Comment Submitted by J. Alex Halderman

Total Page:16

File Type:pdf, Size:1020Kb

Comment Submitted by J. Alex Halderman BEFORE THE FEDERAL TRADE COMMISSION IN THE MATTER OF FTC TOWN HALL TO ADDRESS DIGITAL RIGHTS MANAGEMENT TECHNOLOGIES Comment of: J. Alex Halderman Assistant Professor of Electrical Engineering and Computer Science ‐‐ University of Michigan CSE Building, Room 4717 2260 Hayward Avenue Ann Arbor, MI 48109‐2121 Represented by: Blake E. Reid, Clinician and Juris Doctor Candidate Harry A. Surden, Associate Professor of Law Paul K. Ohm, Associate Professor of Law J. Brad Bernthal, Associate Clinical Professor of Law ‐‐ Samuelson­Glushko Technology Law & Policy Clinic University of Colorado School of Law 105R Wolf Law Building, 401 UCB Boulder, CO 80309‐0401 January 29, 2009 Pursuant to the Proposed Topics for Discussion1 and the Notice and Request for Public Comment2 in regard to an FTC Town Hall Meeting to Address Digital Rights Management Technologies, we request that the Commission consider an approach to mitigating the security risks posed to consumers by digital rights management (“DRM”) systems. In particular, our request focuses on DRM‐protected consumer products that are accessible on personal computers (“PCs”), including video games, audio compact discs, and other works. The Commission has called for discussion on improving disclosures to consumers regarding limitations of DRM systems. Consumers would benefit greatly from transparent disclosures about the specific security risks posed by many PC‐based DRM systems. These risks can include the surreptitious installation of undesired software, the loss of control over critical PC software and hardware, and exposure to cyber‐attacks and malware such as viruses, worms, Trojan horses, and spyware, which may lead to the compromise of private personal data. 1 Available at http://www.ftc.gov/bcp/workshops/drm/topics.shtml. 2 Available at https://secure.commentworks.com/ftc‐DRMtechnologies/. Unfortunately, the content industry has been largely unable or unwilling to disclose the security risks posed to consumers by these DRM systems prior to the release of products. Content producers have remained largely dismissive of consumer concern over potential security risks, and have responded lethargically, if at all, with fixes to serious security problems. Furthermore, certain industry members have stifled the efforts of independent security researchers, who were acting in good faith to discover and fix these problems, by threatening litigation under the anti‐circumvention measures of the Digital Millennium Copyright Act (“DMCA”). This state of affairs leaves many consumers vulnerable to security threats and uninformed of the risks that they face. We believe that this is an untenable situation. In the ongoing triennial DMCA exemption rulemaking at the Library of Congress, we have requested appropriate exemptions from the DMCA anti‐circumvention measures to allow independent security researchers acting in good faith to investigate and correct security problems in DRM on many PC‐accessible works ex post. However, consumers would surely benefit from more proactive behavior on the part of the content industry to address security problems ex ante, before they end up affecting consumers’ PCs. While class action lawsuits over security problems3 may lead to ad hoc change by individual companies, it does not appear that a comprehensive, proactive approach to addressing DRM security problems will manifest across the content industry without some form of regulatory intervention. Accordingly, we ask the Commission to consider pursuing and implementing a two‐ pronged solution that will require or strongly encourage companies using DRM systems on PC‐accessible products to: 1) submit to independent