Second Amended Consolidated Class Action Complaint.Pdf

Total Page:16

File Type:pdf, Size:1020Kb

Second Amended Consolidated Class Action Complaint.Pdf Case 5:16-md-02752-LHK Document 387-4 Filed 07/11/19 Page 1 of 97 1 MORGAN & MORGAN CASEY GERRY SCHENK COMPLEX LITIGATION GROUP FRANCAVILLA BLATT & PENFIELD 2 John A. Yanchunis (Admitted Pro Hac Vice) LLP 3 201 N. Franklin Street, 7th Floor Gayle M. Blatt, SBN 122048 Tampa, Florida 33602 110 Laurel Street 4 Telephone: 813/223-5505 San Diego, CA 92101 813/223-5402 (fax) Telephone: 619/238-1811 5 [email protected] 619/544-9232 (fax) [email protected] 6 7 Ariana J. Tadler (Pro Hac Vice) ROBBINS GELLER RUDMAN [email protected] & DOWD LLP TADLER LAW, LLP 8 Stuart A. Davidson (Admitted Pro Hac One Penn Plaza Vice) 9 New York, New York T: 212-946-9453 120 East Palmetto Park Road, Suite 500 10 F: 212-273-4375 Boca Raton, FL 33432 Telephone: 561/750-3000 11 561/750-3364 (fax) [email protected] 12 LOCKRIDGE GRINDAL NAUEN 13 P.L.L.P. 14 Karen Hanson Riebel (Admitted Pro Hac Vice) 15 100 Washington Ave. South, Suite 2200 Minneapolis, MN 55401 16 Telephone: 612/339-6900 17 612/339-0981 (fax) [email protected] 18 Attorneys for Plaintiffs and the Class 19 20 UNITED STATES DISTRICT COURT 21 NORTHERN DISTRICT OF CALIFORNIA 22 SAN JOSE DIVISION 23 IN RE: YAHOO! INC. CUSTOMER DATA CASE NO. 16-MD-02752-LHK 24 SECURITY BREACH LITIGATION SECOND AMENDED CONSOLIDATED 25 CLASS ACTION COMPLAINT 26 JURY TRIAL DEMANDED 27 28 16-MD-02752 Second Amended Consolidated Class Action Complaint Case 5:16-md-02752-LHK Document 387-4 Filed 07/11/19 Page 2 of 97 1 TABLE OF CONTENTS 2 I. SUMMARY OF THE CASE .............................................................................1 3 II. JURISDICTION AND VENUE ........................................................................6 4 III. PARTIES ...........................................................................................................6 5 A. Class Representatives Who Signed up for Yahoo Services in the United States ..........................................................................................6 6 B. Class Representatives for the Israel Class ...........................................11 7 C. Class Representative for the Small Business Users Class ...................12 8 D. Class Representative for the Paid Users Class .....................................14 9 E. Defendants ...........................................................................................15 10 IV. FACTUAL BACKGROUND ..........................................................................16 11 A. Yahoo Collects and Stores PII for its Own Financial Gain .................16 12 B. Yahoo’s Small Business Customers Depended on Defendants’ PII 13 Security Practices .................................................................................19 14 C. PII is Very Valuable on the Black Market ...........................................22 15 D. Yahoo Turns a Blind Eye to Gaping Holes in Its Security, Refusing to Upgrade After Repeated Intrusions and Negative Assessments ..........25 16 E. Yahoo’s Inadequate Data Security Allows the Massive Breach of 1 17 Billion User Accounts in 2013, Which Yahoo Then Fails to Disclose ..............................................................................................................32 18 F. Yahoo’s Security Is Breached Again and Again—in 2014, 2015, and 19 2016—Yet Yahoo Still Does Not Alert Its Users ................................34 20 G. Yahoo Reveals the 2014 Breach Years After It Happened ..................43 21 H. More Than Three Years After the Fact, Yahoo Finally Acknowledges the 2013 Breach ...................................................................................47 22 I. Despite All of This, Yahoo Still Waits to Notify Users Affected by the 23 Forged Cookie Breach .........................................................................48 24 J. The Full Extent of the Fallout from the Breaches is Not Yet Known .50 25 V. CLASS ACTION ALLEGATIONS ................................................................55 26 VI. CHOICE OF LAW ..........................................................................................61 27 VII. CLAIMS ALLEGED ON BEHALF OF ALL CLASSES ...............................63 28 First Claim for Relief: Violation of California’s Unfair Competition Law i 16-MD-02752 Second Amended Consolidated Class Action Complaint Case 5:16-md-02752-LHK Document 387-4 Filed 07/11/19 Page 3 of 97 (“UCL”) – Unlawful Business Practice ...............................................63 1 Second Claim for Relief: Violation of California’s Unfair Competition Law 2 (“UCL”) – Unfair Business Practice ....................................................66 3 Third Claim for Relief: Deceit by Concealment — Cal. Civil Code §§ 1709, 1710......................................................................................................70 4 Fourth Claim for Relief: Negligence ...............................................................72 5 Fifth Claim for Relief: Breach of Contract ......................................................74 6 Sixth Claim for Relief: Breach of Implied Contracts ......................................79 7 Seventh Claim for Relief: Breach of the Implied Covenant of Good Faith and 8 Fair Dealing .........................................................................................80 9 Eighth Claim for Relief: Declaratory Relief ....................................................81 10 VIII. ADDITONAL CLAIMS ALLEGED ON BEHALF OF THE SMALL BUSINESS USERS CLASS ONLY ..........................................................82 11 Ninth Claim for Relief: Violation of California’s Unfair Competition Law 12 (“UCL”) – Fraudulent Business Practice .............................................82 13 Tenth Claim for Relief: Misrepresentation ......................................................85 14 IX. ADDITONAL CLAIMS ALLEGED ON BEHALF OF THE PAID USERS CLASS ONLY ...........................................................................................87 15 Eleventh Claim for Relief: Violation of California’s Consumer Legal 16 Remedies Act (“CLRA”) .....................................................................87 17 X. ADDITONAL CLAIMS ALLEGED ON BEHALF OF THE CALIFORNIA SUBCLASS ONLY ...................................................................................90 18 Twelfth Claim for Relief: Violation of California’s Customer Records Act – 19 Inadequate Security ..............................................................................90 20 Thirteenth Claim for Relief: Violation of California’s Customer Records Act – Delayed Notification .......................... Error! Bookmark not defined. 21 XI. PRAYER FOR RELIEF ..................................................................................93 22 XII. JURY TRIAL DEMANDED ...........................................................................94 23 24 25 26 27 28 16-MD-02752 ii Second Amended Consolidated Class Action Complaint Case 5:16-md-02752-LHK Document 387-4 Filed 07/11/19 Page 4 of 97 1 For their Second Amended Consolidated Class Action Complaint, Plaintiffs Kimberly 2 Heines, Hashmatullah Essar, Paul Dugas, Matthew Ridolfo, Deana Ridolfo, Yaniv Rivlin, 3 Mali Granot, Brian Neff, and Andrew J. Mortensen, on behalf of themselves and all others 1 4 similarly situated, allege the following against Defendant Yahoo! Inc. (“Yahoo”), and 5 Plaintiff Brian Neff, on behalf of himself and all others similarly situated, alleges the 6 following against Defendants Yahoo and Aabaco Small Business, LLC (“Aabaco”) 7 (collectively with Yahoo, “Defendants”), based on personal