D. 18 Usc § 1030(A)(2) and Its Felony

Total Page:16

File Type:pdf, Size:1020Kb

D. 18 Usc § 1030(A)(2) and Its Felony 120 COMPUTER MISUSE CRIMES CH. 2 IP blocking may be an imperfect barrier to screening out a human being Orin Kerr ! 10/27/2014 2:45 AM who can change his IP address, but it is a real barrier, and a clear signal Deleted: from the computer owner to the person using the IP address that he is Orin Kerr ! 10/27/2014 2:45 AM no longer authorized to access the website. Formatted: Indent: Left: 0", First line: 0" Orin Kerr ! 10/27/2014 2:14 AM Is the District Court correct? Formatted: Text Paragraph Orin Kerr ! 10/30/2014 2:03 AM Formatted: Justified, Line spacing: single D. 18 U.S.C. § 1030(A)(2) AND ITS FELONY Orin Kerr ! 10/30/2014 2:03 AM ENHANCEMENTS Formatted: Font:10.5 pt Orin Kerr ! 10/30/2014 2:03 AM Formatted: Font:10.5 pt, Italic On page 88, at the end of Note 2, add the following: Orin Kerr ! 10/30/2014 2:03 AM Formatted: Font:10.5 pt United States v. Auernheimer, 2012 WL 5389142 (D.N.J. 2012), Orin Kerr ! 10/30/2014 2:03 AM vacated on other grounds, 748 F.3d 525 (3d Cir. 2014), raised an Formatted: Font:10.5 pt, Italic interesting variation on Cioni. In Auernheimer, the government argued Orin Kerr ! 10/30/2014 2:03 AM that a misdemeanor violation of 1030(a)(2) becomes a felony under Formatted: Font:10.5 pt 1030(c)(2)(B)(ii) if the act also violates a state unauthorized access statute. In that instance, the government argued, the offense becomes a Orin Kerr ! 10/27/2014 2:14 AM federal unauthorized access crime in furtherance of a state unauthorized Deleted: access crime. The district court agreed, at least when the state Orin Kerr ! 10/30/2014 2:03 AM unauthorized access includes an extra element that 1030(a)(2) does not Formatted ... [18] have: Orin Kerr ! 10/30/2014 2:03 AM Formatted ... [19] Although there is an overlap of facts for the first two elements of each Orin Kerr ! 10/30/2014 2:10 AM offense, N.J.S.A. 2C:20–31(a) requires the additional component that Formatted ... [20] defendant “knowingly or recklessly discloses or causes to be disclosed Orin Kerr ! 10/30/2014 2:03 AM any data ... or personal identifying information.” Hence, an essential Formatted ... [21] N.J.S.A. 2C:20–31(a) element requires proof of conduct not required Orin Kerr ! 10/30/2014 2:03 AM for a CFAA offense Formatted ... [22] Orin Kerr ! 10/30/2014 2:03 AM 2012 WL 5389142 at *4. Formatted ... [23] On appeal, the defendant argued that the district court had Orin Kerr ! 10/30/2014 2:03 AM misapplied Cioni. According to the defendant, the key question under Formatted ... [24] Cioni was whether the government had charged two different acts, not Orin Kerr ! 10/30/2014 2:03 AM two different statutes. Otherwise, mere overlap with analogous state Formatted ... [25] unauthorized access statutes would transform every 1030(a)(2) Orin Kerr ! 10/30/2014 2:03 AM misdemeanor into a felony. The Third Circuit vacated the defendant’s Formatted ... [26] conviction on venue grounds without reaching the felony enhancement Orin Kerr ! 10/30/2014 2:03 AM issue. If the Third Circuit had reached the issue, how should it have Formatted ... [27] ruled? Orin Kerr ! 10/30/2014 2:03 AM Formatted ... [28] Orin Kerr ! 10/30/2014 2:03 AM Formatted ... [29] CHAPTER 3 TRADITIONAL CRIMES A. ECONOMIC CRIMES 1. PROPERTY CRIMES ————— At the bottom of page 150, add the following new Note 6: 6. In United States v. Agrawal, 726 F.3d 235 (2d Cir. 2013), a quantitative analyst named Agrawal was working at a high-frequency trading group at a company named SocGen in New York City. Agrawal decided to seek employment opportunities elsewhere. In effort to impress prospective employers, Agrawal came into his regular office one day, “printed out more than a thousand pages of [SocGen’s trading] code, put the printed pages into a backpack, and physically transported the papers to his apartment in New Jersey.” During subsequent interviews, Agrawal promised prospective employers that he could replicate the valuable code for them to use to compete against SocGen. As in Aleynikov, Agrawal was charged with violating 18 U.S.C. § 2314 and the EEA. Under the deferential standard of plain error review (applied because Agrawal did not challenge the issue at trial), the Second Circuit the affirmed the conviction for violating 18 U.S.C. § 2314 because Agrawal stole a physical copy of the code: Relying on Aleynikov, Agrawal challenges the legal sufficiency of his NSPA charge, complaining that he too is accused of stealing computer code constituting only intangible property. The argument fails because it ignores Aleynikov’s emphasis on the format in which intellectual property is taken. In Aleynikov, the defendant stole computer code in an intangible form, electronically downloading