Thursday, September 24, 2015

Ryanindaswamp / Man In Da Street



It's All Bout Da Law






Computer Fraud and Abuse Act

From Wikipedia, the free encyclopedia
The Computer Fraud and Abuse Act (CFAA)[1] was enacted by Congress in 1986 as an amendment to existing computer fraud law (18 U.S.C. § 1030), which had been included in the Comprehensive Crime Control Act of 1984. It was written to clarify and increase the scope of the previous version of 18 U.S.C. § 1030 while, in theory, limiting federal jurisdiction to cases "with a compelling federal interest-i.e., where computers of the federal government or certain financial institutions are involved or where the crime itself is interstate in nature." (see "Protected Computer", below). In addition to clarifying a number of the provisions in the original section 1030, the CFAA also criminalized additional computer-related acts. Provisions addressed the distribution of malicious code and denial of service attacks. Congress also included in the CFAA a provision criminalizing trafficking in passwords and similar items.[1]
The Act has been amended a number of times—in 1989, 1994, 1996, in 2001 by the USA PATRIOT Act, 2002, and in 2008 by the Identity Theft Enforcement and Restitution Act.
In January 2015 Barack Obama proposed expanding the CFAA and the RICO Act in his Modernizing Law Enforcement Authorities to Combat Cyber Crime proposal.[2] DEF CON organizer and Cloudflare researcher Marc Rogers, Senator Ron Wyden, and Representative Zoe Lofgren have stated opposition to this on the grounds it will make many regular Internet activities illegal, and moves further away from what they were trying to accomplish with Aaron's Law.[3][4]

Contents

Protected computers

The only computers, in theory, covered by the CFAA are defined as "protected computers". They are defined under section 18 U.S.C. § 1030(e)(2) to mean a computer:
  • exclusively for the use of a financial institution or the United States Government, or any computer, when the conduct constituting the offense affects the computer's use by or for the financial institution or the Government; or
  • which is used in or affecting interstate or foreign commerce or communication, including a computer located outside the United States that is used in a manner that affects interstate or foreign commerce or communication of the United States...
In practice, any ordinary computer has come under the jurisdiction of the law, including cellphones, due to the inter-state nature of most internet communication.[5]

Criminal offenses under the Act

(a) Whoever—
(1) having knowingly accessed a computer without authorization or exceeding authorized access, and by means of such conduct having obtained information that has been determined by the United States Government pursuant to an Executive order or statute to require protection against unauthorized disclosure for reasons of national defense or foreign relations, or any restricted data, as defined in paragraph y. of section 11 of the Atomic Energy Act of 1954, with reason to believe that such information so obtained could be used to the injury of the United States, or to the advantage of any foreign nation willfully communicates, delivers, transmits, or causes to be communicated, delivered, or transmitted, or attempts to communicate, deliver, transmit or cause to be communicated, delivered, or transmitted the same to any person not entitled to receive it, or willfully retains the same and fails to deliver it to the officer or employee of the United States entitled to receive it;
(2) intentionally accesses a computer without authorization or exceeds authorized access, and thereby obtains—
(A) information contained in a financial record of a financial institution, or of a card issuer as defined in section 1602 (n) [1] of title 15, or contained in a file of a consumer reporting agency on a consumer, as such terms are defined in the Fair Credit Reporting Act (15 U.S.C. 1681 et seq.);
(B) information from any department or agency of the United States; or
(C) information from any protected computer;
(3) intentionally, without authorization to access any nonpublic computer of a department or agency of the United States, accesses such a computer of that department or agency that is exclusively for the use of the Government of the United States or, in the case of a computer not exclusively for such use, is used by or for the Government of the United States and such conduct affects that use by or for the Government of the United States;
(4) knowingly and with intent to defraud, accesses a protected computer without authorization, or exceeds authorized access, and by means of such conduct furthers the intended fraud and obtains anything of value, unless the object of the fraud and the thing obtained consists only of the use of the computer and the value of such use is not more than $5,000 in any 1-year period;
(5)
(A) knowingly causes the transmission of a program, information, code, or command, and as a result of such conduct, intentionally causes damage without authorization, to a protected computer;
(B) intentionally accesses a protected computer without authorization, and as a result of such conduct, recklessly causes damage; or
(C) intentionally accesses a protected computer without authorization, and as a result of such conduct, causes damage and loss.
(6) knowingly and with intent to defraud traffics (as defined in section 1029) in any password or similar information through which a computer may be accessed without authorization, if—
(A) such trafficking affects interstate or foreign commerce; or
(B) such computer is used by or for the Government of the United States;
(7) with intent to extort from any person any money or other thing of value, transmits in interstate or foreign commerce any communication containing any—
(A) threat to cause damage to a protected computer;
(B) threat to obtain information from a protected computer without authorization or in excess of authorization or to impair the confidentiality of information obtained from a protected computer without authorization or by exceeding authorized access; or
(C) demand or request for money or other thing of value in relation to damage to a protected computer, where such damage was caused to facilitate the extortion[6]

