying motion to dismiss invasion-of-privacy
claims, the court found that because defendant concealed his bad acts, “plaintiffs
were blamelessly unaware of the torts until [they] discovered the pornographic
images,” at issue and further that “the injury, namely shame and embarrassment, was
‘inherently unknowable’ until this discovery.”). The statute of limitations for civil
conspiracy and aiding-and-abetting is the same as the underlying tort (here, two
A. Until the November 22, 2022 Release of Mac Isaac’s Book, Mr.
Biden Did Not Know and Could Not Have Known the Extent to
Which His Privacy Was Intruded.
The statute of limitations from Mac Isaac’s invasion into Mr. Biden’s
seclusion will not expire until at least November 22, 2024, two years after Mac Isaac
published the previously unknown details of his intrusion into Mr. Biden’s private
life. Mac Isaac asserts, without a shred of proof, that Mr. Biden knew of the
10
unauthorized review, copying, and tampering of his data prior to the release of Mac
Isaac’s book. (Mot. at 12.) That hypothesis ignores that until Mac Isaac published
his activity in a tell-all book on November 22, 2022, Mr. Biden had no knowledge
and was blamelessly unaware of the many private actions Mac Isaac took in 2019,
2020, 2021, and most of 2022 with respect to his private data. (¶ 9.) Prior to
publication of the book there was no opportunity for Mr. Biden to learn, for example,
that Mac Isaac: (i) first accessed Mr. Biden’s private data (without consent) on or
around April 13, 2019; (ii) created a “clone” of the data in July 2019; (iii) “sent a
hard drive containing the data to his father, Steve Mac Isaac” in September 2019; or
(iv) “sent a copy of the data to Rudy Giuliani’s lawyer, Robert Costello on August
Mac Isaac’s Motion asserts that the statute of limitation expired two years
after Mac Isaac first accessed Mr. Biden’s data in April 2019 (Mot. at 14–15), but
publication, Mr. Biden could not have known that Mac Isaac watched videos of
“Hunter [] performing a sex act while filming himself and lighting and hitting a crack
pipe at the same time” (¶ 14 (quoting American Injustice at 30)) or, that Mac Isaac
(quoting American Injustice at 17).) The book also lays out with painstaking
11
specificity previously unknown details about how Mac Isaac worked with Apelbaum
in October 2020 to try to create a forensic image of the data and distributed copies
to others including his father, uncle, Costello, and a close friend. (¶¶ 17–47.) The
totality of newly disclosed details in Mac Isaac’s book reveals intrusions into Mr.
Biden’s privacy, which were impossible for Mr. Biden to discover prior to the book’s
release.
persisted, as Mac Isaac continues to publish and re-publish private facts about Mr.
Biden in media appearances and podcast interviews. For example, in a Fox News
interview in May 2022, Mac Isaac discussed that in reviewing Mr. Biden’s data, he
and engaged in sex trade.” (¶ 55 (quoting Mac Isaac on The Will Cain Podcast).)
In July 2022, during an interview with media site Real America’s Voice, Mac Isaac
claimed he “saw a lot of inappropriate behavior [involving Mr. Biden] with family
private facts by Mac Isaac are abundant, and toll the relevant limitations period until,
at the earliest, two years after Mac Isaac’s latest-known appearance in July 2022.
12
Mr. Biden’s lack of knowledge was not due to a lack of diligence; Mac Isaac
admits he “provided no information about Biden to the NY Post” for its October 14,
2020 article, nor did he “confirm any of the information presented” therein. (Mot.
at 11.) So, of course, Mr. Biden had no way of learning the extent and severity of
Mac Isaac’s invasions of privacy, or of his coordinated efforts with others like
Apelbaum, Giuliani, and Costello, until publication of such facts in media interviews
For invasion by publication, Mac Isaac relies on the October 14, 2020 New
York Post article as a backstop for the date any injuries were sustained by Mr. Biden.