security audits of the DRM systems and 2) provide conspicuous notice to consumers of the products regarding the nature, operation, and limitations of any DRM systems included in the products, as well as the general security risks inherent to most PC‐based DRM systems and any known flaws specific to the included DRM systems. In support of our request, we have attached the following documents for the consideration of the Commission: • J. Alex Halderman, Blake E. Reid, Paul K. Ohm, Harry A. Surden, and J. Brad Bernthal, In the Matter of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies (Dec. 2, 2008) (rulemaking filing discussing the current state of PC‐based DRM systems and security issues). • J. Alex Halderman and Edward W. Felten, Lessons from the Sony CD DRM Episode (Feb. 14, 2006) (an in‐depth, peer‐reviewed analysis of the Sony‐BMG rootkit saga). 3 Five class action suits have now been filed against Electronic Arts over potential security problems in the SecuROM DRM software. See The People vs. SecuROM, RECLAIM YOUR GAME!, available at http://www.reclaimyourgame.com/index.php?option=com_content&view=section&layout =blog&id=17&Itemid=57. 2 • Edward W. Felten, J. Alex Halderman, Deirdre K. Mulligan, and Aaron Perzanowski, Comment Re: RM 2005­11 – Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies (Dec. 1, 2005) (rulemaking filing discussing the Sony rootkit saga)). We have separately requested that Professor Halderman be considered as a panelist for the Mar. 25, 2009 Town Hall meeting on DRM. We thank the Commission for its consideration. Sincerely, /s/ J. Alex Halderman • Blake E. Reid • Harry Surden • Paul Ohm • J. Brad Bernthal Enclosures 3 BEFORE THE COPYRIGHT OFFICE OF THE LIBRARY OF CONGRESS IN THE MATTER OF EXEMPTION TO PROHIBITION ON CIRCUMVENTION OF COPYRIGHT PROTECTION SYSTEMS FOR ACCESS CONTROL TECHNOLOGIES Docket No. RM 2008­8 Comment of: J. Alex Halderman Assistant Professor of Electrical Engineering and Computer Science ‐‐ University of Michigan CSE Building 2260 Hayward Avenue Ann Arbor, MI 48109‐2121 Represented by: Blake E. Reid, Clinician and Juris Doctor Candidate Paul K. Ohm, Associate Professor of Law Harry A. Surden, Associate Professor of Law J. Brad Bernthal, Associate Clinical Professor of Law ‐‐ Samuelson­Glushko Technology Law & Policy Clinic University of Colorado School of Law 105R Wolf Law Building, 401 UCB Boulder, CO 80309‐0401 December 2, 2008 Pursuant to the Notice of Inquiry of Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies1 (“NOI”) and 17 U.S.C. § 1201(a)(1)(C), we respectfully request that the Librarian of Congress grant an exemption to 17 U.S.C. § 1201(a)(1)(A) for (1) literary works, sound recordings, and audiovisual works accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works and create or exploit security flaws or vulnerabilities that compromise the security of personal computers, when circumvention is accomplished solely for the purpose of good faith testing, investigating, or correcting such security flaws or vulnerabilities, or, in the alternative, for (2) video games accessible on personal computers and protected by technological protection measures that control access to lawfully obtained works and create or exploit security flaws or vulnerabilities that compromise the security of personal computers, when circumvention is accomplished solely for the purpose of good faith testing, investigating, or correcting such security flaws or vulnerabilities. 