the code to a server in Germany and then from that server to his own computer. By contrast, Agrawal stole computer code in the tangible form of thousands of sheets of paper, which paper he then transported to his home in New Jersey. This makes all the difference. As Aleynikov explained, a defendant who transfers code electronically never assumes “physical control” over anything tangible. Id. By contrast, a defendant such as Agrawal, who steals papers on which intangible intellectual property is reproduced, 121 122 TRADITIONAL CRIMES CH. 3 does assume physical control over something tangible as is necessary for the item to be a ‘good’ for purposes of the NSPA. Here, Agrawal produced paper copies of SocGen’s computer code in the company’s office, on its paper and with its equipment. The fact that the code had been in an intangible form before Agrawal, a SocGen employee, himself reproduced it on company paper is irrelevant. The papers belonged to SocGen, not Agrawal. When Agrawal removed this tangible property from SocGen’s offices without authorization, and transported it to his home in New Jersey, he was engaged in the theft or conversion of a “good” in violation of the NSPA. 2. THE ECONOMIC ESPIONAGE ACT ————— On page 160, at the middle of the page, add the following new Note 4: 4. The significance of Aleynikov was significantly undercut by the Second Circuit’s subsequent decision in United States v. Agrawal, 726 F.3d 235 (2d Cir. 2013). Agrawal was working at a high-frequency trading group at SocGen when he decided to seek employment opportunities elsewhere. Agrawal came into his SocGen office, “printed out more than a thousand pages of [SocGen’s trading] code, put the printed pages into a backpack, and physically transported the papers to his apartment in New Jersey.” Agrawal then promised prospective employers that he could replicate the valuable SocGen code he had taken for them to use. Somewhat surprisingly, at least in light of Aleynikov, the Second Circuit held that this conduct violated the EEA and was distinguishable from Aleynikov: As to the EEA charge, in this case, neither the indictment nor the prosecution’s arguments or the court’s charge identified SocGen’s confidential HFT systems as the “product” relied on to satisfy the crime’s jurisdictional element. Rather, the record indicates that the relevant product was the publicly traded securities bought and sold by SocGen using its HFT systems. In United States v. Aleynikov, this court construed the phrase “a product that is produced for or placed in interstate or foreign commerce” as a “limitation” on the scope of the EEA, signaling that Congress did not intend to invoke its full Commerce Clause power to criminalize the theft of trade secrets. Aleynikov explained that for a product to be “placed in” commerce, it must have “already been introduced into the stream of commerce and have reached the marketplace.” Products “being developed or readied for the marketplace” qualified “as being ‘produced for,’ if not yet actually ‘placed in,’ commerce.” But a “product” could not be deemed “produced for” commerce simply because its “purpose is to facilitate or engage in such commerce”; such a construction of the EEA’s SEC. A ECONOMIC CRIMES 123 product requirement would deprive the statutory language of any limiting effect. Aleynikov’s construction of the phrase “a product that is produced for or placed in interstate commerce” controls on this appeal. We note, however, that the reversal of Aleynikov’s EEA conviction was based on the application of that phrase to the particular “product” that was the basis of the jurisdictional allegation in his case. As we explain below, the present case was submitted to the jury on a very different product theory than that relied on in Aleynikov. Thus, the same construction that prompted reversal in Aleynikov leads to affirmance here. In Aleynikov, the EEA charge was submitted to the jury on the theory that the trade secret converted by the defendant, i.e., the proprietary computer code, was “included in” a single product: Goldman Sachs’s confidential trading system. The jury instructions in Aleynikov unambiguously stated that “[t]he indictment [in that case] charges that the Goldman Sachs high-frequency trading platform is a product,” and that the jury’s responsibility was to “determin[e] whether the trading platform was produced for or placed in interstate or foreign commerce.” This had been the court’s and the parties’ understanding of the Aleynikov indictment from the start. In its opinion denying the defendant’s motion to dismiss the indictment, the court noted the parties’ agreement “that the trade secret at issue in [the EEA Count] is the source code, and that the relevant ‘product’ is the Trading System.” United States v.