knowledge as to Plaintiffs and 8 Plaintiffs’ own acts and on information and belief as to all other matters based upon, inter 9 alia, the investigation conducted by and through Plaintiffs’ undersigned counsel: 10 SUMMARY OF THE CASE 11 1. Giant information service providers such as Google, Facebook, Microsoft, and 12 Yahoo experience a consistent stream of attacks on their data security. Quickly identifying 13 and documenting those attacks, stopping them, and crafting better security measures to 14 prevent them in the future is a normal, expected part of the business – except in Yahoo’s 15 case. Inexplicably turning a blind eye to this key aspect of its business, Yahoo did not just 16 ignore security holes, it failed to set up the systems necessary to even detect or document 17 them. This practice was long-term. Yahoo’s own documents demonstrate that for nearly the 18 last decade, Yahoo’s systems have been breached again and again and again and that Yahoo 19 in essence did nothing to protect its user data. 20 2. As a telling example, law enforcement notified Yahoo of a potential breach in 21 late 2011. It took Yahoo until January 30, 2012, to retain an outside cybersecurity firm, 22 1 In June, 2017, Yahoo’s operating business was acquired by Verizon Communications 23 Inc. (“Verizon”), with Yahoo continuing to exist as a wholly-owned subsidiary of Oath, Inc., a subsidiary of Verizon. In the event Yahoo is unable to satisfy any judgment entered in this 24 case against it, and a successor entity is the proper defendant, plaintiffs will promptly move under Rule 25(c) to substitute Yahoo’s successor as a proper defendant, which may be done 25 at any time, including after judgment. See Fed. Ins. Co. v. Laney, No. C 12-04708 WHA, 26 2013 WL 3597309, at *2 (N.D. Cal. July 12, 2013) (noting that “Rule 25(c) has no time limit.”); Zest IP Holdings, LLC v. Implant Direct Mfg, LLC, No. 10CV0541-GPC-WVG, 27 2013 WL 1626111, at *2 (S.D. Cal. Apr. 15, 2013) (“Rule 25(c) does not have
Recommended publications
  • The Potential of Leaks: Mediation, Materiality, and Incontinent Domains
    THE POTENTIAL OF LEAKS: MEDIATION, MATERIALITY, AND INCONTINENT DOMAINS ALYSSE VERONA KUSHINSKI A DISSERTATION SUBMITTED TO THE FACULTY OF GRADUATE STUDIES IN PARTIAL FULFILLMENT OF THE REQUIREMENTS FOR THE DEGREE OF DOCTOR OF PHILOSOPHY GRADUATE PROGRAM IN COMMUNICATION AND CULTURE YORK UNIVERSITY TORONTO, ONTARIO AUGUST 2019 © Alysse Kushinski, 2019 ABSTRACT Leaks appear within and in between disciplines. While the vernacular implications of leaking tend to connote either the release of texts or, in a more literal sense, the escape of a fluid, the leak also embodies more poetic tendencies: rupture, release, and disclosure. Through the contours of mediation, materiality, and politics this dissertation traces the notion of “the leak” as both material and figurative actor. The leak is a difficult subject to account for—it eludes a specific discipline, its meaning is fluid, and its significance, always circumstantial, ranges from the entirely banal to matters of life and death. Considering the prevalence of leakiness in late modernity, I assert that the leak is a dynamic agent that allows us to trace the ways that actors are entangled. To these ends, I explore several instantiations of “leaking” in the realms of media, ecology, and politics to draw connections between seemingly disparate subjects. Despite leaks’ threatening consequences, they always mark a change, a transformation, a revelation. The leak becomes a means through which we can challenge ourselves to reconsider the (non)functionality of boundaries—an opening through which new possibilities occur, and imposed divisions are contested. However, the leak operates simultaneously as opportunity and threat—it is always a virtual agent, at once stagnant and free flowing.