1 70 Fed. Reg. 73, 58073 (Oct. 6, 2008) [hereinafter NOI]. I. Submitting Party J. Alex Halderman is a noted computer security and privacy researcher and an assistant professor of electric engineering and computer science at the University of Michigan.2 His research focuses particularly on the threats introduced by access and copy‐ protection measures. In particular, he published in 2003 an academic paper on SunnComm’s MediaMax copy‐protection system3. In response, SunnComm first threatened a lawsuit under the Digital Millennium Copyright Act (“DMCA”)4, then subsequently retracted the lawsuit, citing the “chilling effect on [computer security] research.”5 Partially in response, Professor Halderman proposed, as part of the third iteration of this rulemaking process (along with Princeton Professor Edward W. Felten), an exemption to the DMCA anti‐circumvention measures to address the chilling effect of the statute on computer security researchers in the context of insecure technological protection measures (“TPMs”) on compact discs containing audio recordings and the unfair access limits that the statute placed on consumers.6 As a result, the Librarian of Congress exempted the following class of works from the anti‐circumvention measures (hereinafter “Sound Recordings Exemption”): Sound recordings, and audiovisual works associated with those sound recordings, distributed in compact disc format and protected by technological protection measures that control access to lawfully obtained works and create or exploit security flaws or vulnerabilities that compromise the security of personal computers, when circumvention is accomplished solely for the purpose of good faith testing, investigating, or correcting such security flaws or vulnerabilities.7 2 http://www.cse.umich.edu/~jhalderm/. 3 J. Alex. Halderman, Analysis of the MediaMax CD3 Copy­Prevention System, PRINCETON UNIVERSITY COMPUTER SCIENCE TECHNICAL REPORTS TR‐679‐03, available at http://www.cs.princeton.edu/research/techreps/TR‐679‐03. 4 Fred Locklear, Press “Shift” to Initiate Lawsuit, ARS TECHNICA (Oct. 9, 2003), available at http://arstechnica.com/archive/news/1065755223.html. 5 Fred Locklear, SunnComm Shifts Stance,
Recommended publications
  • Cedars, October 6, 2005 Cedarville University
    Masthead Logo Cedarville University DigitalCommons@Cedarville Cedars 10-6-2005 Cedars, October 6, 2005 Cedarville University Follow this and additional works at: https://digitalcommons.cedarville.edu/cedars Part of the Journalism Studies Commons, and the Organizational Communication Commons DigitalCommons@Cedarville provides a platform for archiving the scholarly, creative, and historical record of Cedarville University. The views, opinions, and sentiments expressed in the articles published in the university’s student newspaper, Cedars (formerly Whispering Cedars), do not necessarily indicate the endorsement or reflect the views of DigitalCommons@Cedarville, the Centennial Library, or Cedarville University and its employees. The uthora s of, and those interviewed for, the articles in this paper are solely responsible for the content of those articles. Please address questions to [email protected]. Recommended Citation Cedarville University, "Cedars, October 6, 2005" (2005). Cedars. 64. https://digitalcommons.cedarville.edu/cedars/64 This Issue is brought to you for free and open access by Footer Logo DigitalCommons@Cedarville, a service of the Centennial Library. It has been accepted for inclusion in Cedars by an authorized administrator of DigitalCommons@Cedarville. For more information, please contact [email protected]. EEASYASY AASS 1 - 2 - 3 News ...............2 MAKE YOUR OWN WEBSITE! WWW. CEDARSONLINE. COM A & E ..............5 SEE CENTER SPREAD Viewpoints ......10 EDARS Sports ............13 THURSDAY, OCTOBER 6, 2005 C VOL. 54 ISS. 3 :ARTON CAMPUS By Laura Ramey By Jennifernifer ElgenaEl CONTRIBUTING WRITER STAFF WRITER year is that the student and alumni homecomings are What is art? Is some- Homecoming 2005, fall combined into one week- thing only art when it is semester’s biggest event, end.
