UNITED STATES V. JULIAN PAUL ASSANGE

Total Page:16

File Type:pdf, Size:1020Kb

UNITED STATES V. JULIAN PAUL ASSANGE UNITED STATES v. JULIAN PAUL ASSANGE Clarification Statement of Christian Grothoff 1. I am Professor of Computer Science at the University of Applied Sciences in Bern. My main area of research is network security, including peer-to-peer networks and applied cryptography. I have a PhD from UCLA, was Assistant Professor at the University of Denver, and lead research groups in the area of network security at the Technical University of Munich and INRIA. 2. I was asked by the legal team of Julian Assange (Birnberg Peirce) to clarify some details about my previous statement to the court. 3. I have read Part 19 of the Criminal Procedure Rules relating to expert evidence and believe that my opinion is compliant with the rules. I understand that my duty as an expert witness is to try to help the court by providing objective analysis on matters within my expertise. 4. In points (11)-(14) I pointed out that the “xyz_z.gpg” file was publicly available via the file sharing system BitTorrent (for example in December via the well-known site https://thepiratebay.org/description.php?id=6040906) which due to its decentralized design makes it impossible for Wikileaks to limit its distribution. However, the file was available from multiple other sources, as anyone who downloaded it could easily republish the encrypted archive via other means. For example, https://twitter.com/p0bailey/status/13615673599070208 mentions that this archive was also downloadable via HTTP in December 2010. Thus, it was possible to download the encrypted archive from multiple sources independent of Wikileaks long before the disclosure of the passphrase in David Leigh’s book. 5. Many sites linked already in December 2010 to the various Wikileaks mirrors. For example, http://pittsburgh.indymedia.org/news/2010/12/36684.php lists a total of 800 mirrors, including the one at http://193.198.207.6/. So this archive was not obscure at the time when David Leigh published his book, but what the encrypted file in the archive contained was not known to the public. 6. In point (18) of my previous statement, I said that “at the time when the Wikileaks site republished the unredacted cables, the information was already easily available to any technically competent person, for example from the cryptome.org site”. To clarify, “technically competent” in this case involves being able to open a browser and entering the URL “cryptome.org” in to the URL bar and to unpack a compressed archive (which is a routine operation for Internet users, as compression is commonly used to reduce file size and thereby improve download speed on the Internet). 7. In adddition to the file being easily accessible via cryptome.org, http://cables.mrkva.eu/ provided an easily searchable Web version before Wikileaks made the archive available. 8. Making a version searchable on the Web also hardly changes how accessible the information is, as users who downloaded the archive could simply install Desktop search software – which was already widely available at the time (https://en.wikipedia.org/wiki/List_of_search_engines#Desktop_search_engines) – which enables anyone (with modest technical competency) to create a local search index after downloading and unpacking the archive. 9. In point (7) of my previous statement I mentioned that “cryptome.org and others report on the specific passphrase”. I want to clarify that the “cryptome.org” Web site was and is a rather well-known New York based Web site providing a curated library. Researching site popularity data, I found https://siterankdata.com/cryptome.org which reports that the cryptome.org site was consistently in the top 50,000 Web sites in the world in 2011-2014 (the site was turned off in 2014). For comparison, on July 10th 2011 Wikileaks.org had a ranking of 13,252 with (according to SiteRankData.com), while for the same day Cryptome.org had a ranking of 33,439. The New York Times cited cryptome.org as early as June 16th 2000 in an article. I asked a journalist to search LexisNexis, a press article index, for mentions for cryptome.org in the press. The journalist reported to me that there were 1385 mentions of the site in the press. According to genios.de, a similar service for German press articles, the German press alone cited cryptome.org before September 1st 2011 at least 69 times, with Süddeutsche Zeitung being the first major German newspaper referencing the site as early as December 1999. 