Recommended publications
  • Identitarian Movement
    Identitarian movement The identitarian movement (otherwise known as Identitarianism) is a European and North American[2][3][4][5] white nationalist[5][6][7] movement originating in France. The identitarians began as a youth movement deriving from the French Nouvelle Droite (New Right) Génération Identitaire and the anti-Zionist and National Bolshevik Unité Radicale. Although initially the youth wing of the anti- immigration and nativist Bloc Identitaire, it has taken on its own identity and is largely classified as a separate entity altogether.[8] The movement is a part of the counter-jihad movement,[9] with many in it believing in the white genocide conspiracy theory.[10][11] It also supports the concept of a "Europe of 100 flags".[12] The movement has also been described as being a part of the global alt-right.[13][14][15] Lambda, the symbol of the Identitarian movement; intended to commemorate the Battle of Thermopylae[1] Contents Geography In Europe In North America Links to violence and neo-Nazism References Further reading External links Geography In Europe The main Identitarian youth movement is Génération identitaire in France, a youth wing of the Bloc identitaire party. In Sweden, identitarianism has been promoted by a now inactive organisation Nordiska förbundet which initiated the online encyclopedia Metapedia.[16] It then mobilised a number of "independent activist groups" similar to their French counterparts, among them Reaktion Östergötland and Identitet Väst, who performed a number of political actions, marked by a certain
    [Show full text]
  • Extensions of Remarks E881 EXTENSIONS of REMARKS
    May 19, 2006 CONGRESSIONAL RECORD — Extensions of Remarks E881 EXTENSIONS OF REMARKS RECOGNIZING NICHOLAS GIGLIO They completed their first marathon, in 1981 still pending—the Migratory Bird program has FOR ACHIEVING THE RANK OF in Boston. Four years later, they competed in done an excellent job of matching public funds EAGLE SCOUT a triathlon, for which Dick had to not only learn with private donations. In fact, this program how to swim, but then do so in the race with has brought in more than $60 million in private HON. SAM GRAVES a small boat tied to his waist with which he sector funds to protect and restore habitat, to OF MISSOURI pulled Rick. study species declines, to provide technical While continuing to race, Rick also furthered assistance, and to encourage public-private IN THE HOUSE OF REPRESENTATIVES his education. In 1993, Rick graduated from and international partnerships. Thursday, May 18, 2006 Boston University with a degree in Special Mr. KIND’s legislation will enable the Interior Mr. GRAVES. Mr. Speaker, I proudly pause Education. Department to continue providing this much- to recognize Nicholas Giglio, a very special Today the Hoyts have completed 206 needed funding to conservation efforts both in young man who has exemplified the finest triathlons, 20 Duathlons, 64 marathons, and the United States and throughout the Amer- qualities of citizenship and leadership by tak- over 500 other races. They have biked across icas. He has done an excellent job shep- ing an active part in the Boy Scouts of Amer- New England and America. Their best time for herding this bill through the House, and I am ica, Troop 98, and in earning the most pres- a marathon, running together with Dick push- hopeful that the Act will soon be reauthorized.