Specific sections

Notable cases and decisions referring to the Act

  • United States v. Riggs, brought against people associated with Phrack magazine for obtaining a document (known as the "E911 document") about information on BellSouth products implementing 911 emergency telephone services, a case described in Bruce Sterling's "Hacker Crackdown of 1990". The government dropped the case after it was revealed that the document was on sale by AT&T for $13.
  • United States v. Morris (1991), 928 F.2d 504, decided March 7, 1991. After the release of the Morris worm, an early computer worm, its creator was convicted under the Act for causing damage and gaining unauthorized access to "federal interest" computers. The Act was amended in 1996, in part, to clarify language whose meaning was disputed in the case.[7]
  • Theofel v. Farey Jones, 2003 U.S. App. Lexis 17963, decided August 28, 2003 (U.S. Court of Appeals for the Ninth Circuit), holding that the use of a civil subpoena which is "patently unlawful," "in bad faith," or "at least gross negligence" to gain access to stored email is a breach of both the CFAA and the Stored Communications Act.[8]
  • LVRC Holdings v. Brekka, 2009 1030(a)(2), 1030(a)(4), in which LVRC sued Brekka for allegedly taking information about clients and using it to start his own competing business.[10][11]
  • Robbins v. Lower Merion School District (U.S. Eastern District of Pennsylvania), where plaintiffs charged two suburban Philadelphia high schools secretly spied on students by surreptitiously and remotely activating webcams embedded in school-issued laptops the students were using at home, violating the Act. The schools admitted to secretly snapping over 66,000 webshots and screenshots, including webcam shots of students in their bedrooms.[12][13]
  • People v. SCEA, 2010. Class action lawsuit against Sony for removing OtherOS, the ability to install and run Linux (or other operating systems) on the PlayStation 3. Consumers were given the option to either keep OtherOS support or not. SCEA was allegedly in violation of this Act because if the consumers updated or not, they would still lose system functionality.[16]
  • United States v. Drake, 2010. Drake was part of a whistle-blowing effort inside the NSA to expose waste, fraud, and abuse with the Trailblazer Project. He talked to a reporter about the project. He was originally charged with five Espionage Act counts for doing this. These charges were dropped just before his trial was to begin, and instead he pleaded guilty to one misdemeanor count of violating the CFAA, (a)(2), unauthorized access.
  • Grand Jury investigation in Cambridge, 2011. Unknown persons were listed in Grand Jury hearings in Cambridge, Massachusetts, regarding potential charges under the CFAA, as well as the Espionage Act. Journalist Glenn Greenwald has written these were likely related to Wikileaks.[18]
  • United States v. Aaron Swartz, 2011. Aaron Swartz allegedly entered an MIT wiring closet and set up a laptop to mass-download articles from JSTOR. He allegedly avoided various attempts by JSTOR and MIT to stop this, such as MAC address spoofing. He was indicted for violating CFAA provisions (a)(2), (a)(4), (c)(2)(B)(iii), (a)(5)(B), and (c)(4)(A)(i)(I),(VI).[21] The case was dismissed after Swartz committed suicide in January 2013.[22]
  • United States v. Nosal, 2011. Nosal and others allegedly accessed a protected computer to take a database of contacts from his previous employer for use in his own business, violating 1030(a)(4)[24][25] This is a complex case with two trips to the Ninth Circuit, and another seen as likely after the latest conviction in 2013.[26]
  • Lee v. PMSI, Inc., 2011. PMSI, Inc. sued former employee Lee for violating the CFAA by browsing Facebook and checking personal email in violation of the company's acceptable use policy. The court found that breaching an employer's acceptable use policy was not "unauthorized access" under the act and, therefore, did not violate the CFAA.
  • United States v Nada Nadim Prouty, circa 2010.[32] Prouty was an FBI and CIA agent who was prosecuted for having a fraudulent marriage to get US residency. She claims she was persecuted by a U.S. attorney who was trying to gain media coverage by calling her a terrorist agent and get himself promoted to a federal judgeship.[33]
  • United States v. Neil Scott Kramer, 2011. Kramer was a court case where a cellphone was used to coerce a minor into engaging sex with an adult. Central to the case was whether a cellphone constituted a computer device. Ultimately, the United States Court of Appeals for the Eighth Circuit found that a cell phone can be considered a computer if "the phone perform[s] arithmetic, logical, and storage functions", paving the way for harsher consequences for criminals engaging with minors over cellphones.[34]
  • United States v. Kane, 2011. Exploiting a software bug in a poker machine does not constitute hacking[35] because the poker machine in question was not a “protected computer” under the statute (not being connected to the Internet it was judged not to qualify as "protected computer" affecting interstate commerce) and because the sequence of button presses that triggered the bug were considered "not exceed their authorized access." As of November 2013 the defendant still faces a regular wire fraud charge.[36]
  • Craigslist v. 3Taps, 2012. 3Taps was accused by Craigslist of breaching CFAA by circumventing an IP block in order to access Craigslist's website and scrape its classified ads without consent. In August 2013, US federal judge found 3Taps's actions violated CFAA and that it faces civil damages for “unauthorized access”. Judge Breyer wrote in his decision that "the average person does not use “anonymous proxies” to bypass an IP block set up to enforce a banning communicated via personally-addressed cease-and-desist letter".[37][38] He also noted "Congress apparently knew how to restrict the reach of the CFAA to only certain kinds of information, and it appreciated the public v. nonpublic distinction — but [the relevant section] contains no such restrictions or modifiers."[39]

Aaron Swartz

The government was able to bring such disproportionate charges against Aaron because of the broad scope of the Computer Fraud and Abuse Act (CFAA) and the wire fraud statute. It looks like the government used the vague wording of those laws to claim that violating an online service’s user agreement or terms of service is a violation of the CFAA and the wire fraud statute.
Using the law in this way could criminalize many everyday activities and allow for outlandishly severe penalties.
When our laws need to be modified, Congress has a responsibility to act. A simple way to correct this dangerous legal interpretation is to change the CFAA and the wire fraud statutes to exclude terms of service violations. I will introduce a bill that does exactly that.
Rep. Zoe Lofgren, Jan 15, 2013 [40]
In the wake of the prosecution and subsequent suicide of Aaron Swartz, lawmakers have proposed to amend the Computer Fraud and Abuse Act. Representative Zoe Lofgren has drafted a bill that would help "prevent what happened to Aaron from happening to other Internet users".[40] Aaron's Law (H.R. 2454, S. 1196[41]) would exclude terms of service violations from the 1984 Computer Fraud and Abuse Act and from the wire fraud statute, despite the fact that Swartz was not prosecuted based on Terms of Service violations.[42]
In addition to Lofgren, Representative Darrell Issa and Representative Jared Polis—all on the House Judiciary Committee, raised questions about the government's handling of the case. Polis called the charges "ridiculous and trumped up," while referring to Swartz as a "martyr."[43] Issa, also chair of the House Oversight Committee, announced that he is investigating the actions of the Justice Department's prosecution.[43][44]
As of May 2014, Aaron's Law was stalled in committee, reportedly due to tech company Oracle's financial interests.[45]

Amendments history

2008[1]
  • Eliminated the requirement that information must have been stolen through an interstate or foreign communication, thereby expanding jurisdiction for cases involving theft of information from computers;
  • Eliminated the requirement that the defendant’s action must result in a loss exceeding $5,000 and created a felony offense where the damage affects ten or more computers, closing a gap in the law;
  • Expanded 18 U.S.C. § 1030(a)(7) to criminalize not only explicit threats to cause damage to a computer, but also threats to (1) steal data on a victim's computer, (2) publicly disclose stolen data, or (3) not repair damage the offender already caused to the computer;
  • Created a criminal offense for conspiring to commit a computer hacking offense under section 1030;
  • Broadened the definition of “protected computer” in 18 U.S.C. § 1030(e)(2) to the full extent of Congress’s commerce power by including those computers used in or affecting interstate or foreign commerce or communication; and
  • Provided a mechanism for civil and criminal forfeiture of property used in or derived from section 1030 violations.

See also

References










  • Jarrett, H. Marshall; Bailie, Michael W. (2010). "Prosecution of Computer Crimes" (PDF). justice.gov. Office of Legal Education Executive Office for United States Attorneys. Retrieved June 3, 2013.

  • External links










  • "SECURING CYBERSPACE - President Obama Announces New Cybersecurity Legislative Proposal and Other Cybersecurity Efforts". Whitehouse.gov. January 13, 2015. Retrieved January 30, 2015.

  • "Democrats, Tech Experts Slam Obama's Anti-Hacking Proposal". Huffington Post. January 20, 2015. Retrieved January 30, 2015.

  • "Obama, Goodlatte Seek Balance on CFAA Cybersecurity". US News. January 27, 2015. Retrieved January 30, 2015.

  • Varma, Corey. "What is the Computer Fraud and Abuse Act". www.coreyvarma.com. Retrieved 10 June 2015.

  • Legal Information Institute, Cornell University Law School. "18 USC 1030".