(Mot. at 15.) But this article (which Mac Isaac alleges he did not even take part in)
was a mere ripple in the tidal wave of salacious and private facts about Mr. Biden
disclosed to the world. In fact, the Post article predates publicization of Mac Isaac’s
book, his attendance at Lahmeyer’s campaign rally where Mr. Biden’s data was
displayed, discussed, and available for purchase, and uploads by Garrett Zeigler of
troves of Mr. Biden’s purported data to the internet. Mac Isaac’s data dissemination
by intrusion and publication of private facts by Mac Isaac, each would have the same
statute of limitations date as described above, and they too, have not been tolled.
13
III. IT IS REASONABLY CONCEIVABLE THAT MAC ISAAC INVADED
MR. BIDEN’S PRIVACY WHEN HE INTRUDED ON HIS
SECLUSION.
Mr. Biden can demonstrate with “reasonable conceivability” that when Mac
Isaac, “every evening,” searched and scrutinized Mr. Biden’s electronically stored
data—data that Mac Isaac was not authorized to access—he invaded Mr. Biden’s
seclusion. To prove a claim of intrusion upon seclusion, Mr. Biden must show that
(Del. Super. Ct. June 22, 2020), aff’d, 250 A.3d 763 (Del. 2021); see also
Restatement (Second) of Torts, § 652B. Courts first consider whether the defendant
and next evaluate whether the defendant’s intrusion “was in a manner that would be
Mac Isaac argues that because Mr. Biden allegedly signed a contract stating
that “equipment left with the Mac Shop after 90 days of notification of completed
service will be treated as abandoned,” he has unconditional reign over Mr. Biden’s
electronically stored data. (SAC Ex. A.) This argument fails on multiple counts,
14
not the least of which is a factual dispute as to whether Mr. Biden signed any
document at all.
“equipment” after 90 days, not the contents therein. In fact, the form states that The
Mac Shop will actually “make every effort” to “secure your data.” (SAC Ex. A.)
Nowhere in the repair form’s terms does the signatory abandon their right to data.
This is neither contemplated by the repair authorization form nor consistent with
industry standards under which computer repair companies routinely wipe data from
when “the rightful owner has left in the care or custody of another person and has
failed to maintain, pay for the storage of, exercise dominion or control over, and has
failed to otherwise assert or declare the ownership rights to the tangible personal
property for a period of 1 year.” Del. Code tit. 25, § 4001. The Mac Shop repair
authorization contract deems property abandoned after just 90 days, far short of
Delaware’s yearlong period. See AB Stable VIII LLC v. Maps Hotels & Resorts One
LLC, 2020 WL 7024929, at *80 (Del. Ch. Nov. 30, 2020), judgment entered, (Del.
Ch. 2021), and aff’d, 268 A.3d 198 (Del. 2021) (finding that, “[a]s a general matter,
parties are obligated to comply with the law, and Delaware law does not permit a
15
court to enforce a contract prohibited by law.”); see also In re Appraisal of
Metromedia Int’l Grp., Inc., 971 A.2d 893, 900 (Del. Ch. 2009) (“The law of
Delaware governing contracts is clear: a valid contract will be enforced unless the
is excused.”).
Third, the repair authorization form terms ignore the steps required to obtain
lawful title over someone’s “abandoned” property. To obtain title, after one year,
the person in possession of the property must first file a petition in a court of
competent jurisdiction. Del. Code tit. 25, § 4003. Then, the court must alert the
owner by posting notice in five or more public places and advertising the petition in
a published newspaper. See Del. Code tit. 25, § 4003(b). Mac Isaac did not take
any of these steps before claiming rights to Mr. Biden’s property, which, per the
terms of his repair authorization form, only included equipment, not underlying data.
Fourth, Mac Isaac makes the conclusory argument that because Mr. Biden did
not pay for his services, he breached the contract. (Mot. at 20.) This argument is
improperly based on facts outside the record, which cannot be considered by this
Court. It also assumes, without evidence, that Mr. Biden signed the repair
authorization form and thereafter was given an opportunity to collect his data and
16
ii. By rummaging through Mr. Biden’s data immediately after
coming into possession of it, Mac Isaac invaded Mr. Biden’s
privacy.
concede, he still intruded on Mr. Biden’s seclusion by not even waiting the full 90
days7 required by his own contract before unlawfully delving into Mr. Biden’s
In his book, Mac Isaac describes immediately examining “emails and files,
matching places and names with dates and times.” (¶ 11 (quoting American Injustice
at 52).) He details for his readers, shortly after April 12, 2019, surveying three years
of Mr. Biden’s taxable income. (¶ 12.) He recounts, during the same time, watching
videos of Mr. Biden “performing a sex act while filming himself and lighting and
hitting a crack pipe at the same time.” (¶ 14 (quoting American Injustice at 30).)
