Xx No Duplication Fee X Xx for This Page Xx XAXAKAKKAKAKAKAKKKMKKKAKKKK

Total Page:16

File Type:pdf, Size:1020Kb

Xx No Duplication Fee X Xx for This Page Xx XAXAKAKKAKAKAKAKKKMKKKAKKKK FEDKRAL BUREAU OF INVESTIGATION FOI/PA DELETED PAGE INFORMATION SHEET FOI/PA# 1468393-0 Total Deleted Page(s) = 2 Page 75 ~ b6; b7C; Page 76 ~ b6; b7C; XAXAKAKKAKAKAKAKKKMKKKAKKKK Xx Deleted Page(s) Xx Xx No Duplication Fee X Xx For this Page Xx XAXAKAKKAKAKAKAKKKMKKKAKKKK ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED DATE O4-20-20le BY 60322 UCLPYSPFLUSIN oe FD-340a (Rev, 1-27-03) 7 Date To bereturned ae eereaeees peedrereamet ‘A ae ee 8 « re * eee ae: EpeRAncaRAND. ae : ey .e wea TyMENEPA asonySUREORIA. A pheeeple A ad ineeam ane len ee aaee ene ae ee ch C Cc : FD-340 (Rev. 4-11-03) File Number 2EKh-LA~ 2496i“ — [ /t ( . oe . a ALL INFORMATION CONTAINED Field Office Acquiring Evidence | fy HEREIN TS UNCLASSIFIED gS DATE 04-20-20le BY 60322 UCLPSFLI SIN Serial # of Originating Document ‘ Date Received ¥ } al0g * From (Name of Contributor/Interviewee, . be Address) (City and State) . By ‘ To Be Returned (C] Yes Sooe ‘ Receipt Given C Yes No Grand Jury Material - Disseminate Only Pursuantto Rule6 (e) Federal Rules of Criminal Procedurex. C) Yes ° No Federal Taxpayer Information (FTI) a C) ves No Title:“tls UNSo BYsY(5% Zs, bel _ set Mw CowSto 057 “ON Comyer Bayles DOV he Reference: Sobfox Lio, | (Communication Eachsing Material) Description: [Originalnotesre interview of C-rru| Leon” RE: Subpoena No. CCS-0802247-A Page 1 of 3 RE: Subpoena No. CCS-0802247-A Sent: Tuesday, February 19, 2008 9:11 AM To: Thanks for appearing on my behalf. PST removed — newzip available at http://isdev.quinnipiac.edu/tools/filetransfer/pickup/nkeptipizr | do not have additional info unless youfind that something is missing or need additionalfiles. vir, information Security Officer ALL INFORMATION CONTAINED Director of Information Security and Network Operations HEREIN Is UNCLASSIFIED DATE 04-20-2012 BY 60322 UCLPYPLI/IN Quinnipi iversi www.Quinnipiac.edu From; Sent: luesdav February 19, 2008 10:56 AM To: Subject: RE: Subpoena No. CCS-0802247-A L pre Thank you for the information. I have not yet looked at the files, but if you still need to provide information you can either burnit to a CD/DVD or emailit to me at this address, which everis easier for you. Also, before I lookatthefiles in the link, could you please remove the outlookpstfile. I assume that is email. Email is outside the scope of the subpoena. I can only view the email content with a search warrant. One exceptionto this is if you or the IT departmentis a party to the email (to/from/cc) and you are voluntarily turning it over to me, otherwise I can notview it. Because you provided the materials to me, you will not have to appearin front of the Grand Jury. If necessary, I can appear and saythis is what was provided. Thank you, sf Tel: Fax https://www.324mail.com/OWA/?ae=Item&t=IPM.Note&id=RgAAAACIGgwuXsHaS4x... 2/19/2008 RE: Subpoena No. CCS-0802247-A Page 2 of 3 From4 . Sent: Tuesday, February 19, 2008 7:35 AM be To: b7C Subject: Subpoena