10. The defense recently provided me with an excerpt from a FOIA response “Leopold et. al. v. NSA et. al. - Civil Action Number 1-15-cv-00999-APM” with a “Report of Investigation 2010-CID221-10117-5Y”. This report demonstrates that the US government itself obtained a copy of the unredacted and decrypted cable archive from the previously mentioned Pirate Bay mirror, an encrypted copy of the archive from the 193.198.207.6 mirror and the passphrase to decrypt the encrypted copy (from the book by David Leigh) at “about 0700, 1 Sep” of 2011. The US government was thus aware of several of the various public versions of the documents and the publication of the passphrase in David Leigh’s book before the Wikileaks publication. 11. In point (5) of my previous statement I mentioned that the “key required for decryption is fixed at the time of encryption”. To make clear, in contrast, the URL of the Web site used by Wikileaks to provide its media partners access to an encrypted copy of the full archive can be temporary (and was indeed eventually disabled, the exact date I could not determine): it is relatively easy to remove or change the URL of a Web site. However, the passphrase itself could not be temporary, as after an encrypted file has been published it is not possible to change the encryption key for copies of an encrypted file that has already been distributed to other parties. Thus, after the publication of the passphrase in David Leigh’s book, Wikileaks had no chance to change the passphrase on the encrypted file that was already copied by and in control of a multitude of unknown third parties. 12. In point (6) of my previous statement, I pointed out that “distributing the ciphertext via the Web site was a safe choice”. I want to clarify what this means with respect to the intent of the distributor. The distribution of encrypted files on the Internet without the intent of their contents ever becoming public is routine. Some banking protocols include the transmission of encrypted archives of private transaction records. Doctors, hospitals and laboratories use encryption to exchange private medical data over the Internet. In some cases, the files are encrypted only during transmission, but in other cases they are encrypted at rest when they are stored on disk. Many popular word processing formats (Microsoft Word, OpenOffice, Acrobat PDF) include passphrase encryption as a mechanism to enable sharing of confidential business documents over insecure channels (such as Web sites or plaintext e-mail). Uploading a properly encrypted file to the Internet does not make the contents available to the public. Thus, it makes no sense to consider the upload of an encrypted file as equivalent to publishing its (encrypted) contents. 13. I would also point out that disclosing such an encryption passphrase is never advisable, because of the possibility of the data transfer of the encrypted file being intercepted. Anyone who intercepted David Leigh’s transfer would have been able to decrypt the file, and in this case it would have been easy for them to figure out which data transfer the password decrypted. Thus, no information security professional should have deemed the disclosure of this passphrase to be safe, even without the knowledge of the existence of the many mirrors. Signed: _______________________ Christian Grothoff _______________________ Dated 8/20/2020 Phillip Bailey on Twitter: "ONLINE the 20GB wikileaks archive http://193.198.207.6/wikileaks/ #wikileaks #cablegate #imwikileaks" /… Tweet Phillip Bailey @p0bailey ONLINE the 20GB wikileaks archive http://193.198.207.6/wikileaks/ #wikileaks #cablegate #imwikileaks 3:26 PM · Dec 11, 2010 · Twitter Web Client 9 Retweets 1 Like Don’t miss what’s happening Log in Sign up People on Twitter are the first to know. https://twitter.com/p0bailey/status/13615673599070208 1/1 8/20/2020 Many ways to wikileaks : Pittsburgh Indymedia community-based, non-corporate, participatory media PGHIMC - Pittsburgh Independent Media Center Participate Publish make media participate subscribe chat About Contact Us Policies Mailing Lists Radio Video Publish! Calendar Search Many ways to wikileaks by General Joe and friends Monday, Dec. 06, 2010 at 4:15 AM Use the web