    [Show full text]
  • Extensions of Remarks E903 HON. LORETTA SANCHEZ HON. JON C
    CONGRESSIONAL RECORD — Extensions of Remarks E903 social support family, immigration, health, RECOGNIZING ETHAN STOCKDALE PERSONAL EXPLANATION housing, legal, emergency shelter, child care, FOR ACHIEVING THE RANK OF education, employment, cultural, citizenship EAGLE SCOUT and youth services. She also said that, this HON. NANCY L. JOHNSON gathering of the finest women and men in OF CONNECTICUT our community allows us the opportunity to HON. SAM GRAVES IN THE HOUSE OF REPRESENTATIVES recognize the outstanding services and ac- Friday, May 19, 2006 complishments of outstanding members of OF MISSOURI Mrs. JOHNSON of Connecticut. Mr. Speak- our community. IN THE HOUSE OF REPRESENTATIVES They deserve our best wishes and con- er, on rollcall No. 172 I was unavoidably de- gratulations. In addition to Dr. Mason, other Friday, May 19, 2006 tained. Had I been present, I would have awardees include: Club El Pacifico, Inc., Ms. voted ‘‘aye.’’ Mr. GRAVES. Mr. Speaker, I proudly pause Petrona Pet Honeywell, Ms. Gloria A. Spen- f cer Morgan, The Rev. Frank Elcock and Mr. to recognize Ethan Stockdale, a very special William Ben Townsend. young man who has exemplified the finest PAYING TRIBUTE TO JAMES f qualities of citizenship and leadership by tak- KELLY ing an active part in the Boy Scouts of Amer- IN RECOGNITION OF THE 45TH AN- ica, Troop 98, and in earning the most pres- HON. JON C. PORTER NIVERSARY OF THE PEACE tigious award of Eagle Scout. OF NEVADA CORPS Ethan has been very active with his troop, IN THE HOUSE OF REPRESENTATIVES participating in many scout activities. Over the Friday, May 19, 2006 HON.
    [Show full text]
  • The American Militia Phenomenon: a Psychological
    THE AMERICAN MILITIA PHENOMENON: A PSYCHOLOGICAL PROFILE OF MILITANT THEOCRACIES ____________ A Thesis Presented to the Faculty of California State University, Chico ____________ In Partial Fulfillment of the Requirements for the Degree Master of Arts in Political Science ____________ by © Theodore C. Allen 2009 Summer 2009 PUBLICATION RIGHTS No portion of this thesis may be reprinted or reproduced in any manner unacceptable to the usual copyright restrictions without the written permission of the author. iii TABLE OF CONTENTS PAGE Publication Rights ...................................................................................................... iii Abstract....................................................................................................................... vi CHAPTER I. Introduction.............................................................................................. 1 II. Literature Review of the Modern Militia Phenomenon ........................... 11 Government Sources .................................................................... 11 Historical and Scholarly Works.................................................... 13 Popular Media .............................................................................. 18 III. The History of the Militia in America...................................................... 23 The Nexus Between Religion and Race ....................................... 28 Jefferson’s Wall of Separation ..................................................... 31 Revolution and the Church..........................................................
