Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery

Total Page:16

File Type:pdf, Size:1020Kb

Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery Timothy Alan Lockridge Dissertation submitted to the faculty of the Virginia Polytechnic Institute and State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy In Rhetoric and Writing Diana George Carlos Evia Shelli Fowler Katrina Powell Cynthia Selfe March 29, 2012 Blacksburg, VA Keywords: Circulation, Delivery, Distribution, Hacking, Memory Licensed under a Creative Commons Attribution-Noncommercial-ShareAlike 3.0 United States License. Beyond Invention: How Hackers Challenge Memory & Disrupt Delivery Timothy Alan Lockridge Abstract This dissertation uses a case study of 2600: The Hacker Quarterly to consider how the practices of a hacker public might be theorized as a rhetorical activity. The project is contextualized within a history of hacking (building from a narrative that centers on Levy’s 1984 book Hackers) and within the arc of recent copyright legislation, specifically the Digital Millennium Copyright Act (DMCA) and the 2011-12 Stop Online Piracy Act (SOPA) debates. Within this framework, the dissertation examines how specific patterns and cases within 2600 might further our understanding of the rhetorical canons of memory and delivery and of dissent in digital spaces. Specifically, the project presents three practices of memory at work in 2600: Aggregating, Fingerprinting, and Narrating. Drawing on the work of Collin Gifford Brooke and Mary Carruthers, among others, the dissertation examines how texts printed in 2600 present memory not as an inert technology but rather as a practice and a pedagogy—a response to the increasing commercialization of technology. The dissertation then uses Jim Porter’s techne of digital delivery to analyze three specific moments in 2600’s history (the 1985 U.S. Government raid on New Jersey hackers, the E911 lawsuit, and the DeCSS narrative), illustrating how our spaces of textual production have become increasingly regulated and commercialized and considering how that regulation/commercialization affects our understanding of ownership, circulation, and the public sphere. Building on Michel de Cereteau’s concept of strategies and tactics and Michael Warner’s theory of (counter)publics, the dissertation ultimately argues that a history of hacker publics offers one way to reconceptualize and reintegrate theories and technologies of digital circulation into our scholarly work and curricular goals. iii Dedication In memory of my grandfather, Curtis Roy Hunt, who told me to never stop learning. iv Acknowledgments First, thanks and acknowledgments are in order for my dissertation committee: Diana George, who put so much faith and energy into my work and who taught me so very much about teaching, researching, and thinking; Carlos Evia, who was always willing to offer close readings and feedback; Shelli Fowler, who was a source of invaluable support; Katy Powell, who offered ongoing enthusiasm and thoughtful critiques; and Cynthia Selfe, who was always at the ready with important insights and endless generosity. In short, I’ve been blessed with a set of incredible mentors, and I’m very thankful for the time and energy that they have invested in my scholarship and professional development. I would also like to thank Carolyn Rude, Paul Heilker, Kelly Pender, Kelly Belanger, Matthew Vollmer, Erika Meitner, Gardner Campbell, and Fred D’Aguiar for offering valuable support and advice when I needed it. I am also thankful for the support of many colleagues in the field of Rhetoric and Writing. John Trimbur, Paula Mathieu, Gail Hawisher, Derek Ross, Quinn Warnick, and Ryan Trauman all helped to develop my thinking on this project, and I appreciate their support. Additionally, Amy Reed, Dan Lawson, and Libby Anthony sat through many drafts of and conversations about this dissertation, and they should each be applauded for their patience and insight. I’ve found a wonderful group of peers, friends, and colleagues at Virginia Tech, and although I will be sad to leave them, I look forward to hearing of their many future successes. Finally, thank you to my friends in Indiana and—most importantly—my family. You have been so very supportive of my education and professional development, and I can’t thank you enough. This dissertation was written in Byword and Scrivener, using John Gruber’s Markdown syntax. Dustin O’Halloran’s piano solos provided the soundtrack for composing. Coffee provided the fuel. And the above listed people, among many others, provided the support. Thank you all. v Table Of Contents Chapter One: Introduction 1 Where We Begin: SOPA, DNS, and Digital Literacies.......................................................1 SOPA Blackout, DDoS, and the Technologies of Resistance.............................................6 Strategies and Tactics: Thinking through Divergent Practices.........................................11 Hacker Publics: Theorizing Divergent Texts and Activity...............................................14 Research Questions........................................................................................................... 17 Methods............................................................................................................................19 Limitations........................................................................................................................ 22 A Brief Outline.................................................................................................................. 