addresses below to get to wikileaks. Some may not be active, but many will be. Now go get the information. The mainstream media would have you believe that there is nothing new or eye poping there. They always tell the truth don't they? A people as free as ours can rely on the media, can't we? But maybe you had better look, anyway. Send to friends,family, and beyond. Way beyond. General Joe WikiLeaks Mirrors! Good: 30 Outdated: 473 Down: 297 Total: 800 Please add your mirror. This site automatically checks mirrors for uptime and number of cables once an hour. Add New Mirror! URL Is mirror up? Number of Cables http://wikileaks.pepin.pl/ True 931 http://wikileaks.no-ip.co.uk/ True 931 http://wikileaks.lookante.net/ True 931 http://wikileaks.littledrummerboy.info/ True 931 http://wikileaks.liazo.fr/ True 931 http://wikileaks.karlesnine.com/ True 931 http://wikileaks.jbfavre.net True 931 http://e--u.eu
Recommended publications
  • Microsoft Advertising Client Brochure
    EXPANDMicrosoft YOUR Advertising. CUSTOMER Intelligent AUDIENCE connections. WITH Microsoft Advertising Thank you for considering Microsoft Advertising Though you may already advertise through other platforms such as Google Ads, the Microsoft Search Network can boost traffic by offering an additional customer audience and increase diversity, growth and profits for your business. Globally, the Microsoft 11 billion monthly Search Network is continually searches 1 expanding its reach in 37 markets The Microsoft Search Network powers millions of searches in Canada:2 14 MILLION 296 MILLION 22% unique searchers monthly of the PC who represent searches search market Reach a diverse audience in Canada3 34% 56% 43% have a household income are under the age of have graduated college of $80K+ CAD 45 (16-44 years old) (university/postgraduate degree) High-quality partnerships and The Microsoft Search Network integration add value to the reaches people across multiple Microsoft Search Network devices and platforms4 • Bing powers AOL web, mobile and tablet • Bing search is built into Windows 10, which is now search, providing paid search ads to AOL on over 800 million devices. properties worldwide. • Bing powers Microsoft search, which is a unified • Windows 10 drives more engagement and delivers search experience for enterprises including Office, more volume to the Microsoft Search Network. SharePoint and Microsoft Edge. • Our partnerships with carefully vetted search • Bing is on phones, tablets, PCs and across many partners, like The Wall Street
    [Show full text]
  • Market Research SD-5 Gathering Information About Commercial Products and Services
    Market Research SD-5 Gathering Information About Commercial Products and Services DEFENSE STANDARDIZATION PROGRA M JANUARY 2008 Contents Foreword 1 The Market Research Other Considerations 32 Background 2 Process 13 Amount of Information Strategic Market Research to Gather 32 What Is Market Research? 2 (Market Surveillance) 14 Procurement Integrity Act 32 Why Do Market Research? 2 Identify the Market or Market Paperwork Reduction Act 33 Segment of Interest 14 When Is Market Research Cost of Market Research 34 Done? 5 Identify Sources of Market Information 16 Who Should Be Involved In Market Research? 7 Collect Relevant Market Other Information Information 17 Technical Specialist 8 Document the Results 18 on Market Research 35 User 9 Logistics Specialist 9 Tactical Market Research Appendix A 36 (Market Investigation) 19 Testing Specialist 9 Types of Information Summarize Strategic Market Available on the Internet Cost Analyst 10 Research 19 Legal Counsel 10 Formulate Requirements 20 Appendix B 39 Contracting Officer 10 Web-Based Information Identify Sources of Sources Information 21 Guiding Principles 11 Collect Product or Service Appendix C 47 Examples of Tactical Start Early 11 Information from Sources 22 Collect Information from Information Define and Document Product or Service Users 26 Requirements 11 Evaluate the Data 27 Refine as You Proceed 12 Document the Results 30 Tailor the Investigation 12 Repeat as Necessary 12 Communicate 12 Involve Users 12 Foreword The Department of Defense (DoD) relies extensively on the commercial market for the products and services it needs, whether those products and services are purely commercial, modified for DoD use from commercial products and services, or designed specifically for DoD.