No. CCS-0802247-A [| Received subpoenas. Will e-mail suffice for transfer or can | burn to CD/DVD and Fed-ex? Firewall logs alone would need over 50 3.5 inch floppies. Also whenwilll knowif I’m required to appearor if Grand Jury will except you providing logs? Hereis a link to pick up files. b3 The call logs are from Our Absolute contactinfo below - | iL] | "| Absolute SoftwareInc., a be! . ‘Regional Recovery ManagerLawEnfor... pwww.absoluté:com: i | have also copied thd = Hardwaredetails: Name Value b3 Local IP Proxy IP Network Card 1 Description Network Card 1 . MAC Address Network Card 14 IP Network Card 2 https:/Awww.324mail.com/OWA/?ae=Item&t=IPM.Note&id=RgAAAACIGgwuXsHaS4x... 2/19/2008 RE: Subpoena No. CCS-0802247-A Page 3 of 3 Description Network Card 2 MAC Address Network Card 2 IP [| cissp, cism, MSA bé Information Security Officer Director of Information Security and Network Operations Quinnipiac University Office Mobile Fax 20 . www.Quinnipiac.edu ee aeteeare ce https:/Awww.324mail.com/OWA/?ae=Item&t=IPM.Note&id=RgAAAACIGgwuXsHaS4x... 2/19/2008 C C) FD-340 (Rev.4-11-03) A / 4 Co ~. +o. x _ 2 2 - ——~ > , File Number * 8 L A N95 gi @ - ° Field Office Acquiring Evidence _ te fh Serial # of Originating Document __. | | _ Date Received 3 [3 TX +. From ‘(Nameof Contributor/Interviewee) (Address) By ALL INFORMATION CONTAINED To BeRetumed C) Yes EYNo HEREIN IS UNCLASSIFIED Receipt Given 0. Yes LE-No. DATE 04-20-2012 BY 60322 UCLPeYPLY sgh nd Grand Jury Material -"Disseminate Only Pursuant to Rule 6 (e) Federal Rules of CriminalProcedure C] Yes «(4 No Federal Taxpayer Information (FTI) _ CO Yes cr No TOLOGY —yrcImEm CWoRM OF SERV “Ets: Comput06 Eb Reference: ‘33. r= (Communication Encbsing Material), Description: WYovina notes re interview of chr Stybee VV. EEE oe| L ALL INFORMATION CONTATHED b7C _ __PATEHEREIN04-20-2012IS UNCLASSIFIEDBY 60322 UCLP/PLU/IM pldene,_tenpule wet oe veutLip OL ae “By Pst Aoece Irelf toldavertYrechore. _ ue Stub |could roa less. Guhy . ; 7.en Sst!lomacls Cor? _w__ ehMiwh les 0 he os : ' » t i “30wee - e er A . 0 . pices als oe “~— ge a ee* ates | T r0340 Rev.3-8-01) ay «{ A 8 : Universal Case File Number LIC:At“Lh“oAgTETCa= | Field‘Office Acquiring Evidence Z- LSKA + i Serial # of Originating Document a “ | - Date Received ‘ JAS/d. , & , i * From _ . yan £00 in tor) ' . be . \ b7 ‘ (Ad Ip yutor) . “ Ae ; “t : By “TSA , ~ pe ToBeRetumed [] Yes No . Receipt Given [[] Yes No | Grand Jury Material - Disseminate Only Pursuantto Rule 6 (e) ce J Federal Rules of Criminal Procedure ¥ r ALL INFORMATION CONTAINED [1 Yes E}No HEREIN IS UMCLASSIFIED PT Federal Taxpayer Information (FTI) - DATE 04-20-2012 BY 60322 UCLPYPLI/dM Cys “ Etoxe , tows.- x Title: LWwseBQ) EY OhuRt OF SCERTO loop Metra Cinpufer. arrester Reference: LO £G2 wh fF. , (Communication Enclosing Material) ° | + B Description: Srisnat notes interview of ne ' prc ~ 5 = an ss f rN L ‘S \ \\ .=. \ \ be ae” LELL, aaa = . reer =““LLL INFORMATION CONTAINED Ale —— HEREIN IS UNCLASSIFIED LLGG,.. : peeJATE O4-20-201le BY 60322 UCLP/SFLI/J——___..