    [Show full text]
  • ADL Backgrounder on Larry Darby
    ADL Backgrounder on Larry Darby Larry Darby, who openly declared his white supremacist and anti-Semitic views, lost his bid to become the Democratic candidate for Alabama attorney general in the primary election held on June 6, 2006. According to reports, Darby received about 44 percent of the vote -- a disturbing turnout for a candidate who recently spoke at a meeting of a neo-Nazi group and denied that the Holocaust ever took place. In 2002, Darby ran for the same office as a Libertarian Party candidate but dropped out of the race before the election. Who is Larry Darby? Darby is the founder, general counsel and former president of the Atheist Law Center based in Montgomery, Alabama. An anti-Semite and outspoken Holocaust denier, Darby claims that no more than 140,000 Jews died in Europe during World War II and that most of them died of typhus. He also asserts that the figure of 6 million Jews killed during World War II is part of the "Holocaust industry," and that there is no evidence of a mass extermination of Jews during that time. Meetings with Holocaust Deniers and Racists In July 2005 Darby organized a meeting where noted Holocaust denier DaDaDaDavidvidvidvid IrIrIrIrvinvinvinvingggg was the keynote speaker. Regarding Irving, Darby stated in January 2006: "Irving's findings are counter to the government-sanctioned version of what is called the Holocaust. The Holocaust has evolved into a religious industry with 1 / 4 sacred precepts that are examined only under the penalty of law. Free speech is anathema to the Holocaust industry." On May 13, 2006, Darby attended a closed meeting of the New Jersey unit of the neo-Nazi National Vanguard, which claims him as a member.
    [Show full text]
  • United States of America V. Hal Turner, Criminal Complaint
    AO 91 (REV.5/85) Criminal Complaint AUSA William Ridgway (312) 469-6233 W444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444444 UNITED STATES DISTRICT COURT NORTHERN DISTRICT OF ILLINOIS EASTERN DIVISION UNITED STATES OF AMERICA CRIMINAL COMPLAINT v. CASE NUMBER: HAL TURNER I, the undersigned complainant, being duly sworn on oath, state that the following is true and correct to the best of my knowledge and belief: On or about June 2, 2009, and June 3, 2009, in the Northern District of Illinois, Eastern Division, and elsewhere, HAL TURNER, defendant herein: threatened to assault and murder three United States judges with intent to retaliate against such judges on account of the performance of official duties; in violation of Title 18, United States Code, Section 115(a)(1)(B). I further state that I am a Special Agent with the Federal Bureau of Investigation, and that this complaint is based on the facts contained in the Affidavit which is attached hereto and incorporated herein. Signature of Complainant John Marsh Special Agent, Federal Bureau of Investigation Sworn to before me and subscribed in my presence, June 24, 2009 at Chicago, Illinois Date City and State MARTIN C. ASHMAN, U.S. Magistrate Judge Name & Title of Judicial Officer Signature of Judicial Officer UNITED STATES DISTRICT COURT ) )ss NORTHERN DISTRICT OF ILLINOIS ) AFFIDAVIT I, John Marsh, being duly sworn, state as follows: 1. I am a Special Agent with the Federal Bureau of Investigation, and have been so employed for almost three years. My current responsibilities include the investigation of violent crimes, including, among others, kidnaping, bank robbery, and the apprehension of violent fugitives.
    [Show full text]
  • 0525 Weekly Briefing
    Virality Project Weekly Briefing #22 May 18, 2021 - May 25, 2021 This report was created by analysts from the Virality Project, a coalition of research entities focused on real-time detection, analysis, and response to COVID-19 anti-vaccine mis- and disinformation. The Virality Project supports information exchange between public health officials, government, and social media platforms through weekly briefings and real-time incident response. Public officials and health organizations interested in officially joining this collaboration can reach the partnership at [email protected]. In this briefing: Events This Week ● CDC investigation of potential instances of post-vaccination myocarditis increases backlash against vaccines for children ● Senator Rand Paul refuses to get the COVID-19 vaccine, spurring circulation