    [Show full text]
  • Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library
    University of Nebraska - Lincoln DigitalCommons@University of Nebraska - Lincoln Library Philosophy and Practice (e-journal) Libraries at University of Nebraska-Lincoln 2020 Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library SUNDAY JUDE ONUH National Open University of Nigeria, [email protected] OGOEGBUNAM LOVETH EKWUEME National Open University of Nigeria, [email protected] Follow this and additional works at: https://digitalcommons.unl.edu/libphilprac Part of the Library and Information Science Commons ONUH, SUNDAY JUDE and EKWUEME, OGOEGBUNAM LOVETH, "Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library" (2020). Library Philosophy and Practice (e-journal). 4650. https://digitalcommons.unl.edu/libphilprac/4650 Awareness and Utilization of Search Engines for Information Retrieval by Students of National Open University of Nigeria in Enugu Study Centre Library By Jude Sunday Onuh Enugu Study Centre Library National Open University of Nigeria [email protected] & Loveth Ogoegbunam Ekwueme Department of Library and Information Science National Open University of Nigeria [email protected] Abstract This study dwelt on awareness and utilization of search engines for information retrieval by students of National Open University of Nigeria (NOUN) Enugu Study centre. Descriptive survey research was adopted for the study. Two research questions were drawn from the two purposes that guided the study. The population consists of 5855 undergraduate students of NOUN Enugu Study Centre. A sample size of 293 students was used as 5% of the entire population.
    [Show full text]
  • From Sony to SOPA: the Technology-Content Divide
    From Sony to SOPA: The Technology-Content Divide The Harvard community has made this article openly available. Please share how this access benefits you. Your story matters Citation John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem, From Sony to SOPA: The Technology-Content Divide, Harvard Law School Case Studies (2013). Citable link http://nrs.harvard.edu/urn-3:HUL.InstRepos:11029496 Terms of Use This article was downloaded from Harvard University’s DASH repository, and is made available under the terms and conditions applicable to Open Access Policy Articles, as set forth at http:// nrs.harvard.edu/urn-3:HUL.InstRepos:dash.current.terms-of- use#OAP http://casestudies.law.harvard.edu By John Palfrey, Jonathan Zittrain, Kendra Albert, and Lisa Brem February 23, 2013 From Sony to SOPA: The Technology-Content Divide Background Note Copyright © 2013 Harvard University. No part of this publication may be reproduced, stored in a retrieval system, used in a spreadsheet, or transmitted in any form or by any means – electronic, mechanical, photocopying, recording, or otherwise – without permission. "There was a time when lawyers were on one side or the other of the technology content divide. Now, the issues are increasingly less black-and-white and more shades of gray. You have competing issues for which good lawyers provide insights on either side." — Laurence Pulgram, partner, Fenwick & Westi Since the invention of the printing press, there has been tension between copyright holders, who seek control over and monetary gain from their creations, and technology builders, who want to invent without worrying how others might use that invention to infringe copyrights.
    [Show full text]
  • Ecosia Launches First Ever Out-Of-Home and TV Advertising Campaign to Let New Users Know They Can Plant Trees with Their Searches - No Matter How Weird
    Ecosia launches first ever Out-of-Home and TV advertising campaign to let new users know they can plant trees with their searches - no matter how weird The green search engine is launching its first international campaign on April 5th across 12 European cities with JCDecaux and Sky Media ● Ecosia’s ‘Weird Search Requests’ campaign will be live in France, Germany, the Netherlands and the UK ● Its concept expands on award-winning brand video created by students at Germany’s Filmakademie Baden-Wuerttemberg ● The campaign has been developed together with JCDecaux’s Nurture Programme - which helps start-ups and scale-ups across Europe to scale their brand - and Sky Media in the UK ● With more than 120 million trees already funded by users’ searches globally, Ecosia expects the campaign across 12 European cities to generate significant growth for tree planting Paris, France, 31 st March, 2021: Green search engine Ecosia is launching its first major international brand campaign in cities across Europe, to let millions of potential new users know that they can turn their searches, no matter how weird, into trees. The user-generated campaign speaks directly to users in each city, by displaying searches they have shared via social media. It has been developed together with JCDecaux, the world’s leading out-of-home advertising company, and Sky Media in the UK. The concept stems from an award-winning brand video created by students at Germany’s Filmakademie Baden-Wuerttemberg, originally the students’ own initiative for a class assignment. It shows Ecosia users making unusual searches on the app, which leads to a tree sprouting up wherever the search was made - ranging from a bus to a lecture hall - and ending with the words: “No matter how weird your search request, we’ll plant the trees anyway .” The film won a number of awards, including silver in the prestigious Young Director Award award at Cannes.