  • United States v. Morris (1991), 928 F.2d 504, 505 (2d Cir. 1991).

  • "Ninth Circuit Court of Appeals: Stored Communications Act and Computer Fraud and Abuse Act Provide Cause of Action for Plaintiff | Stanford Center for Internet and Society". Cyberlaw.stanford.edu. Retrieved September 10, 2010.

  • US v Jacob Citrin, openjurist.org

  • U.S. v Brekka 2009

  • Kravets, David, Court: Disloyal Computing Is Not Illegal, Wired, September 18, 2009.

  • Doug Stanglin (February 18, 2010). "School district accused of spying on kids via laptop webcams". USA Today. Retrieved February 19, 2010.

  • "Initial LANrev System Findings", LMSD Redacted Forensic Analysis, L-3 Services—prepared for Ballard Spahr (LMSD's counsel), May 2010. Retrieved August 15, 2010.

  • U.S. v. Lori Drew, scribd

  • US v Lori Drew, psu.edu KYLE JOSEPH SASSMAN,

  • ". Retrieved February 21, 2011.

  • See the linked articles about Chelsea Manning, and her charge sheets here: Hague Justice Portal

  • FBI serves Grand Jury subpoena likely relating to WikiLeaks by Glenn Greenwald, Salon.com 27 April 2011.

  • David Gilbert (December 6, 2013). "PayPal 14 'Freedom Fighters' Plead Guilty to Cyber-Attack". International Business Times.

  • Alexa O'Brien (December 5, 2013). "Inside the ‘PayPal 14’ Trial". The Daily Beast.

  • See Internet Activist Charged in M.I.T. Data Theft, By NICK BILTON New York Times, July 19, 2011, 12:54 PM, as well as the Indictment

  • Dave Smith, Aaron Swartz Case: U.S. DOJ Drops All Pending Charges Against The JSTOR Liberator, Days After His Suicide, International Business Times, January 15, 2013.

  • See the links to the original lawsuit documents which are indexed here

  • U.S. v. Nosal, uscourts.gov, 2011

  • Appeals Court: No Hacking Required to Be Prosecuted as a Hacker, By David Kravets, Wired, April 29, 2011

  • Kravets, David (April 24, 2013). "Man Convicted of Hacking Despite Not Hacking". Wired.

  • US v Adekeye Indictment. see also Federal Grand Jury indicts former Cisco Engineer By Howard Mintz, 08/05/2011, Mercury News

  • techdirt.com 2011 8 9, Mike Masnick, "Sending Too Many Emails to Someone Is Computer Hacking"

  • Hall, Brian, Sixth Circuit Decision in Pulte Homes Leaves Employers With Few Options In Response To Union High Tech Tactics, Employer Law Report, 3 August 2011. Retrieved 27 January 2013.

  • US v Sergey Aleynikov, Case 1:10-cr-00096-DLC Document 69 Filed 10/25/10

  • Ex-Goldman Programmer Described Code Downloads to FBI (Update1), David Glovin and David Scheer - July 10, 2009, Bloomberg

  • Plea Agreement, U.S. District Court, Eastern District of Michigan, Southern Division. via debbieschlussel.com

  • Sibel Edmond's Boiling Frogs podcast 61 Thursday, 13. October 2011. Interview with Prouty by Peter B. Collins and Sibel Edmonds

  • "United States of America v. Neil Scott Kramer" (PDF).

  • Poulsen, Kevin (May 7, 2013). "Feds Drop Hacking Charges in Video-Poker Glitching Case". Wired.

  • No Expansion of CFAA Liability for Monetary Exploit of Software Bug | New Media and Technology Law Blog

  • Kravets, David (August 20, 2013). "IP Cloaking Violates Computer Fraud and Abuse Act, Judge Rules". Wired.

  • Craigslist v. 3taps | Digital Media Law Project

  • 3Taps Can't Shake Unauthorized Craigslist Access Claims - Law360

  • Reilly, Ryan J. (January 15, 2013). "Congresswoman Introduces 'Aaron's Law' Honoring Swartz". Huffington Post.

  • H.R. 2454 at Congress.gov; H.R. 2454 at GovTrack; H.R. 2454 at OpenCongress. S. 1196 at Congress.gov; S. 1196 at GovTrack; S. 1196 at OpenCongress.

  • news.cnet.com/8301-1023_3-57564193-93/new-aarons-law-aims-to-alter-controversial-computer-fraud-law/

  • Sasso, Brendan. "Lawmakers slam DOJ prosecution of Swartz as 'ridiculous, absurd' - The Hill's Hillicon Valley". Thehill.com. Retrieved 2013-01-16.

  • Reilly, Ryan J. (January 15, 2013). "Darrell Issa Probing Prosecution Of Aaron Swartz, Internet Pioneer Who Killed Himself". Huffingtonpost.com. Retrieved 2013-01-16.


  • http://restorefairness.org/wp-content/uploads/detention_jail.jpg
    Crying Like Da Bitch


    Computer Fraud And Abuse Act Reform

    After the tragic death of programmer and Internet activist Aaron Swartz, EFF calls to reform the infamously problematic Computer Fraud and Abuse Act (CFAA). In June 2013, Aaron's Law, a bipartisan bill to make common sense changes to the CFAA was introduced by Reps. Lofgren and Sensenbrenner. You can help right now by emailing your Senator and Representative to reform the draconian computer crime law.

    The CFAA is the federal anti-hacking law. Among other things, this law makes it illegal to intentionally access a computer without authorization or in excess of authorization; however, the law does not explain what "without authorization" actually means. The statute does attempt to define "exceeds authorized access," but the meaning of that phrase has been subject to considerable dispute. While the CFAA is primarily a criminal law intended to reduce the instances of malicious hacking, a 1994 amendment to the bill allows for civil actions to be brought under the staute.
    Creative prosecutors have taken advantage of this confusion to bring criminal charges that aren't really about hacking a computer, but instead target other behavior prosecutors dislike. For example, in cases like United States v. Drew and United States v. Nosal the government claimed that violating a private agreement or corporate policy amounts to a CFAA violation. This shouldn't be the case. Compounding this problem is the CFAA's disproportionately harsh penalty scheme. Even first-time offenses for accessing a protected computer without sufficient "authorization" can be punishable by up to five years in prison each (ten years for repeat offenses), plus fines. Violations of other parts of the CFAA are punishable by up to ten years, 20 years, and even life in prison. The excessive penalties were a key factor in the government's case against Aaron Swartz, where eleven out of thirteen alleged crimes were CFAA offenses, some of which were "unauthorized" access claims.
    EFF is championing reforms to the CFAA. These suggestions expand on Zoe Lofgren's terrific draft bill known as Aaron's Law. We will expand on this and address other flaws of the CFAA, as well.
    Our proposals
    Specific Reasons to Improve the CFAA
    Initial Suggestions for improving Aaron's Law
    Additional Suggestions for improving the Penalty Scheme

    Stay in Touch

    NSA Spying

    EFF is leading the fight against the NSA's illegal mass surveillance program. Learn more about what the program is, how it works, and what you can do.