of the medical freedom narrative in right-wing media ● Schools across the US debate student vaccination mandate ahead of fall 2021 ● Proposed Oregon legislation about parental consent for vaccines exacerbates confusion as vaccine rollout extends to younger age groups ● Conspiracy theory that Moderna vaccine contains ‘toxic chemical’ SM-102 used to push safety concerns ● False claims that vaccines contain microchips and magnets multiply after Columbia University announces its creation of an injectable microchip Non-English Language ● Viral magnet videos popular in English now appearing in Spanish and Foreign Spotlight Ongoing Themes and ● Repeat Offender: Project Veritas new video “exposing” Tactics Facebook’s efforts
    [Show full text]
  • Obama, Gay, Blackmail -- Rezko, Fitzgerald, Blagojevich
    Obama, gay, blackmail -- Rezko, Fitzgerald, Blagojevich NewsFollowUp.com Obama CIA pictorial index search sitemap home .... OBAMA TOP 10 FRAUD .... Influence, Power News for the 99% Obama Groomed for 30 years by Ford Foundation ...................................Refresh F5...archive and Trilateral Commission and CIA to become home President 50th Anniversary of JFK assassination "Event of a Lifetime" at the Fess Parker Double Tree Inn. JFKSantaBarbara. NFU MOST ACTIVE PA Go to Alphabetic list Obama Gay, Chicago Academic Freedom Conference Bush Neocon Pedophile Index Obama Death List Rothschild Timeline Rothschild Research Sources Bush / Clinton Body Count Reagan, Clinton, Bush Crime Families DeLauro / Turtin, Obama body count Ban ki Moon, Sun Myung Moon = go to other NFU pages http://www.newsfollowup.com/influence_gen.htm[5/28/2014 3:07:19 PM] Obama, gay, blackmail -- Rezko, Fitzgerald, Blagojevich WayneMadsen Report has been told that Emanuel was aware of the damaging nature of the "thousands" of FBI intercepted phone calls to him and Obama and wanted to divert Fitzgerald and the FBI away from he and the president-elect to Blagojevich and Harris. Fitzgerald, known as the man who covered up key elements of the 1993 World Trade Center bombing and saw to it that the legal ground was laid for a commutation of the prison sentence of Dick Cheney’s chief of staff Scooter Libby in the Bush administration’s cover-up of the outing by the media of CIA non-official cover agent Valerie Plame Wilson, decided to seek authorization for the early morning arrest of Blagojevich to protect Obama and Emanuel, as well as Bush.
    [Show full text]
  • From Indymedia to Anonymous: Rethinking Action and Identity in Digital Cultures
    View metadata, citation and similar papers at core.ac.uk brought to you by CORE provided by Middlesex University Research Repository From Indymedia to Anonymous: rethinking action and identity in digital cultures To cite this article: Kevin McDonald (2015): From Indymedia to Anonymous: rethinking action and identity in digital cultures, Information, Communication & Society, 18, 8, pp. 968-982, DOI: 10.1080/1369118X.2015.1039561 To link to this article: http://dx.doi.org/10.1080/1369118X.2015.1039561 Kevin McDonald Middlesex University, London [email protected] Keywords: Anonymous, digital networking, social movements, transparency, information society, connective action, digital culture Beyond collective identity and networks The period following the mobilizations of 2011 – the Arab Spring, the Indignados movement in Spain, and Occupy Wall Street – has seen a new focus on the relationship between emerging practices of digital communications and emerging forms of collaborative action or movement. This has prompted new disciplinary encounters, as scholars working on social movements and collective action have begun to focus much more on the significance of communication processes. Within dominant approaches to social movement studies this represents a significant shift, to that the extent that the study of social movements has historically not attached a great significance to communication processes, which have been essentially understood within a ‘broadcasting’ paradigm, where collective actors ‘display’ their ‘worthiness, unity, numbers and commitment’ (Guini, McAdam & Tilly, 1999), principally by ‘occupy[ing] public space… to disrupt routines and gain media attention’ (Tilly & Tarrow, 2005 p. 20). This approach to social mobilization underlined the critical importance of ‘the shared definition of a group’ (Taylor & Whittier, 1992, p.