    [Show full text]
  • Gender and Information Literacy: Evaluation of Gender Differences in a Student Survey of Information Sources
    Gender and Information Literacy: Evaluation of Gender Differences in a Student Survey of Information Sources Arthur Taylor and Heather A. Dalal Information literacy studies have shown that college students use a va- riety of information sources to perform research and commonly choose Internet sources over traditional library sources. Studies have also shown that students do not appear to understand the information quality issues concerning Internet information sources and may lack the information literacy skills to make good choices concerning the use of these sources. No studies currently provide clear guidance on how gender might influ- ence the information literacy skills of students. Such guidance could help improve information literacy instruction. This study used a survey of college-aged students to evaluate a subset of student information literacy skills in relation to Internet information sources. Analysis of the data collected provided strong indications of gender differences in information literacy skills. Female respondents ap- peared to be more discerning than males in evaluating Internet sources. Males appeared to be more confident in the credibility and accuracy of the results returned by search engines. Evaluation of other survey responses strengthened our finding of gender differentiation in informa- tion literacy skills. ollege students today have come of age surrounded by a sea of information delivered from an array of sources available at their fingertips at any time of the day or night. Studies have shown that the most common source of information for college-aged students is the Internet. Information gathered in this environment is most likely found using a commercial search engine that returns sources of dubious quality using an unknown algorithm.
    [Show full text]
  • Jeffrey Scudder Google Inc. March 28, 2007 Google Spreadsheets Automation Using Web Services
    Jeffrey Scudder Google Inc. March 28, 2007 Google Spreadsheets Automation using Web Services Jeffrey Scudder Google Inc. March 28, 2007 2 Overview What is Google Spreadsheets? • Short Demo What is the Google Spreadsheets Data API? • Motivations (Why an API?) • Protocol design • Atom Publishing Protocols • GData • List feed deconstructed How do I use the Google Spreadsheets Data API? • Authentication • Longer Demo Questions 3 What is Google Spreadsheets? Let’s take a look 4 What is Google Spreadsheets? Why not ask why • Spreadsheets fits well with our mission… – “Organize My Information… and… – Make it Accessible and Useful… – With whomever I choose (and nobody else, thanks)” • In other words…. – Do-it-yourself Content Creation – Accepted/Familiar Interface of Spreadsheets and Documents – Accessibility from anywhere (…connected) – Easy-to-use Collaboration – Do-it-yourself Community Creation 5 What is the Google Spreadsheets Data API? Motivations • Foster development of specific-use apps • Allow users to create new UIs • To extend features offered • To integrate with 3rd party products • To offer new vertical applications 6 What is the Google Spreadsheets Data API? Protocol design based on existing open standards • Deciding on design principles – Use a RESTful approach – Reuse open standards – Reuse design from other Google APIs • The end result – REST web service based on GData – Data is in Atom XML and protocol based on the Atom Publishing Protocol (APP) – GData is based on Atom and APP and adds authentication, query semantics, and more
    [Show full text]
  • March 21–25, 2016
    FORTY-SEVENTH LUNAR AND PLANETARY SCIENCE CONFERENCE PROGRAM OF TECHNICAL SESSIONS MARCH 21–25, 2016 The Woodlands Waterway Marriott Hotel and Convention Center The Woodlands, Texas INSTITUTIONAL SUPPORT Universities Space Research Association Lunar and Planetary Institute National Aeronautics and Space Administration CONFERENCE CO-CHAIRS Stephen Mackwell, Lunar and Planetary Institute Eileen Stansbery, NASA Johnson Space Center PROGRAM COMMITTEE CHAIRS David Draper, NASA Johnson Space Center Walter Kiefer, Lunar and Planetary Institute PROGRAM COMMITTEE P. Doug Archer, NASA Johnson Space Center Nicolas LeCorvec, Lunar and Planetary Institute Katherine