    Follow EFF

    Perú: Cuando la inocencia deja de ser una presunción. https://eff.org/r.61jo #LeyStalker
    Sep 24 @ 4:36pm
    Could the VW emissions cheat have been discovered sooner? BBC reports on our work for a car research DMCA exemption: https://eff.org/r.so1q
    Sep 24 @ 4:12pm
    Tonight we’re excited to celebrate Internet champs, privacy advocates, & malware hunters, with help from Ed Snowden: eff.org/pioneer
    Sep 24 @ 2:25pm





















    Reporting Computer, Internet-related, Or Intellectual Property Crime









    Updated May 26, 2015

















    DOJ | 950 Pennsylvania Avenue, NW Washington, DC 20530-0001



     



    H. Marshall Jarrett
    Director, EOUSA
    Michael W. Bailie
    Director, OLE
    OLE
    Litigation
    Series
    Ed Hagen
    Assistant Director,
    OLE
    Scott Eltringham
    Computer Crime
    and Intellectual
    Property Section
    Editor in Chief
    P
                                                                          
    H. Marshall Jarrett
    Director, EOUSA
    Michael W. Bailie
    Director, OLE
    OLE
    Litigation
    Series
    Ed Hagen
    Assistant Director,
    OLE
    Scott Eltringham
    Computer Crime
    and Intellectual
    Property Section
    Editor in Chief
    Prosecuting
    Computer
    Crimes
    Computer Crime and
    Intellectual Property Section
    Criminal Division
    Published by
    Office of Legal Education
    Executive Office for
    United States Attorneys
    The Office of Legal Education intends that this book
    be used by Federal prosecutors for training and law
    enforcement purposes
    .
    The contents of this book provide internal suggestions to
    Department of Justice attorneys. Nothing in it is intended
    to create any substantive or procedural rights, privileges, or
    benefits enforceable in any administrative, civil, or crimina
    iii
    Table of Contents
    Preface and Acknowledgements
    ....................................................................
    v
    Chapter 1. Computer Fraud and Abuse Act
    ..........................................
    1
    A.
    K
    ey Definitions
    .........................................................
    ..............................................
    4
    B.
    O
    btaining National Security Information
    ..........
    §
    1030(a)(1)
    ....................
    12
    C.
    A
    ccessing a Computer and Obtaining
    Information
    ................................................................
    §
    1030(a)(2)
    ....................
    16
    D.
    T
    respassing in a Government Computer
    ............
    §
    1030(a)(3)
    ....................
    23
    E.
    A
    ccessing to Defraud and Obtain Value
    .............
    §
    1030(a)(4)
    ....................
    26

    Scope:
    Connecticut laws/regulations;
    OLR Research Report





    June 28, 2012  
    2012-R-0254
    PENALTIES FOR COMPUTER HACKING

    By: Christopher Reinhart, Chief Attorney
    You asked about the penalties under state law for computer hacking (accessing someone's computer without authorization).
    SUMMARY
    Someone who hacks into another person's computer could be punished by a number of different crimes, depending on the circumstances. The law punishes hacking under the computer crime statutes. These crimes carry penalties ranging from a class B misdemeanor (punishable by up to six months in prison, a fine of up to $1,000, or both) to a class B felony (punishable by up to 20 years in prison, a fine of up to $15,000, or both). The law also punishes unauthorized access to a computer or computer network, with penalties ranging from a class B misdemeanor to a class D felony (punishable by up to five years in prison, a fine of up to $5,000, or both).
    A number of generally applicable crimes could also apply. For example, hacking could be done to commit identity theft or larceny and it could be punished under those generally applicable crimes.

    In addition to criminal penalties, the law specifically authorizes someone harmed by a computer or unauthorized use crime to bring a civil lawsuit against the perpetrator. These civil actions are in addition to any other grounds for a civil action that the injured party may have.
    COMPUTER CRIMES
    A person commits a “computer crime” when he or she:
    1. accesses a computer system without authorization;
    2. accesses or uses a computer system to obtain unauthorized computer services (including computer access, data processing, and data storage);
    3. intentionally or recklessly disrupts, degrades, or causes disruption or degradation of computer services or denies or causes denial of computer services to an authorized user; or
    4. intentionally or recklessly tampers with, takes, transfers, conceals, alters, or damages any equipment used in a computer system.

    It is also a computer crime to misuse computer system data. A person commits this crime by:
    1. accessing a computer system to use, disclose, or copy data residing in, communicated by, or produced by a computer system;
    2. intentionally or recklessly and without authorization (a) tampering with, damaging, or taking data intended for use by a computer system or (b) intercepting or adding to data residing within a computer system;
    3. knowingly receiving or retaining data obtained through misuse of computer system information; or
    4. using or disclosing data he or she knows or believes was obtained through misuse of computer system information (CGS § 53a-251).
    The punishment for committing one of these computer crimes depends on the damage caused and risk of harm created. Table 1 displays the five degrees of computer crime, the amount of damage or harm required for each, and their penalties.
    Table 1: Degrees of Computer Crime and the Requirements for Each Penalty (CGS § 53a-252 et seq.)
    Degree of Computer Crime Amount of Damage or Harm Required Penalty
    1st degree Damage to or the value of the property or computer services is over $10,000 B felony (up to 20 years in prison, a fine of up to $15,000, or both)
    2nd degree Damage to or the value of the property or computer services is over $5,000 C felony (up to 10 years in prison, a fine of up to $10,000, or both)
    3rd degree Damage to or the value of the property or computer services is over $1,000
    Reckless conduct that creates a risk of serious physical injury to another person
    D felony (up to five years in prison, a fine of up to $5,000, or both)
    4th degree Damage to or the value of the property or computer services is over $500 A misdemeanor (up to one year in prison, a fine of up to $2,000, or both)
    5th degree Damage to or the value of the property or computer services, if any, is $500 or less B misdemeanor (up to six months in prison, a fine of up to $1,000, or both)
    By law, the value of property or computer services in a computer crime is (1) their market value; (2) if they are unrecoverable, damaged, or destroyed, the cost of reproducing or replacing them; (3) $250 if their value or damage cannot be satisfactorily ascertained; or (4) $1,500 for private personal data (CGS § 53a-259).
    The law allows the court to require someone convicted of a computer crime to pay up to double the amount of the defendant's gain from the crime, instead of paying a fine (CGS § 53a-257).

