Trading Secrets 2013 Year in Review

Total Page:16

File Type:pdf, Size:1020Kb

Trading Secrets 2013 Year in Review 2013 YEAR IN REVIEW Trading Secrets A Law Blog on Trade Secrets, Non-Competes, and Computer Fraud Trading Secrets Makes ABA TOP 100 BLOG LIST! Dear Clients and Friends, 2013 was a year of great change and accolades for our Trading Secrets blog. In particular, the Trading Secrets blog was selected as an ABA top 100 blog. Since 2007, the blog has continued to grow in both readership and postings. Content from Trading Secrets has appeared on newsfeeds such as Lexology and ITechLaw, Corporate Counsel, Bloomberg News, BNA, and Kevin O’Keefe’s “Real Lawyers Have Blogs,” one of the leading sources of information and commentary on the use of blogs. We are pleased to provide you with the 2013 Year in Review, which compiles our significant blog posts from 2013 and highlights our blog’s authors. For a general overview of 2013, we again direct you to our Top 10 2013 Developments/Headlines in Trade Secret, Computer Fraud, and Non-Compete Law blog entry as well as our 2013 Trade Secrets Webinar Series - Year in Review blog entry, which provide a summary of key cases and legislative developments in 2013, as well as practical advice on maintaining trade secret protections. As the specific blog entries that are contained in this Review demonstrate, our blog authors stay on top of the latest developments in this area of law and provide timely and entertaining posts on significant new cases, legal developments and legislation. We continue to include video interviews, an informative resources page, special guest authors, cutting-edge infographics and access to our well-received Trade Secret Webinar Series from 2011 to the present. In 2013, we introduced video blog posts, audio podcasts, more special guest authors, and provided an additional enhanced Resources page on the blog. We will also offer in 2014 developments in privacy, social media, and technology into our blog coverage. In addition to our blog, Seyfarth’s dedicated Trade Secrets, Computer Fraud, & Non-Competes Practice Group hosts a popular series of webinars, which address significant issues facing clients today in this important and ever-changing area of law. In 2013, we hosted 12 webinars, which are listed in this Review. For those who missed any of the programs in the 2013 webinar series, the webinars are available on compact disc upon request. We are kicking-off the 2014 webinar series with a program entitled, “2013 National Year in Review: What You Need to Know About Recent Cases/Developments in Trade Secret, Non-Compete, and Computer Fraud Law.” More information on our upcoming 2014 webinars is available in the program listing contained in this Review. Our highly successful blog and webinar series further demonstrate that Seyfarth Shaw’s national Trade Secret, Computer Fraud & Non-Competes Practice Group is one of the country’s preeminent groups dedicated to trade secrets, restrictive covenants, computer fraud, and unfair competition matters and is recognized as a Legal 500 top group. Thank you for your continued support. Michael Wexler Robert Milligan Practice Group Chair Practice Group Co-Chair and Editor Seyfarth Shaw LLP | www.seyfarth.com 2013 Year-End Blog Review 1 Table of Contents 2013 and 2014 Trade Secrets Webinar Series .............................................................................................3 Our Authors ...................................................................................................................................................5 List of Trading Secrets 2013 Blog Posts .................................................................................................... 11 Trading Secrets Blog Posts: 2013 Summary Posts .................................................................................................................... 25 Trade Secrets ................................................................................................................................ 40 Computer Fraud and Abuse Act.................................................................................................. 137 Non-Competes and Restrictive Covenants ................................................................................. 185 Legislation.................................................................................................................................... 268 International................................................................................................................................. 293 Social Media ................................................................................................................................ 