23 My Position As Researcher: A Narrative and a Stance.....................................................25 Chapter Two: YIPL, TAP, and 2600: The Growth of Hacker Publications 29 Steven Levy and the Hacker Ethic....................................................................................32 Hacker Culture..................................................................................................................40 The Rise of Phreaking: YIPL and TAP — The Youth International Party Line...............42 Technological American Party..........................................................................................49 2600: The Hacker Quarterly.............................................................................................51 Hacker Publics..................................................................................................................56 Chapter Three: Hacking and Memory 59 Memory............................................................................................................................. 61 Memory and New Media..................................................................................................64 Technologies of Retention................................................................................................67 Privatized Memory and Responsive Publics....................................................................69 Aggregating: Data Collection and Discourse...................................................................72 Trashing and Social Engineering......................................................................................76 vi Fingerprinting: Collective Experimentation.....................................................................78 Narrating: Writing New Technologies..............................................................................82 Chapter Four: Hacking and Delivery 86 Delivering Text.................................................................................................................88 Hacking and the Techne of Digital Delivery....................................................................92 Body/Identity....................................................................................................................93 Distribution/Circulation....................................................................................................95 Access/Accessibility.........................................................................................................97 Interaction.........................................................................................................................97 Economics........................................................................................................................99 Narrative 1: Moving Satellites in the Sky......................................................................100 Narrative 2: Phrack and E911......................................................................................... 107 Narrative 3: DeCSS........................................................................................................116 Conclusion...................................................................................................................... 126 Chapter Five: Property, Circulation, Publics 128 Introduction....................................................................................................................128 Copyright Law, Napster, and the Shape of the Conversation.........................................131 DRM, Authorship, and the Inscription of Materiality....................................................135 DNS and Dissent............................................................................................................138 Public Spheres, Digital Spaces....................................................................................... 140 Digital Disruption..........................................................................................................
Recommended publications
  • A Study of Android Application Security
    A Study of Android Application Security William Enck, Damien Octeau, Patrick McDaniel, and Swarat Chaudhuri Systems and Internet Infrastructure Security Laboratory Department of Computer Science and Engineering The Pennsylvania State University enck, octeau, mcdaniel, swarat @cse.psu.edu { } Abstract ingly desire it, markets are not in a position to provide security in more than a superficial way [30]. The lack of The fluidity of application markets complicate smart- a common definition for security and the volume of ap- phone security. Although recent efforts have shed light plications ensures that some malicious, questionable, and on particular security issues, there remains little insight vulnerable applications will find their way to market. into broader security characteristics of smartphone ap- In this paper, we broadly characterize the security of plications. This paper seeks to better understand smart- applications in the Android Market. In contrast to past phone application security by studying 1,100 popular studies with narrower foci, e.g., [14, 12], we consider a free Android applications. We introduce the ded decom- breadth of concerns including both dangerous functional- piler, which recovers Android application source code ity and vulnerabilities, and apply a wide range of analysis directly from its installation image. We design and exe- techniques. In this, we make two primary contributions: cute a horizontal study of smartphone applications based on static analysis of 21 million lines of recovered code. We design and implement a Dalvik decompilier, • Our analysis uncovered pervasive use/misuse of person- ded. ded recovers an application’s Java source al/phone identifiers, and deep penetration of advertising solely from its installation image by inferring lost and analytics networks.