- ss 4 ayrac er Gee Gon Bae? PadGen an4 a 2 affix, las lee hi/ L _ 7 Ze fastelle592. Mig. | Pay £2.fecele CE 7 | YLEL. Ladle< Mia...atte, | fleiléhlthes - - Bis HZaaTon JOG Sol Aiiclaeks heOS. yy 6OLdow lite Lal. pwc LPpelos. cl pire. SpAL.Gez< Snlee Lhe:ae Me(a. Lie oieral PCASVED2, I. CAE. fitzless La LEE. Loewbas Ae Wed (tl Keen. tet Sea Lienln<Z Boy Abt (yan hnke| tel creop Dalen. had a Taz. bak apol Maelad! lbpDBE — Tipe lane ZL eke.beieee ellen WaSE. Lf atpe MULLS dlPpapf.Ez| pileWhe _d (age. Alc, peble wee) Siple AGS. ad Bitfe.clewthfowls LE [Zee he fale til. QitiyihteScleShit Metel Mes penphetea= MS atanuat ‘ | MOTEK a ae Hq __ Teasce.i‘fining. 2. Zoll 3 eT NREOF * —_ t (~ ' ee . C) bé . ere “4 b7c FD-340 (Rev. 4-11-03) - }AA 4 File Number Z YIALA -ZY9 8/6 os ~ Field Office Acquiring Evidence 0 MM Serial # of Originating Document Date:Received OFT {7 208 From _ - 7 (Address) /. m- To Be Returned [1 Yes [EE-No J . Receipt Given [1 Yes IY’no GrandJury Material - Disseminate Only Purstiant to Rule 6 (e) ey Federal Rules of Criminal Procedure ALL INFORMATION CONTAINED Cl Yes CXNo HEREIN IS UNCLASSIFIED Federal Taxpayer Information (FTI) DATE 04-20-2012 BY 60322 UCLP/FLI/IN * [] Yes a UR EULCS- , A ChA/CCH OE SUC% VOLnwry Witr~ Reference: FD-R2clteA P/OB_ (Communication Encksing Material) BS netoinol nator vo intoruioal “¢ Lvl” aL. eatersa ° anetteoe 4 ~— a YR bé { b7c a — ' “Tf ° =m _ - a _ an = = = = ne ” —“ALL INFORMATION CONTAINED : A _ HEREIN 13 UNCLASSIFIED _. ee ; _ DATE 04-20-2012 BY 60322 UCLP/PLI/IN : _ oe ee ~1— . oe - _ : Len. £hun Be eV_ Penns — | eee Speen = ccemeainninn contre Nrfe_. ee - _ ~ LLC,vf Abn.229. Seya tes Sean 02yen vofens __ La A41gre . ~~ _ . Fee a we ena finatLentLW.96 erashid Qypda At» ee li Lg CAF Clery pave Aol Fa EigTigeeLEDSte 0g Rnandnna theedbsIna fre CB I pe tool! hwjpop (hence fren 18st ll Bal dl hrLrntfAA pret vp aetde/ _ Qa.Aan,“a ewChat,wlPntLtoes - gp 7 wpe _ abecetylbs poten __ [etniemt Ad [FE ee : ieSsPomoye “| Ceee[5fet AS Mew “fipek roo re fed ee ueLOWS pore *CANe peeked], (leWEEP fasinaTs Avcssd Crt40. Jedoops— (hesfooODA (aE goaOS Cy “ | ChaneantincleZ vd LZ 0 J D6 bIc aisaereees T ” ~ FD-340 (Rey, 4-11-03) File Number 246i -LA- py4gig ~~ Field Office Acquiring Evidence L A Serial # of Originating Document Date Received g l 31 From (Name of Contributor/Interviewee) (Address) ° (City andState) By 3 f To Be Retumed (1 Yes No ‘ Receipt Given Oo Yes [INo ‘ ; Grand Jury Material - Disseminate Only Pursuantto Rule 6 (e) eR, « Federal Rules of Criminal Proceduré wo‘ 3 C1 yes [1No ALL INFORMATION CONTAINED Federal Taxpayer Information (FTI) : HEREIN IS UNCLASSIFIED DATE O4-20-20le BY 60322 UCLF/SPLI/IN ‘ Yes No ‘ : Title; UNSURLS Chucl, ou S tM blog wav) setin. (on Je TAs 00°CH Reference: . (Communica: tion Enchsing Material} Description: CHorigina notes re interview of tenn cee Re 8 eS Retr Pere nobok et ReeneWheby— dtl neaAles ee antag | aAG. AW as ef Ltdban endas} eStuvtalesSpjes =aghtyLas..Mest aSO)VB Ned5.-closas,hg — ato2Roce Stable ahh _dleegs|- oely/ttvel0 land wean "ALL INFORMATION CONTAINED HEREIN IS UNCLASSIFIED “TATE Q4-20-2012 BY 60322 UCLP¢FLI/IN™ = ote FD-340 (Rev.