309 Seyfarth Shaw LLP | www.seyfarth.com 2013 Year-End Blog Review 2 2013 Trade Secrets Webinar Series 2012 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete, and Computer Fraud Law January 2013 Trade Secrets in the Telecommunications Industry February 2013 Employee Privacy and Social Networking: Can Your Trade Secrets Survive? March 2013 How the America Invents Act Increases the Importance of Trade Secrets April 2013 Trade Secrets in the Financial Services Industry May 2013 Trade Secret and Non-Compete Legislative Update June 2013 The Big Data Revolution: How Big Data Impacts Trade Secret, Computer Fraud & Privacy Law July 2013 Trade Secret and Non-Compete Considerations in Asia August 2013 How and Why California Is Different When It Comes To Trade Secrets and Non-Competes September 2013 Trade Secrets in the Pharmaceuticals Industry October 2013 My Company’s Confidential Information is Posted on the Internet! What Can I Do? November 2013 The Stakes Just Got Higher: Criminal Prosecution of Trade Secret Misappropriation December 2013 Seyfarth Shaw LLP | www.seyfarth.com 2013 Year-End Blog Review 3 2014 Trade Secrets Webinar Topics 2013 National Year in Review: What You Need to Know About the Recent Cases/ Developments in Trade Secrets, Non-Compete, and Computer Fraud Employee Privacy, Big Data and Social Networking Data Management and Effictively Addressing Data Breaches Trade Secret and Non-Compete Legislative Update International Trade Secrets and Non-Compete law Update (Australia and EU focus) Protecting Confidential Information and Client Relationships in the Financial Services Industry Injunction Primer and Discovery in Trade Secrets, Non-Compete, and Computer Fraud Cases Protecting Tade Secrets and Intellectual Property in Business Transactions Seyfarth Shaw LLP | www.seyfarth.com 2013 Year-End Blog Review 4 Our Authors Kate Perrelli is a partner in the firm’s Boston office and Chair of Seyfarth’s Litigation Department. She is a trial lawyer with over 20 years of experience representing regional, national, and international corporations in the financial services, transportation, manufacturing, technology, pharmaceutical, and staffing industries. Her commercial practice focuses on trial work and counseling in the areas of trade secrets and restrictive covenants, unfair competition and complex commercial disputes, including dealer/franchise disputes, and contract disputes. Michael Wexler is a partner in the firm’s Chicago office, where he is Chair of the Chicago Litigation Department and Chair of the national Trade Secrets, Computer Fraud, and Non-Competes Practice Group. His practice focuses on trial work and counseling in the areas of trade secrets and restrictive covenants, corporate espionage, unfair competition, complex commercial disputes, intellectual property infringement, and white collar criminal defense in both federal and state courts. A former state prosecutor, Mr. Wexler’s extensive investigatory experience and considerable jury trial practice enables him to advise clients with regard to potential disputes and represent clients through and including a determination of their rights at trial. Robert Milligan is the Editor of the blog and Co-Chair of the national Trade Secrets, Computer Fraud, and Non-Competes Practice Group. His practice encompasses a wide variety of commercial litigation and employment matters, including general business disputes, unfair competition, trade secret misappropriation and other intellectual property theft, real estate litigation, insurance bad faith, invasion of privacy, products liability, wrongful termination, discrimination and harassment claims, wage and hour disputes, ADA and OSHA compliance, whistleblower cases, bankruptcy and other business torts. Mr. Milligan has represented clients in state and federal courts in complex commercial litigation and employment litigation. His experience includes trials, binding arbitrations and administrative hearings, mediations, as well as appellate proceedings. Michael Baniak is a highly experienced Intellectual Property litigator and trial lawyer. Mr. Baniak has a broad-based practice, and expertise that spans all facets of IP transactions, counseling, and litigation and appellate work, in patent, trademark, copyright and trade secret law. He is a true “hybrid,” working in every aspect of IP virtually daily. Mr. Baniak counsels an international array of clients. Seyfarth Shaw LLP | www.seyfarth.com 2013 Year-End Blog Review 5 Justin Beyer is a partner in the Chicago office of Seyfarth Shaw LLP and a member of the firm’s Commercial Litigation Practice Group. Mr. Beyer focuses his practice in the areas of product liability, complex commercial litigation, and trade secrets, including seeking and defending against injunctive relief based on claims of misappropriation of trade secrets and breaches
Recommended publications
  • Subcultural Appropriations of Appalachia and the Hillbilly Image, 1990-2010