    [Show full text]
  • American Renaissance There Is Not a Truth Existing Which I Fear Or Would Wish Unknown to the Whole World
    American Renaissance There is not a truth existing which I fear or would wish unknown to the whole world. — Thomas Jefferson Vol. 18 No. 7 July 2007 The Knoxville Horror The crime and the media what sometimes amounted to a news and took them in the 4-Runner to a run- blackout—is based on documents filed down rental house at 2316 Chipman blackout. in federal and state courts, and on some- Street in black East Knoxville, where Mr. times vague and contradictory press re- Cobbins and Mr. Davidson lived. Mr. by Nicholas Stix ports. Cobbins’s 18-year-old girlfriend, Vanes- Sometime after midnight, Miss Chris- sa Coleman, met them there. n Saturday, January 6, 2007 tian and Mr. Newsom were in the park- All four, including Miss Coleman, Channon Christian, 21, and ing lot of Knoxville’s Washington Ridge then engaged in an orgy of rape and vio- O Christopher Newsom, 23, of apartment complex, where they were lence. They anally gang-raped Mr. Knoxville, Tennessee, went on a date visiting friends. Letalvis Cobbins, 24, Newsom, and orally, anally, and vagi- from which they would never return. along with his brother Lemaricus nally gang-raped Channon Christian. Outside the home of They brutally beat another couple they both victims and were visiting, they poured cleaning were carjacked and fluid down Miss kidnapped. Over the Christian’s throat. next 24 hours they They killed Mr. were beaten, gang- Newsom, leaving raped, tortured and him with “multiple murdered. gunshot wounds,” There can be and set his corpse little doubt that if on fire.
    [Show full text]
  • The Hate Directory
    The Hate Directory Compiled by Raymond A. Franklin Forward corrections and additions to: Raymond A. Franklin P.O. Box 121 Woodstock, MD 21163-0121 [email protected] Hate Groups on the Internet: Publication date: Web Sites (WWW) September 1, 2006 File Archives (FTP) Racist Weblogs (Blogs) and Blog Services Release 10.2 Mailing Lists (LISTSERV) Newsgroups (USENET) Internet Relay Chat (IRC) Yahoo Clubs, Yahoo Groups and MSN Groups Racist Web Rings Racist Games Available on the Internet Racialist Friendly Web Hosting Services Copyright 1996-2006 Directory of Groups Combatting Hate on the Net All Rights Reserved PREFACE The Hate Directory is maintained and presented as an aid in identifying and tracking the proliferation of hate oriented use of the Internet and other new electronic media. The Directory is an historical document as well as a current reference, and includes current sites as well as those no longer in operation. CRITERION STATEMENT Included are Internet sites of individuals and groups that, in the opinion of the author, advocate violence against, separation from, defamation of, deception about, or hostility toward others based upon race, religion, ethnicity, gender or sexual orientation. ELECTRONIC EDITION An interactive version of The Hate Directory is available on the World Wide Web at www.hatedirectory.com. COMMENTS Your assistance is appreciated. Please forward information regarding additional sites, errors and changes to [email protected] or the postal address above. Information regarding the value of this
    [Show full text]
  • Anonymous Operations and Techniques
    Anonymous Operations and Techniques The story of Anonymous: How to go from ultra-coordinated motherfuckery to uncoordinated dumbfuckery in less than 3 years Speaker Introduction •Flanvel •Viz The Beginning • 2003-2006 • 4chan 2006-2007 • Habbo raids • July 6th 2006 • THE POOL IS CLOSED • Hao’s moderators were racial profiling dark-skinned avatars • Habbo Hotel raided by blockading entrances of popular areas • Exploiting a technical issue that ould’t allow avatars to walk through each other when entering and exiting premises. 2006-2007 • Harold Charles "Hal" Turner (born March 15, 1962) is an American white nationalist, Holocaust denier and blogger from North Bergen, New Jersey. • Turner claimed that in December 2006 and January Anonymous took Turner's website offline, costing him thousands of dollars in bandwidth bills. • Turner sued 4chan and other websites for copyright infringement. • Turner failed to respond and the judge dismissed the case in December 2007. 2006-2007 • Chris Forcand arrest • Members of Anonymous had been researching Forcand and had posted online several chatlogs. • Pretended to be under aged girls, most notably a supposed 13 year old named Jessica. • The conversations were forwarded to the members of his church. • Toronto PD arrested him on December 5, 2007 after an undercover investigation. • Charged with two counts of luring a child under the age of 14, attempt to invite sexual touching, attempted exposure, possessing a dangerous weapon, and carrying a concealed weapon. 2008 • Project Chanology (Operation Chanology) was a protest movement against the practices of the Church of Scientology • Response to the Church of Scientology's attempts to remove material from a highly publicized interview with Tom Cruise from the Internet.
    [Show full text]