The viewing of such information without consent is, in fact, a criminal offense under
Delaware law. See Del. Code Ann. tit. 11, § 1335 (a)(4), (a)(9) (West)8; see also
7
While the repair authorization form states that property is deemed abandoned “after
90 days of notification of completed service,” there are not sufficient facts to know
whether or when Mac Isaac contacted Mr. Biden to inform him of completed service.
Therefore, for the purposes of this Motion, we are considering the 90-day window
to begin on the date the authorization form was allegedly signed by Mr. Biden, April
12, 2019.
8
A person is guilty of a violation of privacy when that person a) “[i]ntercepts without
the consent of all parties thereto a message by telephone, telegraph, letter or other
means of communicating privately” or b) knowingly reproduces or distributes “a
visual depiction of a person who is nude, or who is engaging in sexual conduct, when
the person knows or should have known that the reproduction, distribution,
17
Dayton, 2020 WL 3412701, at *10 (in finding that counterclaim defendant’s
seclusion was violated by counterclaim plaintiff, the court considered the relevant
invaded when a neighbor captured over a hundred images and recorded private
though the photos and videos were taken when counterclaim defendant was outside
their home, the court found that he had a reasonable expectation of privacy in his
backyard. Id. at 11; cf. Lee ex rel. B.L. v. Picture People, Inc., 2012 WL 1415471,
at *3 (Del. Super. Ct. Mar. 19, 2012) (where plaintiff consented to her son’s photo
being taken, the court did not find defendant-photographer’s use of certain photos
an invasion of privacy).
photographer, here, Mr. Biden did not similarly consent to having a computer
repairman scour his private data. In fact, the repair form specifies that Mac Isaac
was to perform only “data recovery.” (SAC Ex. A.) Mr. Biden’s privacy invasion
is more like that in Dayton, where hundreds of videos and private conversations—
18
not just a handful of photos—were secretly taken from a place where privacy was
backyard, then such an expectation must extend to an individual’s even more private
electronic data.
As a pretense for his egregious violation of Mr. Biden’s privacy, Mac Isaac
asserts that he needed to view files “to check for data corruption” and was “invited”
by Mr. Biden to do so. (Mot. at 19–20.) Such a justification for sifting through Mr.
outrageous in light of Mac Isaac’s accounts from his own book, ironically titled,
Any reasonable person would find it “highly offensive” to have their finances,
emails, business documents, photos, and videos, especially those displaying lewd or
naked images, closely scrutinized by a stranger. This is true of even Mac Isaac who,
in delving into data, felt “uncomfortable” and acknowledge that the files he perused
computer repairman to copy and disseminate their private and confidential data—
and thus would find its occurrence highly offensive—instead baldly asserts that Mr.
19
Biden cannot be treated as a reasonable person because he shared “sexually explicit
photos” on Pornhub and lacked “concern about using his father’s political ties to
close deals with foreign countries[.]” (Mot. at 20–21.) These assertions are neither
this Court, nor are true. There is no evidence to support the assertion that Mr. Biden
investigation, there is also no evidence that Mr. Biden involved his father in any
Even if true, these accusations do not magically transform Mr. Biden into an
unreasonable person for whom a subjective standard should apply. Such a wild
claim has no basis in law. See Farrell v. A. C. & S. Co., 1989 WL 70870, at *7 (Del.