    Virginia Commonwealth University VCU Scholars Compass Theses and Dissertations Graduate School 2019 The Mountains at the End of the World: Subcultural Appropriations of Appalachia and the Hillbilly Image, 1990-2010 Paul L. Robertson Virginia Commonwealth University Follow this and additional works at: https://scholarscompass.vcu.edu/etd Part of the American Popular Culture Commons, Appalachian Studies Commons, Literature in English, North America Commons, and the Other Film and Media Studies Commons © Paul L. Robertson Downloaded from https://scholarscompass.vcu.edu/etd/5854 This Dissertation is brought to you for free and open access by the Graduate School at VCU Scholars Compass. It has been accepted for inclusion in Theses and Dissertations by an authorized administrator of VCU Scholars Compass. For more information, please contact [email protected]. Robertson i © Paul L. Robertson 2019 All Rights Reserved. Robertson ii The Mountains at the End of the World: Subcultural Appropriations of Appalachia and the Hillbilly Image, 1990-2010 A dissertation submitted in partial fulfillment of the requirements for the degree of Doctor of Philosophy at Virginia Commonwealth University. By Paul Lester Robertson Bachelor of Arts in English, Virginia Commonwealth University, 2000 Master of Arts in Appalachian Studies, Appalachian State University, 2004 Master of Arts in English, Appalachian State University, 2010 Director: David Golumbia Associate Professor, Department of English Virginia Commonwealth University Richmond, Virginia May 2019 Robertson iii Acknowledgement The author wishes to thank his loving wife A. Simms Toomey for her unwavering support, patience, and wisdom throughout this process. I would also like to thank the members of my committee: Dr. David Golumbia, Dr.
    [Show full text]
  • The Alt-Right on Campus: What Students Need to Know
    THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW About the Southern Poverty Law Center The Southern Poverty Law Center is dedicated to fighting hate and bigotry and to seeking justice for the most vulnerable members of our society. Using litigation, education, and other forms of advocacy, the SPLC works toward the day when the ideals of equal justice and equal oportunity will become a reality. • • • For more information about the southern poverty law center or to obtain additional copies of this guidebook, contact [email protected] or visit www.splconcampus.org @splcenter facebook/SPLCenter facebook/SPLConcampus © 2017 Southern Poverty Law Center THE ALT-RIGHT ON CAMPUS: WHAT STUDENTS NEED TO KNOW RICHARD SPENCER IS A LEADING ALT-RIGHT SPEAKER. The Alt-Right and Extremism on Campus ocratic ideals. They claim that “white identity” is under attack by multicultural forces using “politi- An old and familiar poison is being spread on col- cal correctness” and “social justice” to undermine lege campuses these days: the idea that America white people and “their” civilization. Character- should be a country for white people. ized by heavy use of social media and memes, they Under the banner of the Alternative Right – or eschew establishment conservatism and promote “alt-right” – extremist speakers are touring colleges the goal of a white ethnostate, or homeland. and universities across the country to recruit stu- As student activists, you can counter this movement. dents to their brand of bigotry, often igniting pro- In this brochure, the Southern Poverty Law Cen- tests and making national headlines. Their appear- ances have inspired a fierce debate over free speech ter examines the alt-right, profiles its key figures and the direction of the country.
    [Show full text]
  • Justice Reinvestment in Massachusetts Overview
    Justice Reinvestment in Massachusetts Overview JANUARY 2016 Background uring the summer of 2015, Massachusetts state leaders STEERING COMMITTEE Drequested support from the U.S. Department of Justice’s Charlie Baker, Governor, the Commonwealth of Massachusetts Bureau of Justice Assistance (BJA) and The Pew Charitable Robert DeLeo, House Speaker, Massachusetts House of Representatives Trusts (Pew) to use a “justice reinvestment” approach to develop Ralph Gants, Chief Justice, Supreme Judicial Court Karyn Polito, Lieutenant Governor, the Commonwealth of Massachusetts a data-driven policy framework to reduce corrections spending Stan Rosenberg, Senate President, Massachusetts Senate and reinvest savings in strategies that can reduce recidivism and improve public safety. As public-private partners in the Justice WORKING GROUP Reinvestment Initiative (JRI), BJA and Pew approved the state’s Co-Chairs request and asked The Council of State Governments (CSG) Justice William Brownsberger, State Senator, Second Suffolk and Center to provide intensive technical assistance to help collect and Middlesex District Paula Carey, Chief Justice, Massachusetts Trial Court analyze data and develop appropriate policy options for the state. John Fernandes, State Representative, Tenth Worcester District Lon Povich, Chief Legal Counsel, Office of the Governor State leaders established the CSG Justice Center-Massachusetts Criminal Justice Review, a project led by a bipartisan, interbranch Members James G. Hicks, Chief, Natick Police steering committee and working group to support the justice Anthony Benedetti, Chief Counsel, Committee for Public reinvestment approach. The five-member steering committee is Counsel Services composed of Governor Charlie Baker, Lieutenant Governor Karyn Daniel Bennett, Secretary, Executive Office of Public Safety and Polito, Chief Justice Ralph Gants, Senate President Stan Rosenberg, Security (EOPSS) and House Speaker Robert DeLeo.