Bermingham, University of Maryland Yo Matsubara, Smithsonian Institute Janice Bishop, SETI and NASA Ames Research Center Francis McCubbin, NASA Johnson Space Center Jeremy Boyce, University of California, Los Angeles Andrew Needham, Carnegie Institution of Washington Lisa Danielson, NASA Johnson Space Center Lan-Anh Nguyen, NASA Johnson Space Center Deepak Dhingra, University of Idaho Paul Niles, NASA Johnson Space Center Stephen Elardo, Carnegie Institution of Washington Dorothy Oehler, NASA Johnson Space Center Marc Fries, NASA Johnson Space Center D. Alex Patthoff, Jet Propulsion Laboratory Cyrena Goodrich, Lunar and Planetary Institute Elizabeth Rampe, Aerodyne Industries, Jacobs JETS at John Gruener, NASA Johnson Space Center NASA Johnson Space Center Justin Hagerty, U.S. Geological Survey Carol Raymond, Jet Propulsion Laboratory Lindsay Hays, Jet Propulsion Laboratory Paul Schenk,
    [Show full text]
  • Web Search Tutoring for the Local Community
    Web search for local communities in the Highlands of Scotland: A self-tutoring guide MODULE III Alternatives to Google: some other search tools worth a try © Copyright Hans Zell Publishing Consultants 2011 Glais Bheinn, Lochcarron, Ross-shire IV54 8YB, Scotland, UK Email: [email protected] Web: www.hanszell.co.uk Web search for local communities in the Highlands of Scotland: A self-tutoring guide MODULE I How to get the most out of Google Web search MODULE II A concise guide to Google products, services, applications, and other offerings MODULE III Alternatives to Google: some other search tools worth a try MODULE IV The best of the Web: a guide to some of the most information-rich resources on the Internet 2 Introduction Google is a marvellous Web search tool and is as good as they get at present, but it is certainly not the only one. Other top search engines include Ask.com (aka as Ask Jeeves), Bing (formerly called MSN Search), and Yahoo! (and see General purpose, product, and visual search engines below). According to data published by Experian Hitwise http://www.hitwise.com/us/datacenter/main/dashboard-23984.html in June 2011, Google still heavily dominates the market with a share of about 68%, while the market share of Yahoo and Microsoft’s Bing currently is something just under 14% for both; Ask.com is in fourth place with around 2.6%, and AOL Search in fifth place with about 1.4%. The picture is roughly the same if ranked by number of visits, although Bing does better than Yahoo in this category.
    [Show full text]
  • Final Study Report on CEF Automated Translation Value Proposition in the Context of the European LT Market/Ecosystem
    Final study report on CEF Automated Translation value proposition in the context of the European LT market/ecosystem FINAL REPORT A study prepared for the European Commission DG Communications Networks, Content & Technology by: Digital Single Market CEF AT value proposition in the context of the European LT market/ecosystem Final Study Report This study was carried out for the European Commission by Luc MEERTENS 2 Khalid CHOUKRI Stefania AGUZZI Andrejs VASILJEVS Internal identification Contract number: 2017/S 108-216374 SMART number: 2016/0103 DISCLAIMER By the European Commission, Directorate-General of Communications Networks, Content & Technology. The information and views set out in this publication are those of the author(s) and do not necessarily reflect the official opinion of the Commission. The Commission does not guarantee the accuracy of the data included in this study. Neither the Commission nor any person acting on the Commission’s behalf may be held responsible for the use which may be made of the information contained therein. ISBN 978-92-76-00783-8 doi: 10.2759/142151 © European Union, 2019. All rights reserved. Certain parts are licensed under conditions to the EU. Reproduction is authorised provided the source is acknowledged. 2 CEF AT value proposition in the context of the European LT market/ecosystem Final Study Report CONTENTS Table of figures ................................................................................................................................................ 7 List of tables ..................................................................................................................................................