Super. Ct. June 12, 1989) (finding that “the reasonable person standard is an external
and objective [standard], rather than the individual judgment, good or bad, of the
particular actor; and it must be, so far as possible, the same for all persons.”) (internal
quotations and citations omitted). Plaintiff does not cite to a single case, let alone a
data without warrant or ownership, Mac Isaac invaded Mr. Biden’s seclusion. What
9
Luke Broadwater, House Republican Report Finds No Evidence of Wrongdoing by
President Biden, N.Y. TIMES (May 10, 2023), https://www.nytimes.com/2023/05/
10/us/politics/hunter-biden-house-republicans-report.html.
20
is worse, Mac Isaac went on to publish his findings.
(including some with large social media followings), writing and publishing a book
dissecting the contents of the data, and then utilizing said contents in various
activities, Mac Isaac invaded Mr. Biden’s privacy. “One who gives publicity to a
matter concerning the private life of another is subject to liability to the other for
invasion of privacy, if the matter publicized is of a kind that (a) would be highly
offensive to a reasonable person, and (b) is not of legitimate concern to the public.”
Barker v. Huang, 610 A.2d 1341, 1350 (Del. 1992); see also Restatement (Second)
the public.” Atamian v. Gorkin, 1999 WL 743663, at *3 (Del. Super. Ct. Aug. 13,
1999), aff’d, 746 A.2d 275 (Del. 2000). To give “publicity” to a matter means to
that the matter must be regarded as substantially certain to become one of public
knowledge.” Id.
21
A. By Sending Copies of Mr. Biden’s Data to Family, Friends, and
Individuals with Large Public Profiles and then Publishing the
Data in a Tell-All Book, Mac Isaac Revealed Mr. Biden’s Private
Information in a Manner “Sure to Reach the Public.”
electronic data such that it was certain not just to “reach the public” but also to
Mac Isaac first disseminated the data to friends and family. He mailed a copy
to his father in September 2019, handed a “secret” copy to his friend in October
2019, and gave another copy to his uncle. (¶¶ 23, 26–27.) He also enlisted
Apelbaum to help create a forensic image of the data and allowed Apelbaum to retain
a copy. (¶ 19.) The list continues. On August 28, 2020, after communicating with
Giuliani’s lawyer, Robert Costello, about their ability “to get the information to the
right places,” Mac Isaac shipped him a copy of the drive. (¶¶ 29–31 (quoting the
Daily Mail and N.Y. Mag.).) Mac Isaac then assisted Costello “in making bootable
copies of the drive so other people [Costello] was working with could have access.”
(¶ 35 (quoting American Injustice at 65).) Costello, in concert with Mac Isaac, then
worked with the New York Post to publish the private electronically stored data. (¶
39.) Mac Isaac attempted even further dissemination. He, his father, and his uncle,
for example, agreed in September 2020 to reach out to a former Fox News executive,
hoping the data would reach then-anchor, Tucker Carlson. (¶ 28.) Mac Isaac, in
22
September 2020, also contacted Senator Ron Johnson’s office to further spread the
Mac Isaac relies on Spence v. Cherian for the proposition that communicating
“a fact concerning one’s private life to just one person, or even to a small group” is
not a privacy invasion. 135 A.3d 1282, 1288 (Del. Super. Ct. 2016). But in Spence,
father, who in turn shared the same information with the patient’s mother. Such a
to the world.
Mac Isaac claims that his distributions were merely to seek advice, ensure his
safety, and assist then-President Trump in his impeachment trial. Such justifications
support the claim of disclosure), but are unbelievable considering Mac Isaac’s mass
executive, and dissemination to and assistance with making copies for further
transmission to then-President Trump’s lawyer “to get the information to the right
places” must be “communication[s] that reach[], or [are] sure to reach, the public.”
