TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn

Total Page:16

File Type:pdf, Size:1020Kb

TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn Friday, April 18, 2003 Taking down the Tigers! Making paper airplanes! Tech TECHNIQUE Men’s Lacrosse defeats #15 students place in national “The South’s Liveliest College Newspaper” ranked Auburn. paper gliding competition. ONLINE http://cyberbuzz.gatech.edu/technique SPORTS page 29 FOCUS page 13 Serving Georgia Tech since 1911 • Volume 88, Issue 31 • 32 pages Opinions␣ 6 · Wall Street Journal · Focus␣ 13 · Entertainment␣ 19 · Comics␣ 24 · Sports␣ 32 Sharing Opinions on the War in Iraq BuzzCard maker silences student By Tim Cailloux CampusWide to Tech, served Hoff- Senior News Photographer man with a temporary restraining order that kept him from giving his At a computer security confer- presentation. ence last weekend, Billy Hoffman, Hoffman planned to present in- a fourth year CS major, planned to formation on the network protocol present his research on Campus- used by the BuzzCard readers and Wide, the network the BuzzCard demonstrate his version of a reader system uses. that could be used as any other nor- Hoffman began researching ways mal reader connected to the the system could be circumnavigat- BuzzCard network. ed nearly two years ago. His research Along with Virgil Griffith, an led to the discovery that it is possi- Alabama University at New Col- ble to fool the system into thinking lege student, Hoffman explored the that a real BuzzCard was used when protocol used by the BuzzCard read- in fact, one was not. This flaw would, ers to see how it worked and what for example, allow someone to get information was being transmitted. free laundry service. The readers send all data to the cen- When the number of sexual as- tral server via a communications stan- saults on campus increased, Hoff- dard known as RS-485; in other man started investigating how the words, the data is sent across the By Scott Meuleners / STUDENT PUBLICATIONS system could be used to gain unau- campus local area network via a spe- College Republicans chair Alexander Brunk voices his opinion at a war in Iraq teach-in last Friday. The thorized access to dorms and other cial computer interface. event, sponsored by Amnesty International and the Computer Professionals for Social Responsibility, buildings. Under Sega v. Accolade, the Ninth featured speakers including President Clough, students and others members of the Atlanta community. Early Saturday morning, Black- board Inc., the company that sells See BuzzCard, page 5 Woodystock to Board of Regents SARS scare cancels Asia trips rock April 19 By Daniel Amick are global centers for interna- the disease is unknown. approves new major The eighth incarnation of Assistant News Editor tional trade and logistics, the per- “I understand that common Woodystock will be held Satur- By Tony Kluemper fect laboratories for industrial flu is a bigger killer than day, April 19, from 1 p.m. until News Editor Uncertainty and concern over engineers. Unfortunately, both SARS…but at least it’s more dark in the FE commons on East Severe Acute Respiratory Syn- cities are also at the heart of the understood. There are ways to Campus. The music festival will In an attempt to greater diversify the drome (SARS) has forced Geor- SARS outbreak. Since Novem- deal with it. But with SARS we feature three local Tech bands, majors available at Tech, the Board of Re- gia Tech to cancel two summer ber, the virus has killed 56 peo- don’t know how to deal with it. including Weberdog. Woodys- gents approved a new joint degree at its study abroad programs. Both pro- ple in Hong Kong and 12 in People put on masks. Does that tock is free. Hamburgers, hot- April meeting. The new degree will com- grams involved travel to China Singapore. have any effect? Nobody knows,” dogs and soft drinks will be bine the School of Modern Language and or Southeast Asia, where SARS At first, Zhou was reluctant said Zhou. provided. The event was created the School of Economics. originated, and where the dis- to cancel the program completely. “I was upset at first, because I four years ago by FE Peer Leader According to Phil McKnight, professor ease has hit hardest. He explored the possibility of thought [SARS] would maybe Cole Getzler. and chair of Modern Language, the degree An Industrial Engineering studying at Mexico’s Monter- go away,” said Lee Frankstone, a will offer students a choice of four different program involving ten weeks of rey Tech, but there was not student who had signed up for language concentrations: French, German, study in Hong Kong and Sin- enough time to create a new pro- the program. However, Frank- Tech to celebrate Japanese and Spanish. gapore was cancelled April 3. gram from the ground up. Zhou, stone said that he understands “This new degree is driven by the im- “We were all set to go,” said in consultation with another pro- the cancellation. 