Recommended publications
  • The Miscavige Legal Statements: a Study in Perjury, Lies and Misdirection
    SPEAKING OUT ABOUT ORGANIZED SCIENTOLOGY ~ The Collected Works of L. H. Brennan ~ Volume 1 The Miscavige Legal Statements: A Study in Perjury, Lies and Misdirection Written by Larry Brennan [Edited & Compiled by Anonymous w/ <3] Originally posted on: Operation Clambake Message board WhyWeProtest.net Activism Forum The Ex-scientologist Forum 2006 - 2009 Page 1 of 76 Table of Contents Preface: The Real Power in Scientology - Miscavige's Lies ...................................................... 3 Introduction to Scientology COB Public Record Analysis....................................................... 12 David Miscavige’s Statement #1 .............................................................................................. 14 David Miscavige’s Statement #2 .............................................................................................. 16 David Miscavige’s Statement #3 .............................................................................................. 20 David Miscavige’s Statement #4 .............................................................................................. 21 David Miscavige’s Statement #5 .............................................................................................. 24 David Miscavige’s Statement #6 .............................................................................................. 27 David Miscavige’s Statement #7 .............................................................................................. 29 David Miscavige’s Statement #8 .............................................................................................
    [Show full text]
  • In the State Court of Dekalb County State of Georgia
    IN THE STATE COURT OF DEKALB COUNTY STATE OF GEORGIA PATRICK C. DESMOND, MARY C. DESMOND, Individually, and MARY C. § DESMOND, as Administratrix of the Estate § of PATRICK W. DESMOND § § Plaintiffs, § v. ? Civil Action File No: 10A28641-2 NARCONON OF GEORGIA, INC., NARCONON INTERNATIONAL, DELGADO DEVELOPMENT, INC., SOVEREIGN PLACE, LLC, SOVEREIGN PLACE APARTMENT MANAGEMENT, INC., LISA CAROLINA ROBBINS, M.D., and THE ROBBINS GROUP, INC. Defendants. DEFENDANT NARCONON OF GEORGIA, INC.'S RESPONSE TO PLAINTIFFS' CONSOLIDATED MOTION, MEMORANDUM AND SUPPLEMENTAL MEMORANDUM TO UNSEAL DOCUMENTS COMES NOW, Narconon of Georgia, Inc. ("Defendant") in the above styled civil action and files its Response to Plaintiffs' Consolidated Motion, Memorandum and Supplemental Memorandum to Unseal Documents showing the Court as follows: I. STATEMENT OF FACTS The above-referenced matter was filed on May 19, 2010, in which Plaintiffs seek damages for the alleged wrongful death of Patrick Desmond. Patrick Desmond died due to cardiopulmonary arrest secondary to a heroin overdose. In their Complaint, Plaintiffs assert a variety of causes of action against the Narconon Defendants for their alleged failure to provide safe, properly licensed, legally operated, scientifically and medically based rehabilitation treatment services to Patrick. (See generally, Complaint). Because of the nature of the discovery process, Plaintiffs have been allowed access to highly sensitive and even confidential information concerning employees and students of Narconon of Georgia and its structure and operation. Recognizing the privacy concerns of the Narconon Defendants, the parties entered into an agreement to treat certain documents and information confidential and limiting the use of such information as needed for this litigation.
    [Show full text]
  • Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian
    Northwestern Journal of Technology and Intellectual Property Volume 6 Article 3 Issue 1 Fall Fall 2007 Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Recommended Citation Christopher Soghoian, Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them, 6 Nw. J. Tech. & Intell. Prop. 46 (2007). https://scholarlycommons.law.northwestern.edu/njtip/vol6/iss1/3 This Article is brought to you for free and open access by Northwestern Pritzker School of Law Scholarly Commons. It has been accepted for inclusion in Northwestern Journal of Technology and Intellectual Property by an authorized editor of Northwestern Pritzker School of Law Scholarly Commons. NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods.