23
Mac Isaac’s claim that he only spread the information “to a small group for
specific purposes” also flies in the face of his public acts. Throughout 2021, 2022,
and 2023, Mac Isaac made several media and podcast appearances where he
discussed the private data through which he shamelessly rummaged. (¶¶ 54–55, 58.)
thumb drives containing the data. (¶ 56.) In a similar vein, in April 2023, Mac Isaac,
his appearance and sold sponsorships for as much as $25,000. (¶ 58.) Even if
podcasts, award ceremonies, and rallies exploiting Mr. Biden’s private life did not
communicate private matters to “the public at large” (and they did), Mac Isaac went
much further; he published a tell-all book about his intrusions into Mr. Biden’s
including detailed financial information, family photos, and sexual videos were
broadcast to the world. Mac Isaac concedes that publication of this sensitive
24
(Mot. at 24) (emphasis added). Mac Isaac cites no facts to support the notion that
Mr. Biden is an unreasonable person. He also fails to cite any cases applying a
public domain and improperly giving publicity to the matter, thereby creating the
4382998, at *13 (Del. Super. Ct. July 31, 2014), aff’d, 2015 WL 1604851 (Del. Apr.
value and concern to the public at the time of publication.”) (emphasis added).
Cases finding that disclosed information was “of legitimate concern to the
legitimate news story, disclosed information that was gathered without unreasonably
(Del. Super. Ct. Aug. 29, 1989) (finding that where a media outlet filmed what could
be viewed by “any other member of the general public … from the sidewalk” its
conduct was not unreasonably intrusive); Martin v. Widener Univ. Sch. of L., 1992
25
WL 153540, at *19 (Del. Super. Ct. June 4, 1992) (finding that where plaintiff
himself disclosed information to reporters, and thus “invited the discussion and
publicity to this part of his life,” he could not then “complain of the publicity he
Unlike that of plaintiff in Wallace, Mr. Biden’s information was not readily
available to the public, and unlike the plaintiff in Martin, Mr. Biden did not invite
publicity by first sharing his private data with reporters. In both cases, the
information was shared by a member of the media, holding special press freedoms,
not by an intrusive lay person such as Mac Isaac. Mac Isaac, citing no law, attempts
to argue that, regardless of the private nature of Mr. Biden’s data and his own lay-
analogous to the old story of the young man who murdered his parents and then
asked the court for mercy because he was an orphan. Mac Isaac put in motion the
events described in the Counterclaims that brought Mr. Biden’s private information
to public light. This is true too of Mr. Biden’s status as a public figure. Mac Isaac’s
disclosures created the controversy that launched Mr. Biden into the public sphere
during a time when neither he nor any of his family members held public office.
The public light Mac Isaac shined on Mr. Biden’s data does not otherwise
make it “of legitimate concern to the public.” No one can reasonably argue that
videos described by Mac Isaac of Mr. Biden “performing a sex act” and “hitting a
26
crack pipe” are deserving of public eyes. (¶ 14 (quoting American Injustice at 30).)
The same can be said for personal communications an individual shares with his
close friends and family and for private financial information. Indeed, this
information is precisely that which Delaware state law makes criminal to intercept,
let alone disseminate, without consent. See Del. Code Ann. tit. 11, § 1335 (a)(4),
(a)(9) (West).
certain data represents true and correct copies of Mr. Biden’s private information.
Under Section 652D, there can only be a finding that an individual’s privacy right
was violated when “publicity [is] given to true statements of fact.” Restatement
(Second) of Torts. Plaintiff relies on Atamian v. Gorkin, but there, the court did not
reach the issue of whether disclosures were true, noting in dicta only that plaintiff
743663, at *3. Mr. Biden does not make a comparable concession here. In fact, Mr.
Biden’s Counterclaims acknowledge that “at some point, Mac Isaac obtained
electronically stored data, some of which belonged to Mr. Biden.” And, that at least
some of the data accurately reflects Mr. Biden’s private information. (¶ 4 n.1.)
27
For the foregoing reasons, it is reasonably conceivable that Mac Isaac violated
Mr. Biden’s right to privacy, by sharing with several individuals and publishing
concern.
plaintiff must allege: ‘(1) two or more persons; (2) an object to be accomplished; (3)
a meeting of the minds ... relating to the object or ... course of action; (4) one or more
Holding Corp. Litig., 2017 WL 3283169, at *12 (Del. Super. Ct. July 31, 2017).
“Delaware courts ‘have recognized that the nature of conspiracies often makes it
impossible to provide details at the pleading stage and that the pleader should be
Szczerba v. Am. Cigarette Outlet, Inc., 2016 WL 1424561, at *2 (Del. Super. Ct.