    The law gives Connecticut courts jurisdiction whenever any act in furtherance of a computer crime occurs in this state or any computer system or part of one accessed in a computer crime is located in this state (CGS § 53a-261).
    UNAUTHORIZED USE OF COMPUTER OR COMPUTER NETWORK
    It is a crime to use a computer or computer network without authority and with the intent to:
    1. temporarily or permanently remove, halt, or disable computer data, programs, or software;
    2. cause a computer to malfunction;
    3. alter or erase computer data, programs, or software;
    4. create or alter a financial instrument or an electronic funds transfer;
    5. cause physical injury to another's property;
    6. make or cause to be made an unauthorized copy of computer data, programs, or software residing in, communicated by, or produced by a computer or computer network; or
    7. falsify or forge email information or other routing information in any manner in connection with the transmission of unsolicited bulk email through or into the computer network of an electronic mail service provider or its subscribers.
    This crime is a class B misdemeanor but if the person causes over $2,500 in property damage it is a (1) class A misdemeanor if the person acted with reckless disregard for the consequences of his or her actions and (2) class D felony if the person acted maliciously (CGS § 53-451).
    TERRORISM
    The law makes it a class B felony if a person commits a computer crime or unauthorized use of a computer or computer network with intent to intimidate or coerce the civilian population or a unit of government. When the crime is directed against a public safety agency, the law imposes a five year mandatory minimum sentence (CGS § 53a-301).
    OTHER CRIMES
    Depending on the circumstances, a person who hacks into another's computer could be punished by a number of generally applicable crimes.
    For example, if the hacking is done to take personal identifying information for certain purposes, it could be punishable as identity theft. Penalties for identity theft range from a class D to class B felony, primarily based on the value of property taken through the use of personal identifying information and the victim's age (CGS § 53a-129a).
    A person could also hack into a computer to commit larceny. Larceny is intentionally and wrongfully taking, obtaining, or withholding property from an owner in order to appropriate it to himself, herself, or another. The penalties for larceny range from a class C misdemeanor (punishable by up to three months in prison, a fine of up to $500, or both) to a class B felony, primarily based on the value of the property taken (CGS § 53a-118 et seq.).
    CIVIL ACTIONS
    The law specifically authorizes someone harmed by a computer or unauthorized use crime to bring a civil lawsuit against the perpetrator. These civil actions are in addition to any other grounds for a civil action that the injured party may have.
    Computer Crime
    Anyone who believes a person has engaged, is engaging, or is about to engage in a computer crime can file a civil action for (1) a temporary or permanent order preventing the activity; (2) restitution; or (3) appointment of a receiver.
    A person who suffers a personal injury or damage to his or her business or property can also bring an action for damages. The person can recover actual damages, unjust enrichment, triple damages if the defendant acted wilfully and maliciously, reasonable costs, and reasonable attorney's fees (CGS § 52-570b).
    Unauthorized Use
    A person whose property or person is injured by unauthorized use of a computer or computer network can bring a civil action to enjoin further violations and to recover actual damages, including lost profits, and the costs of the action (CGS § 53-452). The attorney general can also bring an action (CGS § 53-453).
    CR:ro
     


    Computer and network surveillance

    From Wikipedia, the free encyclopedia
    This article is about monitoring of computer and network activity. For information on methods of preventing unauthorized access to computer data, see computer security.
    Main article: Surveillance
    Computer and network surveillance is the monitoring of computer activity and data stored on a hard drive, or data being transferred over computer networks such as the Internet. The monitoring is often carried out covertly and may be completed by governments, corporations, criminal organizations, or individuals. It may or may not be legal and may or may not require authorization from a court or other independent government agency.
    Computer and network surveillance programs are widespread today and almost all Internet traffic can be monitored for illegal activity.[1]
    Surveillance allows governments and other agencies to maintain social control, recognize and monitor threats, and prevent and investigate criminal activity. With the advent of programs such as the Total Information Awareness program, technologies such as high speed surveillance computers and biometrics software, and laws such as the Communications Assistance For Law Enforcement Act, governments now possess an unprecedented ability to monitor the activities of citizens.[2]
    However, many civil rights and privacy groups, such as Reporters Without Borders, the Electronic Frontier Foundation, and the American Civil Liberties Union, have expressed concern that with increasing surveillance of citizens we will end up in or are even already in a mass surveillance society, with limited political and/or personal freedoms. Such fear has led to numerous lawsuits such as Hepting v. AT&T.[2][3] The hacktivist group Anonymous has hacked into government websites in protest of what it considers "draconian surveillance".[4][5]

    Contents

    Network surveillance

    The vast majority of computer surveillance involves the monitoring of data and traffic on the Internet.[6] For example, in the United States, the Communications Assistance For Law Enforcement Act, mandates that all phone calls and broadband internet traffic (emails, web traffic, instant messaging, etc.) be available for unimpeded, real-time monitoring by Federal law enforcement agencies.[7][8][9]
    Packet capture (also known as "packet sniffing") is the monitoring of data traffic on a computer network.[10] Data sent between computers over the Internet or between any networks takes the form of small chunks called packets, which are routed to their destination and assembled back into a complete message. A Packet Capture Appliance intercepts these packets, so that they may be examined and analyzed. Computer technology is needed to perform traffic analysis and sift through intercepted data to look for important/useful information. Under the Communications Assistance For Law Enforcement Act, all U.S. telecommunications providers are required to install such packet capture technology so that Federal law enforcement and intelligence agencies are able to intercept all of their customers' broadband Internet and voice over Internet protocol (VoIP) traffic.[11]
    There is far too much data gathered by these packet sniffers for human investigators to manually search through. Thus, automated Internet surveillance computers sift through the vast amount of intercepted Internet traffic, filtering out,[12] and reporting to investigators those bits of information which are "interesting", for example, the use of certain words or phrases, visiting certain types of web sites, or communicating via email or chat with a certain individual or group.[13] Billions of dollars per year are spent by agencies such as the Information Awareness Office, NSA, and the FBI, for the development, purchase, implementation, and operation of systems which intercept and analyze this data, extracting only the information that is useful to law enforcement and intelligence agencies.[14]
    Similar systems are now used by Iranian secret police to identify and suppress dissidents. All of the technology has been allegedly installed by German Siemens AG and Finnish Nokia.[15]
    The Internet's rapid development has become a primary form of communication. More people are potentially subject to Internet surveillance. There are advantages and disadvantages to network monitoring. For instance, systems described as "Web 2.0"[16] have greatly impacted modern society. An advantage to online surveillance is that large social media platforms, such as YouTube, Twitter and Facebook, enable people to contact friends, family, and strangers daily. Tim O’ Reilly, who first explained the concept of "Web 2.0",[16] stated that Web 2.0 provides communication platforms that are "user generated", with self-produced content, motivating more people to communicate with friends online.[17] However, Internet surveillance also has a disadvantage. One researcher from Uppsala University said "Web 2.0 surveillance is directed at large user groups who help to hegemonically produce and reproduce surveillance by providing user-generated (self-produced) content. We can characterize Web 2.0 surveillance as mass self-surveillance".[18] Surveillance companies monitor people while they are focused on work or entertainment. This can emotionally affect people; this is because it can cause emotions like jealousy. A research group states "...we set out to test the prediction that feelings of jealousy lead to ‘creeping’ on a partner through Facebook, and that women are particularly likely to engage in partner monitoring in response to jealousy".[19] The study shows that women can become jealous of other people when they are in an online group.