    [Show full text]
  • The Views of the U.S. Left and Right on Whistleblowers Whistleblowers on Right and U.S
    The Views of the U.S. Left and Right on Whistleblowers Concerning Government Secrets By Casey McKenzie Submitted to Central European University Department of International Relations and European Studies In partial fulfillment of the requirements for the degree of Master of Arts Supervisor: Professor Erin Kristin Jenne Word Count: 12,868 CEU eTD Collection Budapest Hungary 2014 Abstract The debates on whistleblowers in the United States produce no simple answers and to make thing more confusing there is no simple political left and right wings. The political wings can be further divided into far-left, moderate-left, moderate-right, far-right. To understand the reactions of these political factions, the correct political spectrum must be applied. By using qualitative content analysis of far-left, moderate-left, moderate-right, far-right news sites I demonstrate the debate over whistleblowers belongs along a establishment vs. anti- establishment spectrum. CEU eTD Collection i Acknowledgments I would like to express my fullest gratitude to my supervisor, Erin Kristin Jenne, for the all the help see gave me and without whose guidance I would have been completely lost. And to Danielle who always hit me in the back of the head when I wanted to give up. CEU eTD Collection ii Table of Contents Abstract ....................................................................................................................................... i Acknowledgments.....................................................................................................................
    [Show full text]
  • USA V. Bradley (Chelsea) Manning: Army Court of Appeals Affirms Prior
    UNITED STATES ARMY COURT OF CRIMINAL APPEALS Before CAMPANELLA, CELTNIEKS, and HAGLER Appellate Military Judges UNITED STATES, Appellee v. Private First Class BRADLEY E. MANNING (nka CHELSEA E. MANNING) United States Army, Appellant ARMY 20130739 U.S. Army Military District of Washington Denise R. Lind, Military Judge Colonel Corey J. Bradley, Staff Judge Advocate (pretrial) Colonel James R. Agar, II, Staff Judge Advocate (post-trial) For Appellant: Vincent J. Ward, Esquire (argued); Captain J. David Hammond, JA; Lieutenant Colonel Jonathan F. Potter, JA; Vincent J. Ward, Esquire; Nancy Hollander, Esquire (on brief); Lieutenant Colonel Christopher D. Carrier, JA. Amicus Curiae: For Electronic Frontier Foundation, National Association of Criminal Defense Lawyers, and the Center for Democracy and Technology: Jamie Williams, Esquire; Andrew Crocker, Esquire (on brief). For Amnesty International Limited: John K. Keker, Esquire; Dan Jackson, Esquire; Nicholas S. Goldberg, Esquire (on brief). For American Civil Liberties Union Foundation: Esha Bhandari, Esquire; Dror Ladin, Esquire; Ben Wizner, Esquire (on brief). For Open Society Justice Initiative: James Goldston, Esquire; Sandra Coliver, Esquire (on brief). For Appellee: Captain Catherine M. Parnell, JA (argued); Colonel Mark H. Sydenham, JA; Lieutenant Colonel A.G. Courie III, JA; Major Steve T. Nam, JA; Captain Timothy C. Donahue, JA; Captain Jennifer A. Donahue, JA; Captain Samuel E. Landes, JA (on brief); Captain Allison L. Rowley, JA. 31 May 2018 --------------------------------- OPINION OF THE COURT --------------------------------- MANNING—ARMY 20130739 CAMPANELLA, Senior Judge: A military judge sitting as a general court-martial convicted appellant, in accordance with her pleas, of one specification of violating a lawful general regulation and two specifications of general disorders in violation of Articles 92 and 134, Uniform Code of Military Justice (UCMJ), 10 U.S.C.
    [Show full text]
  • U.S. Charges Hacker with Illegally Accessing New York Times Computer Network
    September 9, 2003 U.S. Department of Justice United States Attorney Southern District of New York James B. Comey Contact: Marvin, Smilon, Herbert Hadad, Michael Kulstad Public Information Office (212) 637-2600 Mark F. Mendelsohn (212) 637-2487 FBI Joseph A. Valiquette James, Margolin (212) 384-2715, 2720 U.S. Charges Hacker with Illegally Accessing New York Times Computer Network JAMES B. COMEY, United States Attorney for the Southern District of New York, and PASQUALE D’AMURO, the Assistant Director in Charge of the New York Office of the Federal Bureau of Investigation, announced that ADRIAN LAMO was charged in Manhattan federal court with hacking into the internal computer network of the New York Times. LAMO surrendered today to federal authorities in Sacramento, California. According to a two-count criminal Complaint unsealed today in Manhattan federal court, on February 26, 2002, LAMO hacked into the New York Times’ internal computer network and accessed a database containing personal information (including home telephone numbers and Social Security numbers) for over 3,000 contributors to the New York Times’ Op-Ed page. As described in the Complaint, soon after being notified of the computer intrusion, the New York Times conducted an internal investigation and confirmed that an intruder had in fact hacked into its network and accessed the personal information for contributors to the Op-Ed page. In addition, according to the Complaint, the Times determined that the intruder had added an entry to that database for “Adrian Lamo,” listing personal information including LAMO’s cellular telephone number (415) 505-HACK, and a description of his areas of expertise as “computer hacking, national security, communications intelligence.” The Complaint states that the New York Times later learned that while inside its internal network, LAMO had set up five fictitious user identification names and passwords (“userids/passwords”) under the New York Times’ account with LexisNexis, an online subscription service that provides legal, news and other information for a fee.