2003 Earth Day pact of globalization and the need for orga- Professor Chen Zhou, head of fessor and the Office of Interna- “I think, overall, [those in nizations to have employees who understand the IE program. “We had bought tional Education (OIE), decided charge of the program] made An Earth Day celebration will the tickets and everything. Peo- cancellation was the best option. the right decision, even though be held at the Campanile April See Major, page 4 ple were feeling really excited.” He said SARS should be taken 25 from 10 a.m. to 2 p.m. The Hong Kong and Singapore seriously because much about See SARS, page 4 celebration will feature live en- tertainment, alternative-fuel ve- hicles, a side walk chalk contest and in-line skating. The Nike Wilcox announces December retirement plans Reuse-a-Shoe program will also be present. Nike will collect 5,000 By Stephen Baehl grant obtained for Georgia Tech to old sneakers and use the materi- Copy Editor “Watching people grow through undertake GT SMART to reduce al to make Georgia Tech a new their Georgia Tech experience high-risk drinking, Georgia Tech’s basketball court or athletic field. After 42 years of service in higher first Women’s Resource Center, education, the past six of which have and knowing that I played some Ramblin’ Nights, the When the been at Tech, Vice President of Stu- small part in that is great.” Whistle Blows Ceremony, and a Finals, Midnight dent Affairs Lee Wilcox will retire broadened academic integrity ini- this December. Lee Wilcox tiative.” Breakfast return Despite the fact that, as Wilcox Vice President of Student Affairs Most notable, however, is his role Dead Week begins Monday, said, “Working in student affairs re- in the conception and development April 21. Finals week begins April ally keeps you young,” he felt it was of SAC II. “I’ve put more time in on 28. The finals schedule is posted time to retire. “I wanted to enjoy student affairs division.” Watson. “He faithfully worked to SAC II than any other single thing,” on www.oscarweb.gatech.edu. recreation and travel while I still Wilcox said a summary of his job help the student body on numerous said Wilcox. If you are looking for a study could,” he said. is to “represent student interests within issues, from the Student Bill of Rights Wilcox also worked on the Stu- break, check out Midnight Break- Wilcox came to Tech in June 1997 the administration.” to the Academic Life fund.” dent Leadership Initiative, improv- fast on Tuesday April 29. Stu- following “a period of a decade or so However, he did so much more Wilcox oversaw many other im- ing diversity at Tech, and, on the dent government will provide where our student affairs operations than that. provements to student life at Tech, whole, “trying to promote a sense of free breakfast food to students had languished for lack of leader- “Dr. Wilcox is a true friend of the as well. According to Clough’s email community; in other words, trying from 11 p.m. to 1 a.m in the ship,” said President Wayne Clough. student body,” said undergraduate announcing Wilcox’s retirement, Student Center Food Court. Pro- “He restored the credibility of the SGA Executive Vice President Nate “New activities included the major See Wilcox, page 4 fessors will serve the meal. 2 • Friday, April 18, 2003 • Technique NEWS Technique Online Voice Your Opinion! From the archives... Last issue’s poll garnered 49 responses to the question: “What is the most important step administrators should take to improve safety on campus?” The Nique’s top stories from: years ago: April 23, 1993—The Office of Information Tech- nology announced that Georgia Tech may soon require all 10 students to own their own PC. Budget shortfalls made the option appealing to administrators because it would allow them to eliminate all computer clusters on campus. years ago: April 22, 1983—A lab on the fourth floor of the Physics Building was damaged when 20 a high pressure reaction vessel ruptured. The vessel contained clay and heavy water at a temper- ature of 500 degrees Centigrade and a pressure of 30,000 pounds per square inch when it exploded. years ago: April 20, 1973—A safety valve released a massive amount of 30 steam in Harris dorm. A consensus editorial called students who repeat- edly vandalized the steam compres- Image by Ian Clark / STUDENT PUBLICATIONS sor in front of Tech Tower hypocrites. This week’s poll question relates to the student accused of hacking The vandals were upset that money the BuzzCard. Should Billy Hoffman be punished for his actions? had been spent to salvage the com- Tell us what you think at www.cyberbuzz.gatech.edu/technique.