    [Show full text]
  • Intellectual Property Part 2 Pornography
    Intellectual Property Part 2 Pornography By Jeremy Parmenter What is pornography Pornography is the explicit portrayal of sexual subject matter Can be found as books, magazines, videos The web has images, tube sites, and pay sites scattered with porn Statistics 12% of total websites are pornography websites 25% of total daily search engine requests are pornographic requests 42.7% of internet users who view pornography 34% internet users receive unwanted exposure to sexual material $4.9 billion in internet pornography sales 11 years old is the average age of first internet exposure to pornography Innovations ● Richard Gordon created an e-commerce start up in mid- 90s that was used on many sites, most notably selling Pamela Anderson/Tommey Lee sex tape ● Danni Ashe founded Danni's Hard Drive with one of the first streaming video without requiring a plug-in ● Adult content sites were one of the first to use traffic optimization by linking to similar sites ● Live chat during the early days of the web ● Pornographic companies were known to give away broadband devices to promote faster connections Negative Impacts ● Between 2001-2002 adult-oriented spam rose 450% ● Malware such as Trojans and video codecs occur most often on porn sites ● Domain hijacking, using fake documents and information to steal a site ● Pop-ups preventing users from leaving the site or infecting their computer ● Browser hijacking adware or spyware manipulating the browser to change home page or search engine to a bogus site, including pay-per-click adult site ● Accessibility
    [Show full text]
  • A Critique of the Digital Millenium Copyright Act's
    THINKPIECE ACRITIQUE OF THE DIGITAL MILLENIUM COPYRIGHT ACT’S EXEMPTION ON ENCRYPTION RESEARCH: IS THE EXEMPTION TOO NARROW? VICKY KU I. INTRODUCTION.................................................................. 466 II. PART I: WHAT IS ENCRYPTION RESEARCH? ABRIEF HISTORY470 III. PART II: OVERVIEW OF SECTION 1201(A)(1) OF THE DMCA474 A. WHAT DOES IT SAY?.................................................... 474 B. WHAT WAS ITS INTENDED PURPOSE? .......................... 474 C. WHAT IS THE PURPOSE OF 1201(G)? ........................... 475 IV.PART III: IMPACT OF SECTION 1201(G) OF THE DMCA ON ENCRYPTION RESEARCH .................................................. 485 A. WHO IN THE ACADEMIC COMMUNITY HAS BEEN AFFECTED? .................................................................................. 485 V. PART IV: PROPOSED CHANGES TO THE DMCA.................. 488 VI.CONCLUSION ..................................................................... 489 Jointly reviewed and edited by Yale Journal of Law & Technology and International Journal of Communications Law & Policy. Author’s Note. 466 YALE JOURNAL OF LAW &TECHNOLOGY 2004-2005 ACRITIQUE OF THE DIGITAL MILLENIUM COPYRIGHT ACT’S EXEMPTION ON ENCRYPTION RESEARCH: IS THE EXEMPTION TOO NARROW? VICKY KU Section 1201(g) of the Digital Millennium Copyright Act (DMCA) is offered as an exemption for encryption research.1 However, the drafting of the exemption contradicts the purpose of copyright legislation under the terms of the Constitution, which is based upon the idea that the welfare
    [Show full text]
  • Tolono Library CD List