    [Show full text]
  • Ethical Hacking
    Ethical Hacking Alana Maurushat University of Ottawa Press ETHICAL HACKING ETHICAL HACKING Alana Maurushat University of Ottawa Press 2019 The University of Ottawa Press (UOP) is proud to be the oldest of the francophone university presses in Canada and the only bilingual university publisher in North America. Since 1936, UOP has been “enriching intellectual and cultural discourse” by producing peer-reviewed and award-winning books in the humanities and social sciences, in French or in English. Library and Archives Canada Cataloguing in Publication Title: Ethical hacking / Alana Maurushat. Names: Maurushat, Alana, author. Description: Includes bibliographical references. Identifiers: Canadiana (print) 20190087447 | Canadiana (ebook) 2019008748X | ISBN 9780776627915 (softcover) | ISBN 9780776627922 (PDF) | ISBN 9780776627939 (EPUB) | ISBN 9780776627946 (Kindle) Subjects: LCSH: Hacking—Moral and ethical aspects—Case studies. | LCGFT: Case studies. Classification: LCC HV6773 .M38 2019 | DDC 364.16/8—dc23 Legal Deposit: First Quarter 2019 Library and Archives Canada © Alana Maurushat, 2019, under Creative Commons License Attribution— NonCommercial-ShareAlike 4.0 International (CC BY-NC-SA 4.0) https://creativecommons.org/licenses/by-nc-sa/4.0/ Printed and bound in Canada by Gauvin Press Copy editing Robbie McCaw Proofreading Robert Ferguson Typesetting CS Cover design Édiscript enr. and Elizabeth Schwaiger Cover image Fragmented Memory by Phillip David Stearns, n.d., Personal Data, Software, Jacquard Woven Cotton. Image © Phillip David Stearns, reproduced with kind permission from the artist. The University of Ottawa Press gratefully acknowledges the support extended to its publishing list by Canadian Heritage through the Canada Book Fund, by the Canada Council for the Arts, by the Ontario Arts Council, by the Federation for the Humanities and Social Sciences through the Awards to Scholarly Publications Program, and by the University of Ottawa.
    [Show full text]
  • Who Watches the Watchmen? the Conflict Between National Security and Freedom of the Press
    WHO WATCHES THE WATCHMEN WATCHES WHO WHO WATCHES THE WATCHMEN WATCHES WHO I see powerful echoes of what I personally experienced as Director of NSA and CIA. I only wish I had access to this fully developed intellectual framework and the courses of action it suggests while still in government. —General Michael V. Hayden (retired) Former Director of the CIA Director of the NSA e problem of secrecy is double edged and places key institutions and values of our democracy into collision. On the one hand, our country operates under a broad consensus that secrecy is antithetical to democratic rule and can encourage a variety of political deformations. But the obvious pitfalls are not the end of the story. A long list of abuses notwithstanding, secrecy, like openness, remains an essential prerequisite of self-governance. Ross’s study is a welcome and timely addition to the small body of literature examining this important subject. —Gabriel Schoenfeld Senior Fellow, Hudson Institute Author of Necessary Secrets: National Security, the Media, and the Rule of Law (W.W. Norton, May 2010). ? ? The topic of unauthorized disclosures continues to receive significant attention at the highest levels of government. In his book, Mr. Ross does an excellent job identifying the categories of harm to the intelligence community associated NI PRESS ROSS GARY with these disclosures. A detailed framework for addressing the issue is also proposed. This book is a must read for those concerned about the implications of unauthorized disclosures to U.S. national security. —William A. Parquette Foreign Denial and Deception Committee National Intelligence Council Gary Ross has pulled together in this splendid book all the raw material needed to spark a fresh discussion between the government and the media on how to function under our unique system of government in this ever-evolving information-rich environment.