Recommended publications
  • Unintended Consequences: Twelve Years Under the DMCA
    Unintended Consequences: Twelve Years under the DMCA By Fred Von Lohmann, [email protected] February 2010 ELECTRONIC FRONTIER FOUNDATION eff.org Unintended Consequences: Twelve Years under the DMCA This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against pirates, but against consumers, scientists, and legitimate compet- itors. It will be updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary Since they were enacted in 1998, the “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. Congress meant to stop copyright infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black box” devices intended for that purpose. 1 In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities, rather than to stop copyright infringement. As a result, the DMCA has developed into a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Profes- sor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, stu- dents, program¬mers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally elimi- nate the public’s fair use rights.
    [Show full text]
  • Submission Result in Legal Action Under the DCMA
    Unintended Consequences: Five Years under the DMCA protect its monopoly on Playstation video 1. Executive Summary game consoles, as well as their Since they were enacted in 1998, the “anti- “regionalization” system limiting users in circumvention” provisions of the Digital Millennium one country from playing games Copyright Act (“DMCA”), codified in section 1201 legitimately purchased in another. of the Copyright Act, have not been used as Congress Section 1201 Becomes All-Purpose Ban on envisioned. Congress meant to stop copyright pirates Access To Computer Networks from defeating anti-piracy protections added to copyrighted works, and to ban “black box” devices Further, section 1201 has been misused as a intended for that purpose.1 new general-purpose prohibition on computer network access which, unlike the In practice, the anti-circumvention provisions have several federal “anti-hacking” statutes that been used to stifle a wide array of legitimate already protect computer network owners activities, rather than to stop copyright piracy. As a from unauthorized intrusions, lacks any result, the DMCA has developed into a serious threat financial harm threshold. Disgruntled ex- to several important public policy priorities: employer Pearl Investment’s use of the Section 1201 Chills Free Expression and DMCA against a contract programmer who Scientific Research. connected to the company’s computer system through a password-protected Virtual Experience with section 1201 demonstrates Private Network illustrates the potential for that it is being used to stifle free speech and unscrupulous persons to misuse the DMCA scientific research. The lawsuit against 2600 to achieve what would not be possible under magazine, threats against Princeton existing computer access regulation regimes.
    [Show full text]
  • The Hacker's Aegis
    Emory Law Journal Volume 60 Issue 5 2010 The Hacker's Aegis Derek E. Bambauer Oliver Day Follow this and additional works at: https://scholarlycommons.law.emory.edu/elj Recommended Citation Derek E. Bambauer & Oliver Day, The Hacker's Aegis, 60 Emory L. J. 1051 (2010). Available at: https://scholarlycommons.law.emory.edu/elj/vol60/iss5/1 This Article is brought to you for free and open access by the Journals at Emory Law Scholarly Commons. It has been accepted for inclusion in Emory Law Journal by an authorized editor of Emory Law Scholarly Commons. For more information, please contact [email protected]. BAMBAUER&DAY GALLEYSFINAL 6/6/2011 10:27 AM THE HACKER’S AEGIS Derek E. Bambauer* ∗∗ Oliver Day ABSTRACT Intellectual property (IP) law stifles critical research on software security vulnerabilities, placing computer users at risk. Researchers who discover flaws often face IP-based legal threats if they reveal findings to anyone other than the software vendor. This Article argues that the interplay between law and vulnerability data challenges existing scholarship on how intellectual property law should regulate information about improvements on protected works, and suggests weakening, not enhancing, IP protections where infringement is difficult to detect, lucrative, and creates significant negative externalities. It proposes a set of three reforms—“patches,” in software terms—to protect security research. Legal reform would create immunity from civil IP liability for researchers who follow “responsible disclosure” rules. Linguistic reform would seek to make the term hacker less threatening either by recapturing the term’s original meaning, or abandoning it.