    Tolono Library CD List CD# Title of CD Artist Category 1 MUCH AFRAID JARS OF CLAY CG CHRISTIAN/GOSPEL 2 FRESH HORSES GARTH BROOOKS CO COUNTRY 3 MI REFLEJO CHRISTINA AGUILERA PO POP 4 CONGRATULATIONS I'M SORRY GIN BLOSSOMS RO ROCK 5 PRIMARY COLORS SOUNDTRACK SO SOUNDTRACK 6 CHILDREN'S FAVORITES 3 DISNEY RECORDS CH CHILDREN 7 AUTOMATIC FOR THE PEOPLE R.E.M. AL ALTERNATIVE 8 LIVE AT THE ACROPOLIS YANNI IN INSTRUMENTAL 9 ROOTS AND WINGS JAMES BONAMY CO 10 NOTORIOUS CONFEDERATE RAILROAD CO 11 IV DIAMOND RIO CO 12 ALONE IN HIS PRESENCE CECE WINANS CG 13 BROWN SUGAR D'ANGELO RA RAP 14 WILD ANGELS MARTINA MCBRIDE CO 15 CMT PRESENTS MOST WANTED VOLUME 1 VARIOUS CO 16 LOUIS ARMSTRONG LOUIS ARMSTRONG JB JAZZ/BIG BAND 17 LOUIS ARMSTRONG & HIS HOT 5 & HOT 7 LOUIS ARMSTRONG JB 18 MARTINA MARTINA MCBRIDE CO 19 FREE AT LAST DC TALK CG 20 PLACIDO DOMINGO PLACIDO DOMINGO CL CLASSICAL 21 1979 SMASHING PUMPKINS RO ROCK 22 STEADY ON POINT OF GRACE CG 23 NEON BALLROOM SILVERCHAIR RO 24 LOVE LESSONS TRACY BYRD CO 26 YOU GOTTA LOVE THAT NEAL MCCOY CO 27 SHELTER GARY CHAPMAN CG 28 HAVE YOU FORGOTTEN WORLEY, DARRYL CO 29 A THOUSAND MEMORIES RHETT AKINS CO 30 HUNTER JENNIFER WARNES PO 31 UPFRONT DAVID SANBORN IN 32 TWO ROOMS ELTON JOHN & BERNIE TAUPIN RO 33 SEAL SEAL PO 34 FULL MOON FEVER TOM PETTY RO 35 JARS OF CLAY JARS OF CLAY CG 36 FAIRWEATHER JOHNSON HOOTIE AND THE BLOWFISH RO 37 A DAY IN THE LIFE ERIC BENET PO 38 IN THE MOOD FOR X-MAS MULTIPLE MUSICIANS HO HOLIDAY 39 GRUMPIER OLD MEN SOUNDTRACK SO 40 TO THE FAITHFUL DEPARTED CRANBERRIES PO 41 OLIVER AND COMPANY SOUNDTRACK SO 42 DOWN ON THE UPSIDE SOUND GARDEN RO 43 SONGS FOR THE ARISTOCATS DISNEY RECORDS CH 44 WHATCHA LOOKIN 4 KIRK FRANKLIN & THE FAMILY CG 45 PURE ATTRACTION KATHY TROCCOLI CG 46 Tolono Library CD List 47 BOBBY BOBBY BROWN RO 48 UNFORGETTABLE NATALIE COLE PO 49 HOMEBASE D.J.
    [Show full text]
  • 1 in the SUPERIOR COURT of FULTON COUNTY STATE of GEORGIA DONNA CURLING, an Individual; ) ) COALITION for GOOD ) GOVERNANC
    IN THE SUPERIOR COURT OF FULTON COUNTY STATE OF GEORGIA DONNA CURLING, an individual; ) ) COALITION FOR GOOD ) GOVERNANCE, a non-profit corporation ) organized and existing under Colorado ) Law; ) ) DONNA PRICE, an individual; ) ) JEFFREY SCHOENBERG, an individual; ) ) LAURA DIGGES, an individual; ) ) WILLIAM DIGGES III, an individual; ) ) RICARDO DAVIS, an individual; ) ) Plaintiffs, ) ) v. ) CIVIL ACTION ) FILE NO.: 2017cv292233 BRIAN P. KEMP, in his individual ) capacity and his official capacity as ) Secretary of State of Georgia and ) Chair of the STATE ELECTION BOARD; ) DEMAND FOR ) JURY TRIAL DAVID J. WORLEY, REBECCA N. ) SULLIVAN, RALPH F. “RUSTY” ) SIMPSON, and SETH HARP, in their ) individual capacities and their official ) capacities as members of the STATE ) ELECTION BOARD; ) ) THE STATE ELECTION BOARD; ) ) RICHARD BARRON, in his individual ) capacity and his official capacity as ) 1 Director of the FULTON COUNTY ) BOARD OF REGISTRATION AND ) ELECTIONS; ) ) MARY CAROLE COONEY, VERNETTA ) NURIDDIN, DAVID J. BURGE, STAN ) MATARAZZO and AARON JOHNSON ) in their individual capacities and official ) capacities as members of the FULTON ) COUNTY BOARD OF REGISTRATION ) AND ELECTIONS; ) ) THE FULTON COUNTY BOARD OF ) REGISTRATION AND ELECTIONS; ) ) MAXINE DANIELS, in her individual ) capacity and her official capacity as ) Director of VOTER REGISTRATIONS ) AND ELECTIONS FOR DEKALB ) COUNTY; ) ) MICHAEL P. COVENY, ANTHONY ) LEWIS, LEONA PERRY, SAMUEL ) E. TILLMAN, and BAOKY N. VU ) in their individual capacities and official ) capacities as members of the DEKALB ) COUNTY BOARD OF REGISTRATIONS ) AND ELECTIONS; ) ) THE DEKALB COUNTY BOARD OF ) REGISTRATIONS AND ELECTIONS; ) ) JANINE EVELER, in her individual ) capacity and her official capacity as ) Director of the COBB COUNTY ) BOARD OF ELECTIONS AND ) REGISTRATION; ) ) PHIL DANIELL, FRED AIKEN, JOE ) PETTIT, JESSICA BROOKS, and ) 2 DARRYL O.