    [Show full text]
  • Brain Neuroimaging Experiments Find 'Evidence
    NEWS AND COMMENT Brain Neuroimaging Experiments Find ‘Evidence against Existence of Psi’ . or Do They? KENDRICK FRAZIER precognition exist. They made minimal paid volunteers, thirty-two people total. assumptions about psi and think they Some were couples, some emotionally Can imaging of the brain help resolve have offered the broadest possible test of close roommates or friends. There was the debate over whether psi exists or not? the psi hypothesis. one mother-son pair, one pair of sisters, Two researchers at Harvard University The researchers used sixteen pairs of and two identical twin pairs. Fourteen think it can, and in fact they have now published neuroimaging results that they say “are the strongest evidence yet ob tained against the existence of para- normal mental phenomena.” The researchers note that despite widespread public belief in paranormal mental phenomena such as telepathy or mind-reading, also known as psi, “there is not compelling evidence that psi exists.” Among academic scientists, psychol- ogists especially tend to be skeptical of reports of psi, particularly the anecdotal kind that impress people unaware of all the psychological biases that allow them to so easily misinterpret evidence: the clustering illusion, availability error, confirmation bias, illusion of control, and many others. But if psi processes do exist, they are a mental activity, and there should be some way to detect that activity in the brain by modern neuroimaging techniques. Samuel T. Moulton and Stephen M. Kosslyn of the Harvard Psychology Department feel strongly that with sophisticated neuroimaging techniques, psychology is in a position to advance the psi debate, which in the past “has produced more heat than light.” They set up experiments using functional magnetic imaging (fMRI) of the brain to try to document the exis- tence of psi.
    [Show full text]
  • Zerohack Zer0pwn Youranonnews Yevgeniy Anikin Yes Men
    Zerohack Zer0Pwn YourAnonNews Yevgeniy Anikin Yes Men YamaTough Xtreme x-Leader xenu xen0nymous www.oem.com.mx www.nytimes.com/pages/world/asia/index.html www.informador.com.mx www.futuregov.asia www.cronica.com.mx www.asiapacificsecuritymagazine.com Worm Wolfy Withdrawal* WillyFoReal Wikileaks IRC 88.80.16.13/9999 IRC Channel WikiLeaks WiiSpellWhy whitekidney Wells Fargo weed WallRoad w0rmware Vulnerability Vladislav Khorokhorin Visa Inc. Virus Virgin Islands "Viewpointe Archive Services, LLC" Versability Verizon Venezuela Vegas Vatican City USB US Trust US Bankcorp Uruguay Uran0n unusedcrayon United Kingdom UnicormCr3w unfittoprint unelected.org UndisclosedAnon Ukraine UGNazi ua_musti_1905 U.S. Bankcorp TYLER Turkey trosec113 Trojan Horse Trojan Trivette TriCk Tribalzer0 Transnistria transaction Traitor traffic court Tradecraft Trade Secrets "Total System Services, Inc." Topiary Top Secret Tom Stracener TibitXimer Thumb Drive Thomson Reuters TheWikiBoat thepeoplescause the_infecti0n The Unknowns The UnderTaker The Syrian electronic army The Jokerhack Thailand ThaCosmo th3j35t3r testeux1 TEST Telecomix TehWongZ Teddy Bigglesworth TeaMp0isoN TeamHav0k Team Ghost Shell Team Digi7al tdl4 taxes TARP tango down Tampa Tammy Shapiro Taiwan Tabu T0x1c t0wN T.A.R.P. Syrian Electronic Army syndiv Symantec Corporation Switzerland Swingers Club SWIFT Sweden Swan SwaggSec Swagg Security "SunGard Data Systems, Inc." Stuxnet Stringer Streamroller Stole* Sterlok SteelAnne st0rm SQLi Spyware Spying Spydevilz Spy Camera Sposed Spook Spoofing Splendide
    [Show full text]
  • Cientology: Church of the Holy Censor
    ¡£¢ ¤ ¥§¦ ¨©¦ £ §! One of Scientology's preferred sayings is "Think for yourself". Why, then, does Scientology censor its own members? It all started on March 13th 1998, at the L. Ron Hubbard birthday celebration in Los Angeles. Mark Ingber, a Church of Scientology official, announced that Scientologists would be given an opportunity to sell Scientology books and recruit for Scientology through nearly-identical promotional websites (getting 10% of the money that these recruits end up spending in Scientology, but that's another story). To put up one of these sites, a Scientologist has to sign a contract. Here's a short excerpt from that contract: "If you wish to use this authorization regarding the Marks and the Works, you must: ... (6) agree to use the specific Internet Filter Program that CSI [Church of Scientology International Incorporated] has provided to you which allows you freedom to view other sites on Dianetics, Scientology or its principals without threat of accessing sites deemed to be using the Marks or Works in an unauthorized fashion or deemed to be improper or discreditable to the Scientology religion;" "Deemed improper or discreditable", eh? Boy, aren't Scientologists lucky to have someone there to decide for them what facts about their religion they can and cannot see. If they didn't use this filter, they might find out about the suspicious deaths in Scientology and the uncomplimentary things that judges have said about Scientology. Can't have Scientologists finding out the ugly facts behind Scientology, can they? So, Scientology tries, through this internet filter, to prevent its members from reading negative information about Scientology on the internet.