    Corporate surveillance

    Corporate surveillance of computer activity is very common. The data collected is most often used for marketing purposes or sold to other corporations, but is also regularly shared with government agencies. It can be used as a form of business intelligence, which enables the corporation to better tailor their products and/or services to be desirable by their customers. Or the data can be sold to other corporations, so that they can use it for the aforementioned purpose. Or it can be used for direct marketing purposes, such as targeted advertisements, where ads are targeted to the user of the search engine by analyzing their search history and emails[20] (if they use free webmail services), which is kept in a database.[21]
    One important component of prevention is establishing the business purposes of monitoring, which may include the following: Preventing misuse of resources. Companies can discourage unproductive personal activities such as online shopping or web surfing on company time. Monitoring employee performance is one way to reduce unnecessary network traffic and reduce the consumption of network bandwidth. Promoting adherence to policies. Online surveillance is one means of verifying employee observance of company networking policies. Preventing lawsuits. Firms can be held liable for discrimination or employee harassment in the workplace. Organizations can also be involved in infringement suits through employees that distribute copyrighted material over corporate networks. Safeguarding records. Federal legislation requires organizations to protect personal information. Monitoring can determine the extent of compliance with company policies and programs overseeing information security. Monitoring may also deter unlawful appropriation of personal information, and potential spam or viruses. Safeguarding company assets. The protection of intellectual property, trade secrets, and business strategies is a major concern. The ease of information transmission and storage makes it imperative to monitor employee actions as part of a broader policy. A second component of prevention is determining the ownership of technology resources. The ownership of the firm’s networks, servers, computers, files, and e-mail should be explicitly stated. There should be a distinction between an employee’s personal electronic devices, which should be limited and proscribed, and those owned by the firm.
    For instance, Google, the world's most popular search engine, stores identifying information for each web search. An IP address and the search phrase used are stored in a database for up to 18 months.[22] Google also scans the content of emails of users of its Gmail webmail service, in order to create targeted advertising based on what people are talking about in their personal email correspondences.[23] Google is, by far, the largest Internet advertising agency—millions of sites place Google's advertising banners and links on their websites, in order to earn money from visitors who click on the ads. Each page containing Google advertisements adds, reads, and modifies "cookies" on each visitor's computer.[24] These cookies track the user across all of these sites, and gather information about their web surfing habits, keeping track of which sites they visit, and what they do when they are on these sites. This information, along with the information from their email accounts, and search engine histories, is stored by Google to use to build a profile of the user to deliver better-targeted advertising.[23]
    The United States government often gains access to these databases, either by producing a warrant for it, or by simply asking. The Department of Homeland Security has openly stated that it uses data collected from consumer credit and direct marketing agencies for augmenting the profiles of individuals that it is monitoring.[21]

    Malicious software

    For a more detailed discussion of topics mentioned in this section see: Spyware, Computer virus, Trojan (computer security), Keylogger, Backdoor (computing)
    In addition to monitoring information sent over a computer network, there is also a way to examine data stored on a computer's hard drive, and to monitor the activities of a person using the computer. A surveillance program installed on a computer can search the contents of the hard drive for suspicious data, can monitor computer use, collect passwords, and/or report back activities in real-time to its operator through the Internet connection.[25] Keylogger is an example of this type of program. Normal keylogging programs store their data on the local hard drive, but some are programmed to automatically transmit data over the network to a remote computer or Web server.
    There are multiple ways of installing such software. The most common is remote installation, using a backdoor created by a computer virus or trojan. This tactic has the advantage of potentially subjecting multiple computers to surveillance. Viruses often spread to thousands or millions of computers, and leave "backdoors" which are accessible over a network connection, and enable an intruder to remotely install software and execute commands. These viruses and trojans are sometimes developed by government agencies, such as CIPAV and Magic Lantern. More often, however, viruses created by other people or spyware installed by marketing agencies can be used to gain access through the security breaches that they create.[26]
    Another method is "cracking" into the computer to gain access over a network. An attacker can then install surveillance software remotely. Servers and computers with permanent broadband connections are most vulnerable to this type of attack.[27] Another source of security cracking is employees giving out information or users using brute force tactics to guess their password.[28]
    One can also physically place surveillance software on a computer by gaining entry to the place where the computer is stored and install it from a compact disc, floppy disk, or thumbdrive. This method shares a disadvantage with hardware devices in that it requires physical access to the computer.[29] One well-known worm that uses this method of spreading itself is Stuxnet.[30]

    Social network analysis

    One common form of surveillance is to create maps of social networks based on data from social networking sites as well as from traffic analysis information from phone call records such as those in the NSA call database,[31] and internet traffic data gathered under CALEA. These social network "maps" are then data mined to extract useful information such as personal interests, friendships and affiliations, wants, beliefs, thoughts, and activities.[32][33][34]
    Many U.S. government agencies such as the Defense Advanced Research Projects Agency (DARPA), the National Security Agency (NSA), and the Department of Homeland Security (DHS) are currently investing heavily in research involving social network analysis.[35][36] The intelligence community believes that the biggest threat to the U.S. comes from decentralized, leaderless, geographically dispersed groups. These types of threats are most easily countered by finding important nodes in the network, and removing them. To do this requires a detailed map of the network.[34][37]
    Jason Ethier of Northeastern University, in his study of modern social network analysis, said the following of the Scalable Social Network Analysis Program developed by the Information Awareness Office:
    The purpose of the SSNA algorithms program is to extend techniques of social network analysis to assist with distinguishing potential terrorist cells from legitimate groups of people ... In order to be successful SSNA will require information on the social interactions of the majority of people around the globe. Since the Defense Department cannot easily distinguish between peaceful citizens and terrorists, it will be necessary for them to gather data on innocent civilians as well as on potential terrorists.
    — Jason Ethier[34]

    Monitoring from a distance

    It has been shown that it is possible to monitor computers from a distance, with only commercially available equipment, by detecting the radiation emitted by the CRT monitor. This form of computer surveillance, known as TEMPEST, involves reading electromagnetic emanations from computing devices in order to extract data from them at distances of hundreds of meters.[38][39][40]
    IBM researchers have also found that, for most computer keyboards, each key emits a slightly different noise when pressed. The differences are individually identifiable under some conditions, and so it's possible to log key strokes without actually requiring logging software to run on the associated computer.[41][42]
    And it has also been shown, by Adi Shamir et al., that even the high frequency noise emitted by a CPU includes information about the instructions being executed.[43]

    Policeware and govware

    Policeware is software designed to police citizens by monitoring discussion and interaction of its citizens.[44] Within the U.S., Carnivore was a first incarnation of secretly installed e-mail monitoring software installed in Internet service providers' networks to log computer communication, including transmitted e-mails.[45] Magic Lantern is another such application, this time running in a targeted computer in a trojan style and performing keystroke logging. CIPAV, deployed by FBI, is a multi-purpose spyware/trojan.
    The "Consumer Broadband and Digital Television Promotion Act" (CBDTA) was a bill proposed in the United States Congress. CBDTPA was known as the "Security Systems and Standards Certification Act" (SSSCA) while in draft form, and was killed in committee in 2002. Had CBDTPA become law, it would have prohibited technology that could be used to read digital content under copyright (such as music, video, and e-books) without Digital Rights Management (DRM) that prevented access to this material without the permission of the copyright holder.[46]
    In German-speaking countries, spyware used or made by the government is sometimes called govware.[47] Some countries like Switzerland and Germany have a legal framework governing the use of such software.[48][49] Known examples include the Swiss MiniPanzer and MegaPanzer and the German R2D2 (trojan).