    [Show full text]
  • The Anti-Circumvention Amendments to the Hong Kong Copyright Ordinance
    Learning the Hard Way: The Anti-Circumvention Amendments to the Hong Kong Copyright Ordinance Robert S. Rogoyski* The 2007 Hong Kong Copyright Amendment Ordinance was passed as part of continuing efforts to balance the interests of copyright owners with the public benefits that flow from the use of copyrighted works. The anticircumvention provisions in the ordinance, closely modeled on the U.S. Digital Millennium Copyright Act (DMCA), create a complex new regime that regulates the circumvention of copy and access controls to copyrighted works, and contains a set of narrow exceptions for some scientific research. Both the specific text of the amendments, and U.S. experience with similar provisions in the DMCA give rise to serious concerns about the potential effects of this legislation. The anticircumvention amendments threaten fair dealing rights in Hong Kong because they unduly expand the power of copyright owners to control the actual use of their works, rendering fair dealing rights moot. Although the amendments provide exceptions for cryptography and security testing, the wording of the exceptions is problematic, and U.S. experience with very similar provisions in the DMCA shows that they will nevertheless chill legitimate research and harm consumers. I. INTRODUCTION ................................................................................... 36 II. THE CO ANTICIRCUMVENTION AMENDMENTS POSE A SERIOUS THREAT TO FAIR DEALING RIGHTS IN HONG KONG ............ 37 A. How Can This Be? ...................................................................
    [Show full text]
  • Lessons from the Sony CD DRM Episode
    Lessons from the Sony CD DRM Episode J. Alex Halderman and Edward W. Felten Center for Information Technology Policy Department of Computer Science Princeton University Abstract system called XCP that had been installed when he in- In the fall of 2005, problems discovered in two Sony- serted a Sony-BMG music CD into his computer’s CD BMG compact disc copy protection systems, XCP and drive. MediaMax, triggered a public uproar that ultimately led News of Russinovich’s discovery circulated rapidly on to class-action litigation and the recall of millions of the Internet, and further revelations soon followed, from discs. We present an in-depth analysis of these technolo- us,1 from Russinovich, and from others. It was discov- gies, including their design, implementation, and deploy- ered that the XCP rootkit makes users’ systems more ment. The systems are surprisingly complex and suffer vulnerable to attacks, that both CD DRM schemes install from a diverse array of flaws that weaken their content risky software components without obtaining informed protection and expose users to serious security and pri- consent from users, that both systems covertly transmit vacy risks. Their complexity, and their failure, makes usage information back to the vendor or the music label, them an interesting case study of digital rights manage- and that none of the protected discs include tools for unin- ment that carries valuable lessons for content companies, stalling the software. (For these reasons, both XCP and DRM vendors, policymakers, end users, and the security MediaMax seem to meet the consensus definition of spy- community. ware.) These and other findings outraged many users.