    [Show full text]
  • Inglorious Snitching: Adrián Lamo, Chelsea Manning and Patriotism
    Inglorious Snitching: Adrián Lamo, Chelsea Manning and Patriotism By Dr. Binoy Kampmark Region: USA Global Research, March 24, 2018 Theme: Intelligence, Law and Justice The hacking community, like poets, tend to be irritable tribesmen and women. Their modus operandi functions on the stab, the enthusiastic penetration of insecure computer systems and mockery. Their role is as much to instruct as it is to disrupt. To that end, such figures cut different forms. There is the lonesome soul finding solace in being a nuisance, or the idealist intent on revealing a compromised state of affairs (those working for Anonymous, by way of example). It was questionable whether Adrián Lamo was of the latter breed. According to his father, Mario, he lacked malice though not initiative. “Everything he did was out of curiosity.” Lamo’s views of his own activities suggested less a case of hacking than finding “different ways of seeing.” Dead at 37 at his Kansas apartment on Wednesday in circumstances that barely struck an interest for most scribblers of the mainstream press, Lamo established his initial claim as one who hacked the Old Gray Lady. In breaking into The New York Times network in 2003, Lamo proceeded to run up $300,000 in data research fees by means of fake usernames, essentially adding himself to the paper’s payroll. Cingular Wireless, Microsoft and Yahoo! were also accessed, the latter being notable for receiving touch-ups and satirical readjustments to news articles. After an 18 month investigation by the FBI, he was subsequently arrested and convicted for computer fraud, spending time in house arrest.
    [Show full text]
  • Wikileaking the Truth About American Unaccountability for Torture Lisa Hajjar University of California—Santa Barbara
    Societies Without Borders Volume 7 | Issue 2 Article 3 2012 Wikileaking the Truth about American Unaccountability for Torture Lisa Hajjar University of California—Santa Barbara Follow this and additional works at: https://scholarlycommons.law.case.edu/swb Part of the Human Rights Law Commons, and the Social and Behavioral Sciences Commons Recommended Citation Hajjar, Lisa. 2012. "Wikileaking the Truth about American Unaccountability for Torture." Societies Without Borders 7 (2): 192-225. Available at: https://scholarlycommons.law.case.edu/swb/vol7/iss2/3 This Article is brought to you for free and open access by the Cross Disciplinary Publications at Case Western Reserve University School of Law Scholarly Commons. It has been accepted for inclusion in Societies Without Borders by an authorized administrator of Case Western Reserve University School of Law Scholarly Commons. Hajjar: Wikileaking the Truth about American Unaccountability for Torture L. Hajjar/Societies Without Borders 7:2 (2012) 192-225 Wikileaking the Truth about American Unaccountability for Torture Lisa Hajjar University of California—Santa Barbara Received September 2011; Accepted March 2012 ______________________________________________________ Abstract. Grave breaches of the Geneva Conventions are international offenses and perpetrators can be prosecuted abroad if accountability is not pursued at home. The US torture policy, instituted by the Bush administration in the context of the “war on terror” presents a contemporary example of liability for gross crimes under international law. For this reason, classification and secrecy have functioned in tandem as a shield to block public knowledge about prosecutable offenses. Keeping such information secret and publicizing deceptive official accounts that contradict the truth are essential to propaganda strategies to sustain American support or apathy about the country’s multiple current wars.