    [Show full text]
  • Ajax Security Is a Remarkably Rigorous and Thorough Examination of an Underexplored Subject
    “Ajax Security is a remarkably rigorous and thorough examination of an underexplored subject. Every Ajax engineer needs to have the knowledge contained in this book—or be able to explain why they don’t.” Jesse James Garrett “Finally, a book that collects and presents the various Ajax security concerns in an understandable format! So many people have hopped onto the Ajax bandwagon without considering the secu- rity ramifications; now those people need to read this book and revisit their applications to address the various security short- comings pointed out by the authors.” Jeff Forristal “If you are writing or reviewing Ajax code, you need this book. Billy and Bryan have done a stellar job in a nascent area of our field, and deserve success. Go buy this book. I can’t wait for it to come out.” Andrew van der Stock, Executive Director, OWASP “Web technologies like Ajax are creating new networked business structures that remove the sources of friction in the new econ- omy. Regrettably, hackers work to compromise this evolution by capitalizing on the weaknesses in this technology and those who develop it. Until now, few books told the whole Ajax security story, educating those using or planning to use this technology. This one does.” Managing Partner, Trellum Technologies This page intentionally left blank Ajax Security This page intentionally left blank Ajax Security Billy Hoffman and Bryan Sullivan Upper Saddle River, NJ • Boston • Indianapolis • San Francisco New York • Toronto • Montreal • London • Munich • Paris • Madrid Cape Town • Sydney • Tokyo • Singapore • Mexico City Many of the designations used by manufacturers and sellers to distinguish their products are claimed as trademarks.
    [Show full text]
  • 2014 EFF Unintended Consequences 2
    Unintended Consequences: Sixteen Years under the DMCA September 2014 Unintended Consequences: Sixteen Years under the DMCA September 2014 This document collects reported cases where the anti-circumvention provisions of the DMCA have been invoked not against “pirates,” but against consumers, scientists, and legitimate competitors. It is updated from time to time as additional cases come to light. The latest version can always be obtained at www.eff.org. 1. Executive Summary The “anti-circumvention” provisions of the Digital Millennium Copyright Act (“DMCA”), codified in section 1201 of the Copyright Act, have not been used as Congress envisioned. The law was ostensibly intended to stop copyright infringers from defeating anti-piracy protections added to copyrighted works.[1] In practice, the anti-circumvention provisions have been used to stifle a wide array of legitimate activities. As a result, the DMCA has become a serious threat to several important public policy priorities: The DMCA Chills Free Expression and Scientific Research. Experience with section 1201 demonstrates that it is being used to stifle free speech and scientific research. The lawsuit against 2600 magazine, threats against Princeton Professor Edward Felten’s team of researchers, and prosecution of Russian programmer Dmitry Sklyarov have chilled the legitimate activities of journalists, publishers, scientists, students, programmers, and members of the public. The DMCA Jeopardizes Fair Use. By banning all acts of circumvention, and all technologies and tools that can be used for circumvention, the DMCA grants to copyright owners the power to unilaterally eliminate the public’s fair use rights. Already, the movie industry’s use of encryption on DVDs has curtailed consumers’ ability to make legitimate, personal-use copies of movies they have purchased.
    [Show full text]
  • TECHNIQUE Men’S Lacrosse Defeats #15 Students Place in National “The South’S Liveliest College Newspaper” Ranked Auburn
    Friday, April 18, 2003 Taking down the Tigers! Making paper airplanes! Tech TECHNIQUE Men’s Lacrosse defeats #15 students place in national “The South’s Liveliest College Newspaper” ranked Auburn. paper gliding competition. ONLINE http://cyberbuzz.gatech.edu/technique SPORTS page 29 FOCUS page 13 Serving Georgia Tech since 1911 • Volume 88, Issue 31 • 32 pages Opinions␣ 6 · Wall Street Journal · Focus␣ 13 · Entertainment␣ 19 · Comics␣ 24 · Sports␣ 32 Sharing Opinions on the War in Iraq BuzzCard maker silences student By Tim Cailloux CampusWide to Tech, served Hoff- Senior News Photographer man with a temporary restraining order that kept him from giving his At a computer security confer- presentation. ence last weekend, Billy Hoffman, Hoffman planned to present in- a fourth year CS major, planned to formation on the network protocol present his research on Campus- used by the BuzzCard readers and Wide, the network the BuzzCard demonstrate his version of a reader system uses. that could be used as any other nor- Hoffman began researching ways mal reader connected to the the system could be circumnavigat- BuzzCard network. ed nearly two years ago. His research Along with Virgil Griffith, an led to the discovery that it is possi- Alabama University at New Col- ble to fool the system into thinking lege student, Hoffman explored the that a real BuzzCard was used when protocol used by the BuzzCard read- in fact, one was not. This flaw would, ers to see how it worked and what for example, allow someone to get information was being transmitted. free laundry service. The readers send all data to the cen- When the number of sexual as- tral server via a communications stan- saults on campus increased, Hoff- dard known as RS-485; in other man started investigating how the words, the data is sent across the By Scott Meuleners / STUDENT PUBLICATIONS system could be used to gain unau- campus local area network via a spe- College Republicans chair Alexander Brunk voices his opinion at a war in Iraq teach-in last Friday.