    [Show full text]
  • 2021 Matrix Awards
    SPONSORSHIP OPPORTUNITIES 2021 MATRIX AWARDS VIRTUAL EVENT | MONDAY, OCTOBER 18, 2021 | 12:00 P.M. ET Combining the success of last year’s virtually produced event with the return to normalcy we’re all feeling, we are thrilled to offer a hybrid awards ceremony this year. A professionally produced event broadcast for all to attend coupled with an invitation-only VIP reception for honorees, their guests, and exclusive sponsors. PRESENTED BY HOSTED BY New York Women in Communications (NYWICI) celebrates the 51st Anniversary of its Matrix Awards in 2021 Since 1971, the Matrix Awards have been given annually to a group of outstanding women leaders who exemplify excellence, the courage to break boundaries and steadfast commitment to champion the next generation of trailblazers, creatives and communicators. But this year will be different, bigger and better. The 2021 Matrix Awards will be delivered as a virtual event, on Monday, October 18 at 12pm ET. This digital presentation offers many new exciting possibilities, breaking down barriers of time and geography to reach a wider audience and new communities. We’ll be able to expand the audience and influence of the usual in-person gathering several-fold. NYWICI will welcome back past winners and presenters, celebrate our scholarship winners and spotlight our longstanding and newly engaged partners who make this all possible. Over the past 50 years, we’ve celebrated some iconic women like Gloria Steinem, Padma Lakshmi, Norah O’Donnell, Halle Berry, Kirsten Gillibrand, Andrea Mitchell, Joanna Coles, Bonnie Hammer, Sheryl Sandberg and Tina Fey, among many more. This event is NYWICI’s largest fundraiser and we invite you to join us as an event sponsor, demonstrating your support of NYWICI, women in the communications field and the incredible class of 2021 Matrix honorees.
    [Show full text]
  • FUNDING HATE How White Supremacists Raise Their Money
    How White Supremacists FUNDING HATE Raise Their Money 1 RESPONDING TO HATE FUNDING HATE INTRODUCTION 1 SELF-FUNDING 2 ORGANIZATIONAL FUNDING 3 CRIMINAL ACTIVITY 9 THE NEW KID ON THE BLOCK: CROWDFUNDING 10 BITCOIN AND CRYPTOCURRENCIES 11 THE FUTURE OF WHITE SUPREMACIST FUNDING 14 2 RESPONDING TO HATE How White Supremacists FUNDING HATE Raise Their Money It’s one of the most frequent questions the Anti-Defamation League gets asked: WHERE DO WHITE SUPREMACISTS GET THEIR MONEY? Implicit in this question is the assumption that white supremacists raise a substantial amount of money, an assumption fueled by rumors and speculation about white supremacist groups being funded by sources such as the Russian government, conservative foundations, or secretive wealthy backers. The reality is less sensational but still important. As American political and social movements go, the white supremacist movement is particularly poorly funded. Small in numbers and containing many adherents of little means, the white supremacist movement has a weak base for raising money compared to many other causes. Moreover, ostracized because of its extreme and hateful ideology, not to mention its connections to violence, the white supremacist movement does not have easy access to many common methods of raising and transmitting money. This lack of access to funds and funds transfers limits what white supremacists can do and achieve. However, the means by which the white supremacist movement does raise money are important to understand. Moreover, recent developments, particularly in crowdfunding, may have provided the white supremacist movement with more fundraising opportunities than it has seen in some time. This raises the disturbing possibility that some white supremacists may become better funded in the future than they have been in the past.