    [Show full text]
  • Wikileaks – Following the Cybertrail
    4/9/11 WikiLeaks – Following the Cybertrail 2011 VT InfraGard WikiLeaks Synposium Dr. Peter Stephenson, CISSP, CISM, FICAF Director, NUCAC-DF and CISO Norwich University A Tail of Digital Forensics and Anti- Forensics The players PFC Bradley Manning Julian Assange Adrian Lamo Kevin Poulsen Glen Greenwald Chet Uber Mark Rasch Kim Zetter Tyler Watkins David Finkel John Cook Ellen Nakashima Numerous other writers and journalists 1 4/9/11 The Timeline in Brief* 2008: U.S. Army Counterintelligence Center prepares a classified report placing WikiLeaks on “the list of the enemies threatening the security of the United States.” That Report discussed ways to destroy WikiLeaks’ reputation and efficacy, and emphasized creating the impression that leaking to it is unsafe. October: Manning enters the Army as a private 2009: November 24: Per chat logs, Manning said he first started working with Wikileaks after release of 9/11 pager messages, which was first announced on November 24, 2009 November 19: Earliest possible day Manning downloaded “Collateral Murder” video & all charges except accessing the Rejkjavik 13 cables, per Charge Sheet (Spec. 2 & 4) November 1: Earliest date for which government subpoenas Wikileaks related twitter accounts October: Manning arrives in Iraq. http://firedoglake.com/bradley-manning-wikileaks-timeline/ 2010: January 21: Manning leaves for US February 11: Manning returns to Baghdad from US February: Manning gives Wikileaks the video of the 2007 Army helicoper attack on Iraqi insurgents, according to Adrian Lamo in the Washington Post February 18 Wilikeaks publishes Rejkjavik cable dated January 13, 2010. According to the Manning/Lamo chat transcripts, after the leak Manning tracked the Northern Europe Diplomatic Security Team tailing Assange in Sweden.
    [Show full text]
  • United States V. Adrian Lamo
    Approved: ____________________________ MARK F. MENDELSOHN Assistant United States Attorney Before: HONORABLE RONALD L. ELLIS United States Magistrate Judge Southern District of New York - - - - - - - - - - - - - - - - - - - - x UNITED STATES OF AMERICA : TO BE FILED UNDER SEAL : : COMPLAINT - v. - : Violations of ADRIAN LAMO, 18 U.S.C. : §§ 1030(a)(5)(A)(ii) and 1029(a)(2) : COUNTY OF OFFENSE: Defendant. : New York - - - - - - - - - - - - - - - - - - - - x SOUTHERN DISTRICT OF NEW YORK, ss.: CHRISTINE A. HOWARD, being duly sworn, deposes and says that she is a Special Agent of the Federal Bureau of Investigation and charges as follows: COUNT ONE 1. From in or about February 2002 through in or about April 2002, in the Southern District of New York and elsewhere, ADRIAN LAMO, the defendant, intentionally accessed a protected computer without authorization and, as a result of such conduct, recklessly caused damage to 1 and more persons during a 1-year period aggregating at least $5,000 in value, to wit, LAMO, without the knowledge or authorization of the New York Times Co., Inc. (the “New York Times”), repeatedly accessed the New York Times’ private intranet, and altered the contents of New York Times databases including a database containing the personal information of contributors to the New York Times’ Op- Ed page, and by such conduct caused a loss resulting in damage to the New York Times in excess of $25,000 during a one-year period. (Title 18, United States Code, Section 1030(a)(5)(A)(ii).) COUNT TWO 2. From in or about February 2002
    [Show full text]
  • Composed by Ted Hearne Libretto by Mark Doten Directed by Daniel Fish