    [Show full text]
  • THE RISE of LIFESTYLE ACTIVISM from New Left to Occupy
    THE RISE OF LIFESTYLE ACTIVISM From New Left to Occupy NIKOS SOTIRAKOPOULOS The Rise of Lifestyle Activism Nikos Sotirakopoulos The Rise of Lifestyle Activism From New Left to Occupy Nikos Sotirakopoulos Loughborough University United Kingdom ISBN 978-1-137-55102-3 ISBN 978-1-137-55103-0 (eBook) DOI 10.1057/978-1-137-55103-0 Library of Congress Control Number: 2016947743 © Th e Editor(s) (if applicable) and Th e Author(s) 2016 Th e author(s) has/have asserted their right(s) to be identifi ed as the author(s) of this work in accordance with the Copyright, Designs and Patents Act 1988. Th is work is subject to copyright. All rights are solely and exclusively licensed by the Publisher, whether the whole or part of the material is concerned, specifi cally the rights of translation, reprinting, reuse of illustrations, recitation, broadcasting, reproduction on microfi lms or in any other physical way, and trans- mission or information storage and retrieval, electronic adaptation, computer software, or by similar or dissimilar methodology now known or hereafter developed. Th e use of general descriptive names, registered names, trademarks, service marks, etc. in this publication does not imply, even in the absence of a specifi c statement, that such names are exempt from the relevant protective laws and regulations and therefore free for general use. Th e publisher, the authors and the editors are safe to assume that the advice and information in this book are believed to be true and accurate at the date of publication. Neither the publisher nor the authors or the editors give a warranty, express or implied, with respect to the material contained herein or for any errors or omissions that may have been made.
    [Show full text]
  • An Empirical Analysis of Errors with Automated Dmca Takedown Notices
    Santa Clara High Technology Law Journal Volume 37 Issue 2 Article 1 4-1-2021 COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES Seng, Daniel Follow this and additional works at: https://digitalcommons.law.scu.edu/chtlj Part of the Intellectual Property Law Commons, and the Science and Technology Law Commons Recommended Citation Seng, Daniel, COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES, 37 SANTA CLARA HIGH TECH. L.J. 119 (2021). Available at: https://digitalcommons.law.scu.edu/chtlj/vol37/iss2/1 This Article is brought to you for free and open access by the Journals at Santa Clara Law Digital Commons. It has been accepted for inclusion in Santa Clara High Technology Law Journal by an authorized editor of Santa Clara Law Digital Commons. For more information, please contact [email protected]. COPYRIGHTING COPYWRONGS: AN EMPIRICAL ANALYSIS OF ERRORS WITH AUTOMATED DMCA TAKEDOWN NOTICES By Daniel Seng1 Under the Digital Millennium Copyright Act (DMCA), reporters issuing takedown notices are required to identify the infringed work and the infringing material and provide their contact information (functional formalities), attest to the accuracy of such information and their authority to act on behalf of the copyright owner, and sign the notices (non-functional formalities). Online service providers will evaluate such notices for compliance with these DMCA formalities before acting on them. This paper seeks to answer questions about the quality of takedown notices, especially those generated by automated systems, which are increasingly being used by copyright owners to detect instances of online infringement and issue takedown notices on their behalf.