    Surveillance as an aid to censorship

    Surveillance and censorship are different. Surveillance can be performed without censorship, but it is harder to engage in censorship without some form of surveillance.[50] And even when surveillance does not lead directly to censorship, the widespread knowledge or belief that a person, their computer, or their use of the Internet is under surveillance can lead to self-censorship.[51]
    In March 2013 Reporters Without Borders issued a Special report on Internet surveillance that examines the use of technology that monitors online activity and intercepts electronic communication in order to arrest journalists, citizen-journalists, and dissidents. The report includes a list of "State Enemies of the Internet", Bahrain, China, Iran, Syria, and Vietnam, countries whose governments are involved in active, intrusive surveillance of news providers, resulting in grave violations of freedom of information and human rights. Computer and network surveillance is on the increase in these countries. The report also includes a second list of "Corporate Enemies of the Internet", Amesys (France), Blue Coat Systems (U.S.), Gamma (UK and Germany), Hacking Team (Italy), and Trovicor (Germany), companies that sell products that are liable to be used by governments to violate human rights and freedom of information. Neither list is exhaustive and they are likely to be expanded in the future.[52]
    Protection of sources is no longer just a matter of journalistic ethics. Journalists should equip themselves with a "digital survival kit" if they are exchanging sensitive information online, storing it on a computer hard-drive or mobile phone.[52][53] Individuals associated with high profile rights organizations, dissident groups, protest groups, or reform groups are urged to take extra precautions to protect their online identities.[54]

    See also



    References










  • Anne Broache. "FBI wants widespread monitoring of 'illegal' Internet activity". CNET. Retrieved 25 March 2014.

    1. Everyone's Guide to By-passing Internet Censorship, The Citizen Lab, University of Toronto, September 2007

    External links










  • "Is the U.S. Turning Into a Surveillance Society?". American Civil Liberties Union. Retrieved March 13, 2009.

  • "Bigger Monster, Weaker Chains: The Growth of an American Surveillance Society" (PDF). American Civil Liberties Union. January 15, 2003. Retrieved March 13, 2009.

  • "Anonymous hacks UK government sites over 'draconian surveillance' ", Emil Protalinski, ZDNet, 7 April 2012, retrieved 12 March 2013

  • Hacktivists in the frontline battle for the internet retrieved 17 June 2012

  • Diffie, Whitfield; Susan Landau (August 2008). "Internet Eavesdropping: A Brave New World of Wiretapping". Scientific American. Retrieved 2009-03-13.

  • "CALEA Archive -- Electronic Frontier Foundation". Electronic Frontier Foundation (website). Retrieved 2009-03-14.

  • "CALEA: The Perils of Wiretapping the Internet". Electronic Frontier Foundation (website). Retrieved 2009-03-14.

  • "CALEA: Frequently Asked Questions". Electronic Frontier Foundation (website). Retrieved 2009-03-14.

  • Kevin J. Connolly (2003). Law of Internet Security and Privacy. Aspen Publishers. p. 131. ISBN 978-0-7355-4273-0.

  • American Council on Education vs. FCC, Decision, United States Court of Appeals for the District of Columbia Circuit, 9 June 2006. Retrieved 8 September 2013.

  • "Web filtering software". Retrieved 25 March 2014.

  • Hill, Michael (October 11, 2004). "Government funds chat room surveillance research". USA Today. Associated Press. Retrieved 2009-03-19.

  • McCullagh, Declan (January 30, 2007). "FBI turns to broad new wiretap method". ZDNet News. Retrieved 2009-03-13.

  • "First round in Internet war goes to Iranian intelligence", Debkafile, 28 June 2009. (subscription required)

  • O'Reilly, T. (2005). What is Web 2.0: Design Patterns and Business Models for the Next Generation of Software. O’Reilly Media, 1-5.

  • Fuchs, C. (2011). New Media, Web 2.0 and Surveillance. Sociology Compass, 134-147.

  • Fuchs, C. (2011). Web 2.0, Presumption, and Surveillance. Surveillance & Society, 289-309.

  • Muise, A., Christofides, E., & Demsmarais, S. (2014). " Creeping" or just information seeking? Gender differences in partner monitoring in response to jealousy on Facebook. Personal Relationships, 21(1), 35-50.

  • Story, Louise (November 1, 2007). "F.T.C. to Review Online Ads and Privacy". New York Times. Retrieved 2009-03-17.

  • Butler, Don (January 31, 2009). "Are we addicted to being watched?". The Ottawa Citizen (canada.com). Retrieved 26 May 2013.

  • Soghoian, Chris (September 11, 2008). "Debunking Google's log anonymization propaganda". CNET News. Retrieved 2009-03-21.

  • Joshi, Priyanki (March 21, 2009). "Every move you make, Google will be watching you". Business Standard. Retrieved 2009-03-21.

  • "Advertising and Privacy". Google (company page). 2009. Retrieved 2009-03-21.

  • "Spyware Workshop: Monitoring Software on Your OC: Spywae, Adware, and Other Software", Staff Report, U.S. Federal Trade Commission, March 2005. Retrieved 7 September 2013.

  • Aycock, John (2006). Computer Viruses and Malware. Springer. ISBN 978-0-387-30236-2.

  • "Office workers give away passwords for a cheap pen", John Leyden, The Register, 8 April 2003. Retrieved 7 September 2013.

  • "Passwords are passport to theft", The Register, 3 March 2004. Retrieved 7 September 2013.

  • "Social Engineering Fundamentals, Part I: Hacker Tactics", Sarah Granger, 18 December 2001.

  • "Stuxnet: How does the Stuxnet worm spread?". Antivirus.about.com. 2014-03-03. Retrieved 2014-05-17.

  • Keefe, Patrick (March 12, 2006). "Can Network Theory Thwart Terrorists?". New York Times. Retrieved 14 March 2009.

  • Albrechtslund, Anders (March 3, 2008). "Online Social Networking as Participatory Surveillance". First Monday 13 (3). Retrieved March 14, 2009.

  • Fuchs, Christian (2009). Social Networking Sites and the Surveillance Society. A Critical Case Study of the Usage of studiVZ, Facebook, and MySpace by Students in Salzburg in the Context of Electronic Surveillance (PDF). Salzburg and Vienna: Forschungsgruppe Unified Theory of Information. ISBN 978-3-200-01428-2. Retrieved March 14, 2009.

  • Ethier, Jason (27 May 2006). "Current Research in Social Network Theory" (PDF). Northeastern University College of Computer and Information Science. Retrieved 15 March 2009.