    [Show full text]
  • Church of Scientology Judicial Review
    HO.ME OFFICE - Feu 03 0001/0029/003/ -.." RELATED PAPERS FILE BEGINS: __ __ ENDS: FILE TITLE: - : POLICY (REVIEW AFTER 25 YEARS) CULTS I NEW RELIGIOUS MOVEMENTS s: . '- CHURCH OF SCIENTOLOGY JUDICIAL REVIEW - SEND TO I DATE - SEND TO DATE SEND TO -- DATE . ZO,3 -. , - -- 0 0 - -- 0 . 0 - " -0 . 0 0 -- 0 HOF000647241 ese 8111 .. .. --- _ .. - - - -- - -- - _. , - AnnexA Press Office to take Subject: Judicial Review Case: Recognition of Scientology as a religion in prison Tuesday 21 October - permissions hearing for a judicial review on HRA grounds of Prison Service policy not to recognise Scientology as a religion for the purpose of facilitating religious ministry in prisons. Background Prisoner Roger Charles Heaton and the Church of Scientology have made an application for jUdicial review of this policy. Unes to take The applicants, having seen our witness statement and outline argument, have offered to withdraw their case, with no order as to costs. This means that the non-recognition policy being followed by prison service is reasonable .and secure. It has been our long-standing policy to withhold recognition of scientology as a religion. However, in order to meet the needs of individual prisoners, the Prison Service allows any prisoner registered as a Scientologist to have access to a representative of the Church of Scientology if he wishes to receive its ministry. This is the approach which was followed in the case of Mr Heaton. The Home Office considers that its policy respects the rights of Mr Heaton under the ECHR and is reasonable in view of concerns of which the department is aware about some of the practices of the Church.
    [Show full text]
  • Comment Submitted by Christopher Soghoian
    NORTHWESTERN JOURNAL OF TECHNOLOGY AND INTELLECTUAL PROPERTY Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them Christopher Soghoian Fall 2007 VOL. 6, NO. 1 © 2007 by Northwestern University School of Law Northwestern Journal of Technology and Intellectual Property Electronic copy available at: http://ssrn.com/abstract=1032225 Copyright 2007 by Northwestern University School of Law Volume 6, Number 1 (Fall 2007) Northwestern Journal of Technology and Intellectual Property Caveat Venditor: Technologically Protected Subsidized Goods and the Customers Who Hack Them By Christopher Soghoian* I. INTRODUCTION ¶1 This paper focuses on the subsidization of a technology-based durable good.1 It goes on to discuss the delicate dance between the producer trying to protect its profit, competitors trying to create and sell aftermarket goods,2 and those innovative customers who use the items in completely unplanned and unprofitable ways. ¶2 An age old, but increasingly popular business model involves the subsidization of a proprietary durable good by a manufacturer, such that the good is sold below cost.3 Due to careful design, technological, and legal restrictions, the producer creates a primary product that is only compatible with its own aftermarket goods. It is through the sale of these proprietary aftermarket products that the producer is able to recoup its initial investment. An example of this business model may be seen with the free inkjet printers that are included with the cost of a new computer but which require proprietary ink refill cartridges that are sold at a significant markup. This business model is typically referred to as the razor and blade model, although this term is a somewhat imperfect description.4 However, since this term is in common use, this paper will continue to use it to refer to this business model.