    [Show full text]
  • Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series
    Resistance, Liberation Technology and Human Rights in the Digital Age Law, Governance and Technology Series VOLUME 7 Series Editors: POMPEU CASANOVAS, UAB Institute of Law and Technology, Bellaterra, Barcelona, Spain GIOVANNI SARTOR, University of Bologna (Faculty of Law-CIRSFID) and European University Institute, Florence, Italy Scienti fi c Advisory Board: GIANMARIA AJANI, University of Turin, Italy; KEVIN ASHLEY, University of Pittsburgh, USA; KATIE ATKINSON, University of Liverpool, UK; TREVOR J.M. BENCH-CAPON, University of Liverpool, UK; V. RICHARDS BENJAMINS, Telefonica, Spain; GUIDO BOELLA, Universita’ degli Studi di Torino, Italy; JOOST BREUKER, Universiteit van Amsterdam, The Netherlands; DANIÈLE BOURCIER, CERSA, France; TOM BRUCE, University of Cornell, USA; NURIA CASELLAS, Institute of Law and Technology, UAB, Spain; CRISTIANO CASTELFRANCHI, ISTC-CNR, Italy; G. CONRAD JACK, Thomson Reuters, USA; ROSARIA CONTE, ISTC-CNR, Italy; FRANCESCO CONTINI, IRSIG-CNR, Italy; JESÚS CONTRERAS, iSOCO, Spain; JOHN DAVIES, British Telecommunications plc, UK; JOHN DOMINGUE, The Open University, UK; JAIME DELGADO, Arquitectura de Computadors, Spain; MARCO FABRI, IRSIG-CNR, Italy; DIETER FENSEL, University of Innsbruck, Austria; ENRICO FRANCESCONI, ITTIG, Italy; FERNANDO GALINDO, Universidad de Zaragoza, Spain; ALDO GANGEMI, ISTC-CNR, Italy; MICHAEL GENESERETH, Stanford University, USA; ASUNCIÓN GÓMEZ-PÉREZ, Universidad Politécnica de Madrid, Spain; THOMAS F. GORDON, Fraunhofer FOKUS, Germany; GUIDO GOVERNATORI, NICTA, Australia; GRAHAM GREENLEAF,
    [Show full text]
  • 539814-00713.Pdf
    FEDERAL TRADE COMMISSION FTC TOWN HALL: DIGITAL RIGHTS MANAGEMENT TECHNOLOGIES William H. Gates Hall, Room133 University of Washington Law School 15'~Avenue NE & NE 43rdStreet Seattle, Washington Wednesday, March 25,2009 COMMENT: PROJECT NO. PO94502 ELECTRONIC FRONTIER FOUNDATION February 9,2009 Corynne McSherry Staff Attorney and Kahle Promise Fellow Electronic Frontier Foundation 454 Shotwell Street San Francisco, CA 94 110 (415) 436-9333 I. Statement Of Interest EFF is a member-supported, nonprofit organization committed to defending civil liberties and the public interest in a digital world. Founded in 1990, EFF represents more than 14,000 contributing members including consumers, hobbyists, computer programmers, entrepreneurs, students, teachers, and researchers united in their reliance on a balanced copyright system that promotes both adequate protection for copyright owners and access to information in the digital age. EFF has long been an active participant in the public debate over Digital Rights Management ("DRM") technologies and the impact of such technologies on consumers. In 2001, for example, EFF defended 2600 Magazine after several major movie studios sought to enjoin publication of information about DeCSS, a program that circumvents a standard form of DRM on DVDs. Four years later, EFF took a leading role in the class action litigation against Sony BMG when the DRM in its CDs introduced security flaws into millions of computers. In addition to litigation, EFF attorneys and activists have raised public awareness on DRM issues via EFFYswebsite (one of the most linked-to sites in the world), numerous white papers, press commentary, and public speaking in the United States and abroad.