Mac Isaac is individually liable for invasion of Mr. Biden’s privacy, but he
did not act alone. See supra Sections III, IV. Even without discovery, we know that
28
Mac Isaac provided copies of the data (in whole or in part) to Apelbaum, his father,
his uncle, Riley, and Costello, to share with Giuliani. (¶¶ 19, 23, 26–27, 31.) Mac
Isaac knew that these individuals intended to comb through Mr. Biden’s data in such
a manner that any reasonable person would find highly offensive. Thus, in providing
each individual a copy of the private material, he conspired to violate Mr. Biden’s
right to seclusion and in so doing caused Mr. Biden the same considerable harm and
embarrassment any reasonable person would feel had several ill-intending strangers
Many of the same individuals who received and rummaged through Mr.
Biden’s data then conspired with Mac Isaac to violate Mr. Biden’s privacy through
mass publicization of the information. Mac Isaac provided Riley a copy with the
to” Mac Isaac. (¶ 26 (quoting American Injustice at 76).) He also worked with his
uncle and father to further attempt to disseminate Mr. Biden’s data to Tucker Carlson
with the intent that the contents be widely publicized. (¶ 28.) Mac Isaac also knew
that his uncle sent at least summaries of the data to his nephew, journalists, and
out Costello, who informed Mac Isaac of his intent to pass the information on to
Giuliani. (¶ 29.) Mac Isaac “agreed” to provide the pair with additional information
29
American Injustice at 65).) He even “assisted” Costello in making “bootable copies”
for Costello’s associates. (Id.) Costello later shared the data with Bannon, who gave
at least some of the data to others to disseminate, including Guo Wengui and Jack
Maxey (an associate of Bannon’s War Room podcast). (¶¶ 37–38, 42.) While this
on. In October 2020, Mac Isaac communicated with Costello about a plan to publish
the private data in the New York Post. (¶ 39.) Giuliani also helped share a copy of
the purported data with Ziegler, who uploaded it to his websites Marco Polo and
allegedly all from Mr. Biden’s electronic data (many of the which are lewd and show
All of the published information came from one original source: Mac Isaac.
And he worked closely with each co-conspirator to help unlawfully publicize Mr.
information that only became public because of their own broadcasts, Mac Isaac and
his co-conspirators caused Mr. Biden extensive harm and embarrassment. Mr. Biden
has been chased and harassed by people yelling “Laptop from Hell” and
“pedophile,” has had to move homes three times, is constantly berated online and in
30
person, and requires security for his immediate family beyond his ordinary
protection. (¶ 46.)
It is reasonably conceivable that Mac Isaac aided and abetted the same
publicize his private matters. In Delaware, “[t]o state an aiding and abetting claim,
a plaintiff must show: (1) underlying tortious conduct, (2) knowledge, and (3)
*12 (Del. Super. Ct. July 31, 2017). “Conspiracy involves concerted action by
requires only that Mac Isaac acted negligently in substantially assisting others in
invading Mr. Biden’s privacy. Of course, by providing Apelbaum, his father, his
uncle, Riley, Costello, and Giuliani copies of Mr. Biden’s data, Mac Isaac must have,
31
Biden’s seclusion. See supra Section V. Mac Isaac then took concerted actions,
working with these same individuals, to broadcast Mr. Biden’s private life. In so
doing, he, at least, substantially assisted others in publicizing Mr. Biden’s private
first studying his most intimate photos, videos, communications, and documents and
by next shamelessly displaying them to the world, Mac Isaac caused Mr. Biden
CONCLUSION
For the foregoing reasons, we respectfully request that this Court deny Mac
32
Dated: September 22, 2023 Respectfully submitted,
33
CERTIFICATE OF COMPLIANCE
In accordance with Superior Court Rule 107(b) and 107(h)(1), excluding the
cover page, table of contents, table of authorities, signature page, and this certificate
including footnotes. The brief was prepared using Microsoft Word for Microsoft
365, which was also used to count the words. It otherwise complies with Rule
107(b), as it is double-spaced, in Times New Roman 14-point font, has two spaces
between sentences, and contains single-spaced footnotes also in Times New Roman
34