  • Marks, Paul (June 9, 2006). "Pentagon sets its sights on social networking websites". New Scientist. Retrieved 2009-03-16.

  • Kawamoto, Dawn (June 9, 2006). "Is the NSA reading your MySpace profile?". CNET News. Retrieved 2009-03-16.

  • Ressler, Steve (July 2006). "Social Network Analysis as an Approach to Combat Terrorism: Past, Present, and Future Research". Homeland Security Affairs II (2). Retrieved March 14, 2009.

  • McNamara, Joel (4 December 1999). "Complete, Unofficial Tempest Page". Retrieved 7 September 2013.

  • Van Eck, Wim (1985). "Electromagnetic Radiation from Video Display Units: An Eavesdropping Risk?" (PDF). Computers & Security 4: 269–286. doi:10.1016/0167-4048(85)90046-X.

  • Kuhn, M.G. (26–28 May 2004). "Electromagnetic Eavesdropping Risks of Flat-Panel Displays" (PDF). 4th Workshop on Privacy Enhancing Technologies (Toronto): 23–25.

  • Asonov, Dmitri; Agrawal, Rakesh (2004), Keyboard Acoustic Emanations (PDF), IBM Almaden Research Center

  • Yang, Sarah (14 September 2005), "Researchers recover typed text using audio recording of keystrokes", UC Berkeley News

  • Adi Shamir & Eran Tromer. "Acoustic cryptanalysis". Blavatnik School of Computer Science, Tel Aviv University. Retrieved 1 November 2011.

  • Jeremy Reimer (20 July 2007). "The tricky issue of spyware with a badge: meet 'policeware'". Ars Technica.

  • Hopper, D. Ian (4 May 2001). "FBI's Web Monitoring Exposed". ABC News.

  • "Consumer Broadband and Digital Television Promotion Act", U.S. Senate bill S.2048, 107th Congress, 2nd session, 21 March 2002. Retrieved 8 September 2013.

  • "Swiss coder publicises government spy Trojan". News.techworld.com. Retrieved 25 March 2014.

  • Basil Cupa, Trojan Horse Resurrected: On the Legality of the Use of Government Spyware (Govware), LISS 2013, pp. 419-428

  • "FAQ – Häufig gestellte Fragen". Ejpd.admin.ch. 2011-11-23. Retrieved 2014-05-17.

  • "Censorship is inseparable from surveillance", Cory Doctorow, The Guardian, 2 March 2012

  • "Trends in transition from classical censorship to Internet censorship: selected country overviews"

  • The Enemies of the Internet Special Edition : Surveillance, Reporters Without Borders, 12 March 2013

  • "When Secrets Aren’t Safe With Journalists", Christopher Soghoian, New York Times, 26 October 2011


  • BOTTOM LINE.

    I AM GOING TO TRACK YA ALL

    FIND YA ALL

    TURN YA ALL OVER FOR PROSECUTION.

    I'm Making The Call Today Faggots


    Ryan. Out.


    Tail End

    The Beautiful Woman Of Ukraine
     
        
        
         http://ejc.net/uploads/media_landscapes/ukraine1.jpg


    United States

    Ukraine

    France

    Germany

    Sweden

    Canada

    Portugal

    United Kingdom

    Indonesia

    Australia
    Tanzania 

    In Da House

    Runnin Wild 


    Down
    In
    Da
    Da Swamp


     

    Didn't 
    Yo 
    Mamma 
    Tell 
    Ya All 
    Bout 
    Da Swamp


    Shelby Cobra Sittin On Chrome


















    Welcome to Our Showroom

    LA’s Premiere Classic, Sports and Performance Car Specialists
    We are a group of dedicated car enthusiasts and classic car dealers, 

    who for the last 25 years have been sourcing and supplying quality 
    west coast classics, exotics, and luxury automobiles to customers around the world. 
    We have extensive contacts throughout the California car community, 
    and can usually locate any car that is not already in our million dollar inventory.
    We Buy and Sell Quality Classic, Sports and Performance Cars
    We are always looking to buy good quality classics or modern performance cars, 

    and have waiting buyers worldwide. 
    If you're thinking "I want to sell my car", 
    then call us first 
    310-827-8665

    Customer Reviews



    Chequered Flag International - ClassicSports & Performance Car Specialists

    At Chequered Flag International we are proud of the quality vehicles we sell and our dedication 
    to serve the needs of our customers. 
    This is reflected in the amount of repeat business we receive. 
    Whether this is your first purchase with us or one of many that you’ve had, you can count 
    on our dedicated sales staff to make it the best buying experience possible.

    Find Us

    Chequered Flag International  
    4128 Lincoln Blvd  
    Marina Del ReyCA 
    90292  
    310-827-8665



    While In Tucson, Arizona.
    There 
    Is
    Only
    One
    Taxi
    Company.
    Da Swamps
    ONLY
    Choice.

     http://media.merchantcircle.com/30145098/Back-Seat-Ads-006_medium.jpeg







     
     Home

    Moon Smoke Shop

    Are you a tobacco fan or aficionado?
    Come to Moon Smoke Shop of Tucson, AZ.
    Our tobacco shop has everything you need to maximize your smoking experience.
    An array of smoking and tobacco accessories that make your smoking experience convenient and easy, and an inventory of fun gift items for the smoker in your life.
    Come shop today!
    Get to Know Moon Smoke Shop:
    • Smoking And Tobacco Accessories – Pipes and pipe tools, cigarette cases, humidors, rolling machines, rolling trays, scales, lighters and ashtrays, tips for cigarette holders, and more
    • Gift Items – Candles and candle holders, incense and incense holders, card sets, engraved boxes, coffee cups, and stickers
    You can choose one of our four convenient locations.
    Our courteous and friendly staff will be glad to answer any question you may have.
    We’ve been serving your fellow Arizonans for over 30 years.
    Contact Moon Smoke Shop today at 520-622-7261 to learn more about our tobacco shops, or browse our website for more information about our products.
     







         
    Home | Smoking And Tobacco Accessories | Gift Items | Contact
    © 2015 hibu, Inc. All Rights Reserved | Privacy Policy










    Please Foreword
    All Comments
    To:

    psapatriot@gmail.com

    At 
    Da Swamps
    World Corporate Headquarters









     

    The Band - Full Concert - 07/20/76 - Casino Arena (OFFICIAL)














    Roy Haynes Quartet featuring Roland Kirk - Fly Me to the Moon














    Tupac - Only God Can Judge Me (Official Video)



    South Central Los Angeles Representing

    Rickie Lee Jones - Rickie Lee Jones [FULL ALBUM]



    Aretha Franklin - 23 Greatest Hits Full Album | Best songs of Aretha Franklin



    The Rolling Stones Let It Bleed 1969, Remastered Full Album







    John Mayall & the Bluesbreakers - The Best of 1964-1969 (Full Album)

    by candy channel 19









    Pearl Jam Alive - Duration: 5:14.




    Nirvana Live at Reading 1992(full concert) 1080p 

    by Nirvana Kurt-Krist-Dave




    by bonnodato