    [Show full text]
  • UNITED STATES INTERNATIONAL TRADE COMMISSION Washington, DC
    UNITED STATES INTERNATIONAL TRADE COMMISSION Washington, DC In the Matter of Investigation No. 337-TA-___ CERTAIN FOOTWEAR PRODUCTS COMPLAINT UNDER SECTION 337 OF THE TARIFF ACT OF 1930, AS AMENDED COMPLAINANT PROPOSED RESPONDENTS Converse Inc. Skechers U.S.A., Inc. One High Street 228 Manhattan Beach Boulevard North Andover, Massachusetts 01845 Manhattan Beach, CA 90266 978-983-2774 800-746-3411 [email protected] COUNSEL FOR COMPLAINANT www.skechers.com V. James Adduci, II Wal-Mart Stores, Inc. Deanna Tanner Okun 702 SW 8th Street Jonathan J. Engler Bentonville, AR 72716-8611 Thomas R. Burns, Jr. 479-273-4000 Asha Allam www.walmart.com Evan H. Langdon Lauren E. Peterson A-List, Inc., d/b/a Kitson ADDUCI, MASTRIANI & SCHAUMBERG, LLP 115 South Robertson Boulevard 1133 Connecticut Avenue, N.W., 12th Floor Los Angeles, CA 90048 Washington, DC 20036 310-859-2652 Telephone: (202) 467-6300 www.shopkitson.com Facsimile: (202) 466-2006 Aldo Group Christopher J. Renk 2300 Émile-Bélanger Erik S. Maurer Montreal, Quebec Michael J. Harris H4R 3J4 Katherine Laatsch Fink Canada Audra C. Eidem Heinze www.aldoshoes.com Aaron P. Bowling BANNER & WITCOFF, LTD. Brian Lichtenberg, LLC Ten South Wacker Drive, Suite 3000 825 1/2 Silver Lake Boulevard Chicago, IL 60606 Los Angeles, CA 90026 Telephone: (312) 463-5000 www.brianlichtenberg.com Facsimile: (312) 463-5001 Cmerit USA, Inc., d/b/a Gotta Flurt 13875 Ramona Avenue Chino, CA 91710 909-590-8898 www.cmeritusa.com www.gottaflurt.com Dioniso SRL via Pievaiola 166-f2 06132 Perugia Italy 39-075-528-7168 [email protected] www.blackdioniso.com Edamame Kids, Inc.
    [Show full text]
  • Macron Leaks” Operation: a Post-Mortem
    Atlantic Council The “Macron Leaks” Operation: A Post-Mortem Jean-Baptiste Jeangène Vilmer The “Macron Leaks” Operation: A Post-Mortem Jean-Baptiste Jeangène Vilmer ISBN-13: 978-1-61977-588-6 This report is written and published in accordance with the Atlantic Council Policy on Intellectual Indepen- dence. The author is solely responsible for its analysis and recommendations. The Atlantic Council and its donors do not determine, nor do they necessarily endorse or advocate for, any of this report’s conclusions. June 2019 Contents Acknowledgments iv Abstract v Introduction 1 I- WHAT HAPPENED 4 1. The Disinformation Campaign 4 a) By the Kremlin media 4 b) By the American alt-right 6 2. The Aperitif: #MacronGate 9 3. The Hack 10 4. The Leak 11 5. In Summary, a Classic “Hack and Leak” Information Operation 14 6. Epilogue: One and Two Years Later 15 II- WHO DID IT? 17 1. The Disinformation Campaign 17 2. The Hack 18 3. The Leak 21 4. Conclusion: a combination of Russian intelligence and American alt-right 23 III- WHY DID IT FAIL AND WHAT LESSONS CAN BE LEARNED? 26 1. Structural Reasons 26 2. Luck 28 3. Anticipation 29 Lesson 1: Learn from others 29 Lesson 2: Use the right administrative tools 31 Lesson 3: Raise awareness 32 Lesson 4: Show resolve and determination 32 Lesson 5: Take (technical) precautions 33 Lesson 6: Put pressure on digital platforms 33 4. Reaction 34 Lesson 7: Make all hacking attempts public 34 Lesson 8: Gain control over the leaked information 34 Lesson 9: Stay focused and strike back 35 Lesson 10: Use humor 35 Lesson 11: Alert law enforcement 36 Lesson 12: Undermine propaganda outlets 36 Lesson 13: Trivialize the leaked content 37 Lesson 14: Compartmentalize communication 37 Lesson 15: Call on the media to behave responsibly 37 5.