    2014 NEXT WAVE FESTIVAL Brooklyn Academy of Music Alan H. Fishman, Chairman of the Board William I. Campbell, The Vice Chairman of the Board Adam E. Max, Vice Chairman of the Board Karen Brooks Hopkins, President Source Joseph V. Melillo, Executive Producer Composed by Ted Hearne Libretto by Mark Doten Directed by Daniel Fish DATES: OCT 22—25 at 7:30pm LOCATION: BAM Fisher (Fishman Space) RUN TIME: Approx 1hr 15min (no intermission) BAM 2014 Next Wave Festival Sponsor Bloomberg is the Season Sponsor Viacom is the BAM 2014 Music Sponsor Leadership support for music at BAM provided by: Frances Bermanzohn & Alan Roseman Pablo J. Salame #THESOURCE BAM Fisher 2014 NEXT WAVE FESTIVAL ENSEMBLE Nathan Koci Music Director The Conductor/Keyboard Courtney Orlando Violin Anne Lanzilotti Viola Leah Coloff Cello Source Taylor Levine Guitar Greg Chudzik Bass COMPOSER Ron Wiltrout Drums Ted Hearne PRODUCTION TEAM LIBRETTIST Sarah Peterson Production Manager Mark Doten Jason Kaiser Stage Manager Garth MacAleavey Sound Engineer DIRECTOR Gil Sperling Video Engineer Daniel Fish Philip White Vocal Processing Engineer PRODUCTION DESIGNER Jim Findlay PRODUCER BETH MORRISON PROJECTS VIDEO DESIGNERS Beth Morrison Creative Producer Jim Findlay & Daniel Fish Jecca Barry General Manager Noah Stern Weber Associate Producer LIGHTING DESIGER Kat Castle Production and Christopher Kuhl Administrative Intern COSTUME DESIGNER On Video: Terese Wadden Ernest Acosta, Dwayne Adams, Iones- cu-Ocnita Alexandra-Vasilia, Matthew ASSISTANT DIRECTOR Annenberg, Ed Bak, Hwa-Mi Barnett, Ashley Tata Rommel C. Barns, Rachel Bier, Judy Brick Freedman, Gregory Brown, WORLD PREMIERE Richard Francis Burst-Lazarus, Zorelly BAM 2014 NEXT WAVE FESTIVAL Cepeda, Doug Chapman, Thierry OCTOBER 22—25, 2014 Chauvaud, Christina Choe, Michael Christians, Janet D.
    [Show full text]
  • "We Steal Secrets: the Story of Wikileaks"
    Annotated Transcript of "We Steal Secrets" by Alex Gibney 11/2/14, 11:43 PM "We Steal Secrets: The Story of Wikileaks" The annotated transcript 19:00 GMT, May 23, 2013 Click here for the introductory note Note: The title ("We Steal Secrets: The Story TITLES of WikiLeaks") is false. It directly implies that WikiLeaks steals secrets. In fact, the statement is made by former CIA/NSA The film begins with opening credits in faux-digital director Michael Hayden in relation to the typeface against a black screen. activities of US government spies, not in relation to WikiLeaks. This an irresponsible TEXT FOCUS WORLD PRESENTS libel. Not even critics in the film say that WikiLeaks steals secrets. A JIGSAW/GLOBAL PRODUCE PRODUCTION AN ALEX GIBNEY FILM The film cuts to orbital footage of the Earth from a satellite, with occasional visual static interference, overlayed with stock news footage and news chatter about the Galileo launch. STOCK Newsreader: ...Thursday's scheduled launch of the shuttle Atlantis with this payload of radioactive plutonium... http://wikileaks.org/IMG/html/gibney-transcript.html Page 1 of 238 Annotated Transcript of "We Steal Secrets" by Alex Gibney 11/2/14, 11:43 PM Newsreader: ...a legal challenge with NASA worried what's going on in court tomorrow to help the shuttle Atlantis and its Gallileo spacecraft escape by unique... The stock footage gradually takes over, depicting protests at the launch. Placards read "BAN PLUTONIUM IN SPACE" and "NO PLUTONIUM IN MY TOWN." Screen shows footage of Gallileo and Atlantis at the launchpad. Text overlay reads "October 1989".
    [Show full text]