    [Show full text]
  • A Dissertation Submitted to the Faculty of The
    A Framework for Application Specific Knowledge Engines Item Type text; Electronic Dissertation Authors Lai, Guanpi Publisher The University of Arizona. Rights Copyright © is held by the author. Digital access to this material is made possible by the University Libraries, University of Arizona. Further transmission, reproduction or presentation (such as public display or performance) of protected items is prohibited except with permission of the author. Download date 25/09/2021 03:58:57 Link to Item http://hdl.handle.net/10150/204290 A FRAMEWORK FOR APPLICATION SPECIFIC KNOWLEDGE ENGINES by Guanpi Lai _____________________ A Dissertation Submitted to the Faculty of the DEPARTMENT OF SYSTEMS AND INDUSTRIAL ENGINEERING In Partial Fulfillment of the Requirements For the Degree of DOCTOR OF PHILOSOPHY In the Graduate College THE UNIVERSITY OF ARIZONA 2010 2 THE UNIVERSITY OF ARIZONA GRADUATE COLLEGE As members of the Dissertation Committee, we certify that we have read the dissertation prepared by Guanpi Lai entitled A Framework for Application Specific Knowledge Engines and recommend that it be accepted as fulfilling the dissertation requirement for the Degree of Doctor of Philosophy _______________________________________________________________________ Date: 4/28/2010 Fei-Yue Wang _______________________________________________________________________ Date: 4/28/2010 Ferenc Szidarovszky _______________________________________________________________________ Date: 4/28/2010 Jian Liu Final approval and acceptance of this dissertation is contingent
    [Show full text]
  • The SEO Battlefield WINNING STRATEGIES for SEARCH MARKETING PROGRAMS
    The SEO Battlefield WINNING STRATEGIES FOR SEARCH MARKETING PROGRAMS Anne Ahola Ward The SEO Battlefield Winning Strategies for Search Marketing Programs Anne Ahola Ward Beijing Boston Farnham Sebastopol Tokyo The SEO Battlefield by Anne Ahola Ward Copyright © 2017 Anne Ward. All rights reserved. Printed in the United States of America. Published by O’Reilly Media, Inc., 1005 Gravenstein Highway North, Sebastopol, CA 95472. O’Reilly books may be purchased for educational, business, or sales promotional use. Online editions are also available for most titles (http://oreilly.com/safari). For more information, contact our corporate/insti‐ tutional sales department: 800-998-9938 or [email protected]. Editor: Meg Foley Indexer: Judy McConville Production Editor: Nicholas Adams Interior Designer: David Futato Copyeditor: Gillian McGarvey Cover Designer: Randy Comer Proofreader: Charles Roumeliotis Illustrator: Rebecca Demarest April 2017: First Edition Revision History for the First Edition 2017-03-21: First Release See http://oreilly.com/catalog/errata.csp?isbn=9781491958377 for release details. The O’Reilly logo is a registered trademark of O’Reilly Media, Inc. The SEO Battlefield, the cover image, and related trade dress are trademarks of O’Reilly Media, Inc. While the publisher and the author have used good faith efforts to ensure that the information and instructions contained in this work are accurate, the publisher and the author disclaim all responsibility for errors or omissions, including without limitation responsibility for damages resulting from the use of or reliance on this work. Use of the information and instructions contained in this work is at your own risk. If any code samples or other technology this work contains or describes is subject to open source licenses or the intellectual property rights of others, it is your responsibility to ensure that your use thereof complies with such licenses and/or rights.
    [Show full text]