    [Show full text]
  • Unintended Consequences: Seven Years Under the DMCA
    Unintended Consequences: Seven Years under the DMCA This document collects a number of reported cases The DMCA Impedes Competition and where the anti-circumvention provisions of the Innovation. DMCA have been invoked not against pirates, but Rather than focusing on pirates, many against consumers, scientists, and legitimate comp- copyright owners have wielded the DMCA etitors. It will be updated from time to time as to hinder their legitimate competitors. For additional cases come to light. The latest version can example, the DMCA has been used to block always be obtained at www.eff.org. aftermarket competition in laser printer toner cartridges, garage door openers, and 1. Executive Summary computer maintenance services. Similarly, Since they were enacted in 1998, the “anti- Apple invoked the DMCA to chill circumvention” provisions of the Digital Millennium RealNetworks’ efforts to sell music Copyright Act (“DMCA”), codified in section 1201 downloads to iPod owners. of the Copyright Act, have not been used as Congress The DMCA Interferes with Computer envisioned. Congress meant to stop copyright Intrusion Laws. infringers from defeating anti-piracy protections added to copyrighted works and to ban the “black Further, the DMCA has been misused as a box” devices intended for that purpose.1 general-purpose prohibition on computer network access which, unlike most computer In practice, the anti-circumvention provisions have intrusion statutes, lacks any financial harm been used to stifle a wide array of legitimate threshold. As a result, a disgruntled activities, rather than to stop copyright infringement. employer has used the DMCA against a As a result, the DMCA has developed into a serious former contractor for simply connecting to threat to several important public policy priorities: the company’s computer system through a The DMCA Chills Free Expression and VPN.
    [Show full text]
  • Blackboard, Inc. V. Billy Hoffman and Virgil Griffith
    Case 1:03-cv-01279-CC Document 1 Filed 05/12/2003 Page 1 of 66 ORIGINAL UNITED STATES DISTRICT COURT FICEDIIV [E NORTHERN DISTRICT GEORGIA u5.p,C , RKS~,, prFa E OF C IC ATLANTA DIVISION ~7/MA Y BLACKBOARD, INC ., 1 2 2003 LUTHER,, , .S, Plaintiff, Clerk BYe Pul ICl erk v . Civil Action File No . BILLY HOFFMAN and VIRGIL GRIFFITH, I!e3-CV-1279 Defendants . NOTICE OF REMOVAL Defendants Billy Hoffman ("Hoffman") and Virgil Griffith ("Griffith") (collectively the "Defendants") file this Notice of Removal and respectfully show the following grounds for removal as specified by 28 U .S .C . § 1446 : 1 . Blackboard, Inc . ("Blackboard") has filed suit against the Defendants in the Superior Court of Dekalb County, which county is within the Atlanta Division of this Court . This suit is styled as above and numbered Civil Action No . 03CV4404-10 in that Court . The suit asserts various causes of action arising under the statutes of the United States . Blackboard is, upon information and belief, a Delaware corporation with its principal place of business in Washington, D .C . r'R~1~ RE~FI+~ C005211 IU t~S 1B( ---~- 1111 ?~ '= 71, Case 1:03-cv-01279-CC Document 1 Filed 05/12/2003 Page 2 of 66 z . Defendant Hoffman is a Georgia resident . Defendant Griffith is an Alabama resident . Neither Hoffman nor Griffith were ever a resident of Delaware or the District of Columbia or Delaware . 3 . The afore-mentioned civil action is a civil action over which this Court has original jurisdiction under the "federal question" provisions of 28 U .S .C .
    [Show full text]