    [Show full text]
  • 1 Comment Of
    Comment of: Edward W. Felten Professor of Computer Science and Public Affairs J. Alex Halderman Department of Computer Science 35 Olden Street Princeton, NJ 08544 Princeton University Represented by: Deirdre K. Mulligan Director Aaron Perzanowski Law Clinic Intern Samuelson Law, Technology & Public Policy Clinic Boalt Hall University of California 346 North Addition Berkeley, CA 94720-7200 Office of the General Counsel U.S. Copyright Office James Madison Memorial Building, Room LM-401 101 Independence Avenue, SE. Washington, DC 20559-6000 December 1, 2005 Re: RM 2005-11 – Exemption to Prohibition on Circumvention of Copyright Protection Systems for Access Control Technologies I. Proposed Class Of Works We respectfully request an exemption to § 1201(A)(1)(a) for sound recordings and audiovisual works distributed in compact disc format and protected by technological measures that impede access to lawfully purchased works by creating or exploiting security vulnerabilities that compromise the security of personal computers. The creation of security vulnerabilities includes running or installing rootkits or other software code that jeopardize the security of a computer or the data it contains. The exploitation of security vulnerabilities includes running or installing software protection measures without conspicuous notice and explicit consent and failing to provide a permanent and complete method of uninstalling or disabling the technological measure. 1 II. Summary of Argument Technological measures protecting works distributed on Compact Discs have been found to pose unreasonable security risks to consumers’ personal computers, corporate and government networks and the information infrastructure as a whole. Vulnerabilities inherent in widely distributed CD protection measures create the potential for a frightening range of abuses.
    [Show full text]
  • Windows Internals, Sixth Edition, Part 2
    spine = 1.2” Part 2 About the Authors Mark Russinovich is a Technical Fellow in ® the Windows Azure™ group at Microsoft. Windows Internals He is coauthor of Windows Sysinternals SIXTH EDITION Administrator’s Reference, co-creator of the Sysinternals tools available from Microsoft Windows ® The definitive guide—fully updated for Windows 7 TechNet, and coauthor of the Windows Internals and Windows Server 2008 R2 book series. Delve inside Windows architecture and internals—and see how core David A. Solomon is coauthor of the Windows Internals book series and has taught components work behind the scenes. Led by a team of internationally his Windows internals class to thousands of renowned internals experts, this classic guide has been fully updated Windows developers and IT professionals worldwide, SIXTH for Windows 7 and Windows Server® 2008 R2—and now presents its including Microsoft staff. He is a regular speaker 6EDITION coverage in two volumes. at Microsoft conferences, including TechNet As always, you get critical, insider perspectives on how Windows and PDC. operates. And through hands-on experiments, you’ll experience its Alex Ionescu is a chief software architect and internal behavior firsthand—knowledge you can apply to improve consultant expert in low-level system software, application design, debugging, system performance, and support. kernel development, security training, and Internals reverse engineering. He teaches Windows internals courses with David Solomon, and is ® In Part 2, you will: active in the security research community.
    [Show full text]
  • City Church, Tallahassee, Blurring the Lines of Sacred and Secular Katelyn Medic
    Florida State University Libraries Electronic Theses, Treatises and Dissertations The Graduate School 2014 City Church, Tallahassee, Blurring the Lines of Sacred and Secular Katelyn Medic Follow this and additional works at the FSU Digital Library. For more information, please contact [email protected] FLORIDA STATE UNIVERSITY COLLEGE OF MUSIC CITY CHURCH, TALLAHASSEE: BLURRING THE LINES OF SACRED AND SECULAR By KATELYN MEDIC A Thesis submitted to the College of Music in partial fulfillment of the requirements for the degree of Master of Music Degree Awarded: Spring Semester 2014 Katelyn Medic defended this thesis on April 11, 2014. The members of the