    [Show full text]
  • Coleman-Coding-Freedom.Pdf
    Coding Freedom !" Coding Freedom THE ETHICS AND AESTHETICS OF HACKING !" E. GABRIELLA COLEMAN PRINCETON UNIVERSITY PRESS PRINCETON AND OXFORD Copyright © 2013 by Princeton University Press Creative Commons Attribution- NonCommercial- NoDerivs CC BY- NC- ND Requests for permission to modify material from this work should be sent to Permissions, Princeton University Press Published by Princeton University Press, 41 William Street, Princeton, New Jersey 08540 In the United Kingdom: Princeton University Press, 6 Oxford Street, Woodstock, Oxfordshire OX20 1TW press.princeton.edu All Rights Reserved At the time of writing of this book, the references to Internet Web sites (URLs) were accurate. Neither the author nor Princeton University Press is responsible for URLs that may have expired or changed since the manuscript was prepared. Library of Congress Cataloging-in-Publication Data Coleman, E. Gabriella, 1973– Coding freedom : the ethics and aesthetics of hacking / E. Gabriella Coleman. p. cm. Includes bibliographical references and index. ISBN 978-0-691-14460-3 (hbk. : alk. paper)—ISBN 978-0-691-14461-0 (pbk. : alk. paper) 1. Computer hackers. 2. Computer programmers. 3. Computer programming—Moral and ethical aspects. 4. Computer programming—Social aspects. 5. Intellectual freedom. I. Title. HD8039.D37C65 2012 174’.90051--dc23 2012031422 British Library Cataloging- in- Publication Data is available This book has been composed in Sabon Printed on acid- free paper. ∞ Printed in the United States of America 1 3 5 7 9 10 8 6 4 2 This book is distributed in the hope that it will be useful, but WITHOUT ANY WARRANTY; without even the implied warranty of MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE !" We must be free not because we claim freedom, but because we practice it.
    [Show full text]
  • Research for the Worcester Writers IQP “City
    Kevin Curley Worcester Writers IQP 2009-2010 Worcester Polytechnic Institute Interdisciplinary Qualifying Project Summery: Research for the Worcester Writers IQP “City of Words” Website 1 Abstract The City of Words IPQ Project group is with the goal of creating a web site featuring writers associated with Worcester. It is based on the web site Worcester Area Writers, which was created by WPI faculty and students some years ago. We are placing heavy emphasis on bringing living writers to the new site, creating a multi-media platform that includes videos of writers reading their works, interviews, audio, and photographs of places in Worcester connected with their work. The group continually seeks creative and original ways to display the site‟s content. Students are required to produce these materials as well as write biographies and critical analyses of the writers for which they are responsible. 2 Contents Abstract ............................................................................................................................................................. 2 IQP Research Methods....................................................................................................................................... 5 Abbie Hoffman Biographical Writing .................................................................................................................. 7 Abbie Hoffman Analytical Composition ............................................................................................................ 14 References ......................................................................................................................................................
    [Show full text]
  • WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A
    WHO ARE COMPUTER CRIMINALS? by Kevin W. Jennings, M.S.C.J. A dissertation submitted to the Graduate Council of Texas State University in partial fulfillment of the requirements for the degree of Doctor of Philosophy with a Major in Criminal Justice August 2014 Committee Members: Brian L. Withrow, Chair Bob Edward Vásquez Jay D. Jamieson Matthew Draper Jose R. Agustina COPYRIGHT by Kevin W. Jennings 2014 FAIR USE AND AUTHOR’S PERMISSION STATEMENT Fair Use This work is protected by the Copyright Laws of the United States (Public Law 94-553, section 107). Consistent with fair use as defined in the Copyright Laws, brief quotations from this material are allowed with proper acknowledgment. Use of this material for financial gain without the author’s express written permission is not allowed. Duplication Permission