    [Show full text]
  • The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right
    The Fringe Insurgency Connectivity, Convergence and Mainstreaming of the Extreme Right Jacob Davey Julia Ebner About this paper About the authors This report maps the ecosystem of the burgeoning Jacob Davey is a Researcher and Project Coordinator at ‘new’ extreme right across Europe and the US, which is the Institute for Strategic Dialogue (ISD), overseeing the characterised by its international outlook, technological development and delivery of a range of online counter- sophistication, and overtures to groups outside of the extremism initiatives. His research interests include the traditional recruitment pool for the extreme-right. This role of communications technologies in intercommunal movement is marked by its opportunistic pragmatism, conflict, the use of internet culture in information seeing movements which hold seemingly contradictory operations, and the extreme-right globally. He has ideologies share a bed for the sake of achieving provided commentary on the extreme right in a range common goals. It examines points of connectivity of media sources including The Guardian, The New York and collaboration between disparate groups and Times and the BBC. assesses the interplay between different extreme-right movements, key influencers and subcultures both Julia Ebner is a Research Fellow at the Institute for online and offline. Strategic Dialogue (ISD) and author of The Rage: The Vicious Circle of Islamist and Far-Right Extremism. Her research focuses on extreme right-wing mobilisation strategies, cumulative extremism and European terrorism prevention initiatives. She advises policy makers and tech industry leaders, regularly writes for The Guardian and The Independent and provides commentary on broadcast media, including the BBC and CNN. © ISD, 2017 London Washington DC Beirut Toronto This material is offered free of charge for personal and non-commercial use, provided the source is acknowledged.
    [Show full text]
  • Less Than a Decade After Launching Her Own Label, Tory Burch C'88 Is
    Less than a decade after launching her own label, Tory Burch C’88 is one of the most recognizable names in fashion. Through mentoring and microloans, the Tory Burch Foundation is empowering other women entrepreneurs to follow in her footsteps. By Kathryn Levy Feldman From Brand to RoleModel a recent evening at Tory Burch LLC in downtown Manhattan, the resort collection of bright, classic, ON and preppy-chic clothing and accessories was not getting much attention from the 75 women gathered in the trademark orange-and-green showroom. In fact, the clothing racks had been pushed to the sides of the mirrored space to make way for 11 glass-topped tables, where the women—aged 20 to 60, and each the owner of her own small business—were engaged in a networking forum modeled on speed dating and organized by the Tory Burch Foundation and its micro-financing partner, Accion. The evening was one of about a dozen similar mentoring events Burch’s foundation has held in locations such as New York, Chicago, and Hawaii. Every 20 minutes, the women moved from table to table to tap the expertise of a different mentor in fields including (that evening) retail, hospitality, real estate, insurance, and marketing. Burch herself circulated among the tables, listening in on conversations and beaming. 44 NOV | DEC 2012 THE PENNSYLVANIA GAZETTE PHOTOGRAPH BY PATRICK DEMARCHELIER From Brand to “I’m lucky to have had many mentors throughout my career,” Burch says. THE PENNSYLVANIA GAZETTE NOV | DEC 2012 45 “For our mentoring events, we focus Certainly she has demonstrated hers.