supervisory committee were: Margaret Jackson Professor Directing Thesis Sarah Eyerly Committee Member Michael McVicar Committee Member The Graduate School has verified and approved the above-named committee members, and certifies that the thesis has been approved in accordance with university requirements. ii ACKNOWLEDGMENTS Make a joyful noise to the Lord, all the earth! Serve the Lord with gladness! Come into his presence with singing! (Psalm 100:1–2, ESV) I thank the leaders and members of City Church for allowing me to observe their worship practices. Their enthusiasm for worship has enriched this experience. I also thank the mentorship of the members of my committee, Margaret Jackson, Sarah Eyerly, and Michael McVicar. iii TABLE OF CONTENTS LIST OF FIGURES ....................................................................................................................... vi ABSTRACT
    [Show full text]
  • Case 1:13-Cv-03994-WHP Document 26 Filed 08/26/13 Page 1 of 48
    Case 1:13-cv-03994-WHP Document 26 Filed 08/26/13 Page 1 of 48 UNITED STATES DISTRICT COURT SOUTHERN DISTRICT OF NEW YORK AMERICAN CIVIL LIBERTIES UNION; AMERICAN CIVIL LIBERTIES UNION FOUNDATION; NEW YORK CIVIL LIBERTIES UNION; and NEW YORK CIVIL LIBERTIES UNION FOUNDATION, Plaintiffs, v. No. 13-cv-03994 (WHP) JAMES R. CLAPPER, in his official capacity as ECF CASE Director of National Intelligence; KEITH B. ALEXANDER, in his official capacity as Director of the National Security Agency and Chief of the Central Security Service; CHARLES T. HAGEL, in his official capacity as Secretary of Defense; ERIC H. HOLDER, in his official capacity as Attorney General of the United States; and ROBERT S. MUELLER III, in his official capacity as Director of the Federal Bureau of Investigation, Defendants. MEMORANDUM OF LAW IN SUPPORT OF PLAINTIFFS’ MOTION FOR A PRELIMINARY INJUNCTION Case 1:13-cv-03994-WHP Document 26 Filed 08/26/13 Page 2 of 48 TABLE OF CONTENTS TABLE OF AUTHORITIES .......................................................................................................... ii Introduction ..................................................................................................................................... 1 Legal and Factual Background ....................................................................................................... 2 I. The Foreign Intelligence Surveillance Act ......................................................................... 2 II. The Mass Call-Tracking Program ......................................................................................
    [Show full text]
  • DORF HAUS SUPPER CLUB a Taste of Germany in Small-Town Wisconsin
    ROMANCING THE BEAN 18 WISCONSIN COFFEE ROASTERS YOU’LL LOVE Get Out & Do What You Like to do FEBRUARY 2019 Rosanne CashA singer-songwriter’s voice that needs to be heard DORF HAUS SUPPER CLUB A taste of Germany in small-town Wisconsin SWITCHFOOT Rocking playlist style UPCOMING EVENTS: PLUS! MIKE AND THE Fox Cities | Green Bay MOONPIES Marshfield | Oshkosh BRING THEIR BRAND OF TWANGY Stevens Point | Waupaca TRADITIONAL Wausau | Wisconsin Rapids COUNTRY TO WI Marketing is essential for every business. But let’s face it, some days are a struggle to keep up with everything you are currently doing. Beyond that, in the digital age it can be downright confusing and intimidating to sort through your options. How can you keep up with the chaotic pace of doing business in an increasingly digital world? Let us help... Specializing in Contracted Digital Marketing Services Websites | eMail Marketing | Social Media | Google Business | Reputation Management www.foxxinteractiveservices.com Contact: (715) 412-1284 | [email protected] Get Out & Do What You Like to Do FEBRUARY 2019 ROSEANNE CASH PUTTING OUT PERSONAL SONGS OF A WOMAN AT A CERTAIN STAGE OF HER LIFE p.18 P. 4 P. 10 P. 24 P. 28 DEPARTMENTS SWITCHFOOT DORF HAUS ROMANCING MIKE AND THE Hitting the road again SUPPER CLUB THE BEAN MOONPIES PUBLISHER’S NOTE p. 2 after a healthful hiatus Bringing Germany as Roasters creating Building their close as Sauk City, WI connections through WI fan base with a EVENTS CALENDAR p. 34 the love of coffee live approach PUBLISHER’S NOTE BUNDLE UP Family Fun Edition BUTTERCUP February 2019, Vol.
    [Show full text]