As the copyright holder of this work I, Kevin Jennings, authorize duplication of this work, in whole or in part, for educational or scholarly purposes only. DEDICATION To Hal Jennings, Judy Jennings, and Matthew Draper, for showing me the path. To Sara Jennings, for joining me on the journey. ACKNOWLEDGEMENTS This dissertation never would have been possible without the support of many people who have guided me and cheered me on throughout this process. Dr. Brian Withrow was an excellent chair, and Doctors Vasquez, Jamieson, Draper, and Agustina all did their part in making this paper possible. Thank you for helping me, but even more important, thank you for putting up with me. I also need to give a big thank you to my mentor Dr. Tomas Mijares, who could not be on my committee but helped and guided me throughout the process of learning, teaching, and growing at Texas State University.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • From Squatting to Tactical Media Art in the Netherlands, 1979–1993
    City University of New York (CUNY) CUNY Academic Works All Dissertations, Theses, and Capstone Projects Dissertations, Theses, and Capstone Projects 5-2019 Between the Cracks: From Squatting to Tactical Media Art in the Netherlands, 1979–1993 Amanda S. Wasielewski The Graduate Center, City University of New York How does access to this work benefit ou?y Let us know! More information about this work at: https://academicworks.cuny.edu/gc_etds/3125 Discover additional works at: https://academicworks.cuny.edu This work is made publicly available by the City University of New York (CUNY). Contact: [email protected] BETWEEN THE CRACKS: FROM SQUATTING TO TACTICAL MEDIA ART IN THE NETHERLANDS, 1979–1993 by AMANDA WASIELEWSKI A dissertation submitted to the Graduate Faculty in Art History in partiaL fulfiLLment of the requirements for the degree of Doctor of PhiLosophy, The City University of New York 2019 © 2019 AMANDA WASIELEWSKI ALL Rights Reserved ii Between the Cracks: From Squatting to TacticaL Media Art in the Netherlands, 1979–1993 by Amanda WasieLewski This manuscript has been read and accepted for the Graduate Faculty in Art History in satisfaction of the dissertation requirement for the degree of Doctor of PhiLosophy. Date David JoseLit Chair of Examining Committee Date RacheL Kousser Executive Officer Supervisory Committee: Marta Gutman Lev Manovich Marga van MecheLen THE CITY UNIVERSITY OF NEW YORK iii ABSTRACT Between the Cracks: From Squatting to TacticaL Media Art in the Netherlands, 1979–1993 by Amanda WasieLewski Advisor: David JoseLit In the early 1980s, Amsterdam was a battLeground. During this time, conflicts between squatters, property owners, and the police frequentLy escaLated into fulL-scaLe riots.
    [Show full text]
  • Shawyer Dissertation May 2008 Final Version
    Copyright by Susanne Elizabeth Shawyer 2008 The Dissertation Committee for Susanne Elizabeth Shawyer certifies that this is the approved version of the following dissertation: Radical Street Theatre and the Yippie Legacy: A Performance History of the Youth International Party, 1967-1968 Committee: Jill Dolan, Supervisor Paul Bonin-Rodriguez Charlotte Canning Janet Davis Stacy Wolf Radical Street Theatre and the Yippie Legacy: A Performance History of the Youth International Party, 1967-1968 by Susanne Elizabeth Shawyer, B.A.; M.A. Dissertation Presented to the Faculty of the Graduate School of The University of Texas at Austin in Partial Fulfillment of the Requirements for the Degree of Doctor of Philosophy The University of Texas at Austin May, 2008 Acknowledgements There are many people I want to thank for their assistance throughout the process of this dissertation project. First, I would like to acknowledge the generous support and helpful advice of my committee members. My supervisor, Dr. Jill Dolan, was present in every stage of the process with thought-provoking questions, incredible patience, and unfailing encouragement. During my years at the University of Texas at Austin Dr. Charlotte Canning has continually provided exceptional mentorship and modeled a high standard of scholarly rigor and pedagogical generosity. Dr. Janet Davis and Dr. Stacy Wolf guided me through my earliest explorations of the Yippies and pushed me to consider the complex historical and theoretical intersections of my performance scholarship. I am grateful for the warm collegiality and insightful questions of Dr. Paul Bonin-Rodriguez. My committee’s wise guidance has pushed me to be a better scholar.