    [Show full text]
  • Less Than a Year After Charlottesville, the Alt-Right Is Self-Destructing
    PHOTO ILLUSTRATION BY THE DAILY BEAST Less Than a Year After Charlottesville, the Alt-Right Is Self-Destructing Less than a year after its deadly rally in Charlottesville, the American alt-right is splintering in dramatic fashion as its leaders turn on each other or quit altogether. KELLY WEILL 03.29.18 4:56 AM ET Some have turned federal informant. Others are facing prison time. More are named in looming lawsuits. All of them are fighting. Last summer, the American alt-right was presenting itself as a threatening, unified front, gaining national attention with a deadly rally in Charlottesville, Virginia. The collection of far- right and white nationalist groups proclaimed victory after President Donald Trump hesitated to directly condemn them and instead blamed “both sides” and the “alt left” for the violence. But less than a year after Charlottesville, the alt-right is splintering in dramatic fashion as its leaders turn on each other or quit altogether. Matthew Heimbach’s arrest in a March trailer park brawl with members of his neo-Nazi group—some of whom he was allegedly screwing—felt like a too-obvious metaphor. Heimbach was the head of the Traditionalist Worker Party, a youth-focused white supremacist group that floated to the front of media coverage and hate rallies in the run-up to Donald Trump’s election. But by March, Heimbach and the TWP had spent the previous months embroiled in a series of online spats with other alt-right factions. On March 14, police in his Indiana hometown arrested Heimbach after he allegedly assaulted TWP spokesperson Matthew Parrott during a fight over their wives, both of whom Heimbach was allegedly sleeping with.
    [Show full text]
  • SHNS .: State House News Service
    SHNS .: State House News Service statehousenews.com/mobile ☰ Six Lawmakers Named to Draft Final Policing Bill Lead Negotiators: Rep. Claire Cronin, Sen. Will Brownsberger Katie Lannan7/27/20 7:05 PM JULY 27, 2020.....Three senators who helped craft their branch's policing bill will join the Judiciary Committee's House chair, the head of the Massachusetts Black and Latino Legislative Caucus and a former state trooper on a conference committee that will try to reach a House-Senate compromise on police reform. Each branch named its negotiators on Monday. On the Senate side, it's Democrats Sen. William Brownsberger of Belmont and Sen. Sonia Chang-Diaz of Jamaica Plain, and Minority Leader Bruce Tarr, a Gloucester Republican. The House appointed Rep. Claire Cronin, an Easton Democrat who as co-chair of the Judiciary Committee led the House's effort to compile a police reform bill; Springfield Democrat Rep. Carlos Gonzalez, who chairs the Black and Latino Legislative Caucus, and Rep. Timothy Whelan, a Brewster Republican who voted against the bill. Chang-Diaz, the sole member of the Black and Latino Caucus in the Senate, and Brownsberger chaired the working group that developed the Senate's bill. Tarr was the only Republican on that panel. 1/4 Brownsberger and Cronin played leading roles in negotiations on a criminal justice reform package. Those talks lasted for 113 days. The police reform conferees have a much tighter timeline -- Friday marks the last day of formal legislative sessions for the two-year term, though there is a possibility that lawmakers could agree to work beyond that deadline because of the disruptions of the COVID-19 pandemic.
    [Show full text]
  • Post-Digital Cultures of the Far Right
    Maik Fielitz, Nick Thurston (eds.) Post-Digital Cultures of the Far Right Political Science | Volume 71 Maik Fielitz, Nick Thurston (eds.) Post-Digital Cultures of the Far Right Online Actions and Offline Consequences in Europe and the US With kind support of Bibliographic information published by the Deutsche Nationalbibliothek The Deutsche Nationalbibliothek lists this publication in the Deutsche Na- tionalbibliografie; detailed bibliographic data are available in the Internet at http://dnb.d-nb.de This work is licensed under the Creative Commons Attribution-NonCommercial-No- Derivatives 4.0 (BY-NC-ND) which means that the text may be used for non-commer- cial purposes, provided credit is given to the author. For details go to http://creativecommons.org/licenses/by-nc-nd/4.0/ To create an adaptation, translation, or derivative of the original work and for com- mercial use, further permission is required and can be obtained by contacting [email protected] Creative Commons license terms for re-use do not apply to any content (such as graphs, figures, photos, excerpts, etc.) not original to the Open Access publication and further permission may be required from the rights holder. The obligation to research and clear permission lies solely with the party re-using the material. © 2019 transcript Verlag, Bielefeld Cover layout: Kordula Röckenhaus, Bielefeld Typeset by Alexander Masch, Bielefeld Printed by Majuskel Medienproduktion GmbH, Wetzlar Print-ISBN 978-3-8376-4670-2 PDF-ISBN 978-3-8394-4670-6 https://doi.org/10.14361/9783839446706 Contents Introduction | 7 Stephen Albrecht, Maik Fielitz and Nick Thurston ANALYZING Understanding the Alt-Right.
    [Show full text]