    [Show full text]
  • Introduction
    Introduction Toward a Radical Criminology of Hackers In the expansive Rio Hotel and Casino in Las Vegas, I stood in line for around an hour and a half to pay for my badge for admittance into DEF CON 21, one of the largest hacker conventions in the world. The wad of cash in my hand felt heavier than it should have as I approached the badge vendor. DEF CON is an extravagant affair and attendees pay for it (though, from my own readings, the conference administrators work to keep the costs reduced). The line slowly trickled down the ramp into the hotel con- vention area where the badge booths were arranged. As I laid eyes on the convention, my jaw dropped. It was packed. Attendees were already mov- ing hurriedly throughout the place, engaged in energetic conversations. Black t- shirts— a kind of hacker uniform— were everywhere. Las Vegas- and gambling- themed décor lined the walls and floors. Already, I could see a line forming at the DEF CON merchandise booth. Miles, a hacker I had gotten to know throughout my research, mentioned that if I wanted some of the “swag” or “loot” (the conference merchandise), I should go ahead and get in line, a potential three- to four-hour wait. Seemingly, everyone wanted to purchase merchandise to provide some evidence they were in attendance. Wait too long and the loot runs out. After winding through the serpentine line of conference attendees wait- ing for admittance, I approached the badge vendors and (dearly) departed with almost $200. Stepping into the convention area, I felt that loss in the pit of my stomach.
    [Show full text]
  • Alessandro Ludovico
    POSt- DIGITAL PRINT The Mutation of Publishing since 1894 Alessandro Ludovico ONOMATOPEE 77 In this post-digital age, digital technology is no longer a revolutionary phenomenon but a normal part of every- day life. The mutation of music and film into bits and bytes, downloads and streams is now taken for granted. For the world of book and magazine publishing however, this transformation has only just begun. Still, the vision of this transformation is far from new. For more than a century now, avant-garde artists, activists and technologists have been anticipating the development of networked and electronic publishing. Although in hindsight the reports of the death of paper were greatly exaggerated, electronic publishing has now certainly become a reality. How will the analog and the digital coexist in the post-digital age of publishing? How will they transition, mix and cross over? In this book, Alessandro Ludovico re-reads the history of media technology, cultural activism and the avant- garde arts as a prehistory of cutting through the so-called dichotomy between paper and electronics. Ludovico is the editor and publisher of Neural, a magazine for critical digital culture and media arts. For more than twenty years now, he has been working at the cutting edge (and the outer fringes) of both print publishing and politically engaged digital art. ISBN 9789078454878 90000 > 9 789078 454878 POSt- DIGITAL PRINT The Mutation of Publishing since 1894 Alessandro Ludovico ONOMATOPEE 77 1 2 contents Introduction. 7 Chapter 1 – The death of paper (which never happened). 15 1.1 Early threats to the printed medium.
    [Show full text]
  • Piracy, Privacy and Internet Openness: The
    I N S I D E T H E M I N D S Understanding Developments in Cyberspace Law Leading Lawyers on Analyzing Recent Trends, Case Laws, and Legal Strategies Affecting the Internet Landscape 2012 EDITION 2012 Thomson Reuters/Aspatore All rights reserved. Printed in the United States of America. No part of this publication may be reproduced or distributed in any form or by any means, or stored in a database or retrieval system, except as permitted under Sections 107 or 108 of the U.S. Copyright Act, without prior written permission of the publisher. This book is printed on acid free paper. Material in this book is for educational purposes only. This book is sold with the understanding that neither any of the authors nor the publisher is engaged in rendering legal, accounting, investment, or any other professional service. Neither the publisher nor the authors assume any liability for any errors or omissions or for how this book or its contents are used or interpreted or for any consequences resulting directly or indirectly from the use of this book. For legal advice or any other, please consult your personal lawyer or the appropriate professional. The views expressed by the individuals in this book (or the individuals on the cover) do not necessarily reflect the views shared by the companies they are employed by (or the companies mentioned in this book). The employment status and affiliations of authors with the companies referenced are subject to change. For customer service inquiries, please e-mail [email protected]. If you are interested in purchasing the book this chapter was originally included in, please visit www.west.thomson.com.
    [Show full text]