    [Show full text]
  • Xenu Leaflet
    Operation Clambake: The Fight Against Scientology on the Net For decades L. Ron Hubbard’s instructions on how to crush any opposition worked well. His loyal cult members destroyed lives and families in their attempts to scare ex-members into silence and ruin critics. The campaign against the Cult Who of Scientology is an attempt to bring its secrets and crimes to the surface, and jus- is tice to its victims. The Internet has changed everything for critics of Scientology. The time and cost involved in conducting an investigation into cult activities has dramatically decreased. On the internet it is possible to access more detailed information than enu? one can find in any single physical location. Books, court records, and other crit- Would you like ical information is readily available to be used to educate an unwary public and X potential victims. to hear a wild story? L. Ron Hubbard never predicted the Internet, so the cult has no policy that can Are you sitting handle it. Angry ex-members or fearless investigative journalists were no real challenge for an unscrupulous cult with millions of dollars to spend. But the comfortably? impact of this new communication, of people exchanging documents and expe- Right, let’s begin: riences, is devastating. All the money in the world can’t stop thousands of critics stirred into action by the information on the internet. The cult seems to be caught off guard. People worldwide have done everything nce upon a time (75 million years ago to be more precise) there was an alien from hosting a critical link on their homepage, to making the inner-most secrets ✦ of Scientology available on their web sites.
    [Show full text]
  • Hacker, Hoaxer, Whistleblower, Spy: the Story of Anonymous
    hacker, hoaxer, whistleblower, spy hacker, hoaxer, whistleblower, spy the many faces of anonymous Gabriella Coleman London • New York First published by Verso 2014 © Gabriella Coleman 2014 The partial or total reproduction of this publication, in electronic form or otherwise, is consented to for noncommercial purposes, provided that the original copyright notice and this notice are included and the publisher and the source are clearly acknowledged. Any reproduction or use of all or a portion of this publication in exchange for financial consideration of any kind is prohibited without permission in writing from the publisher. The moral rights of the author have been asserted 1 3 5 7 9 10 8 6 4 2 Verso UK: 6 Meard Street, London W1F 0EG US: 20 Jay Street, Suite 1010, Brooklyn, NY 11201 www.versobooks.com Verso is the imprint of New Left Books ISBN-13: 978-1-78168-583-9 eISBN-13: 978-1-78168-584-6 (US) eISBN-13: 978-1-78168-689-8 (UK) British Library Cataloguing in Publication Data A catalogue record for this book is available from the British library Library of Congress Cataloging-in-Publication Data A catalog record for this book is available from the library of congress Typeset in Sabon by MJ & N Gavan, Truro, Cornwall Printed in the US by Maple Press Printed and bound in the UK by CPI Group Ltd, Croydon, CR0 4YY I dedicate this book to the legions behind Anonymous— those who have donned the mask in the past, those who still dare to take a stand today, and those who will surely rise again in the future.
    [Show full text]
  • Moxon's Annexes
    A N N E X A 7/22/2014 Resources - ICANN Welcome to the new ICANN.org! Learn more, and send us your feedback. Dismiss русский 中文 اﻟﻌرﺑﯾﺔ Translations at ICANN Français Español Log In | Sign Up GET STARTED NEWS & MEDIA POLICY PUBLIC COMMENT RESOURCES COMMUNITY IANA STEWARDSHIP Resources Uniform Domain Name Dispute About Resolution Policy | Deutsch | English | Español | اﻟﻌرﺑﯾﺔ :ICANN This page is available in Français | Italiano | 日本語 | 한국어 | Português | русский | 中 Board 文 Policy Adopted: August 26, 1999 Accountability Implementation Documents Approved: October 24, 1999 & Transparency Notes: Governance 1. This policy is now in effect. See Groups www.icann.org/udrp/udrp-schedule.htm for the implementation schedule. Contractual Compliance 2. This policy has been adopted by all ICANN- accredited registrars. It has also been adopted by Registrars certain managers of country-code top-level domains (e.g., .nu, .tv, .ws). Registries 3. The policy is between the registrar (or other ccTLDs registration authority in the case of a country- Internationalized code top-level domain) and its customer (the Domain domain-name holder or registrant). Thus, the policy Names uses "we" and "our" to refer to the registrar and it uses https://www.icann.org/resources/pages/policy-2012-02-25-en 1/10 7/22/2014 Resources - ICANN TLD "you" and "your" to refer to the domain-name holder. Acceptance Policy Uniform Domain Name Dispute Resolution Policy Public (As Approved by ICANN on October 24, 1999) Comment 1. Purpose. This Uniform Domain Name Dispute Resolution Contact Policy (the "Policy") has been adopted by the Internet Corporation for Assigned Names and Numbers ("ICANN"), is incorporated by Help reference into your Registration Agreement, and sets forth the Dispute terms and conditions in connection with a dispute between you Resolution and any party other than us (the registrar) over the registration and use of an Internet domain name registered by you.
    [Show full text]
  • Is Narconon a Scam?
    E-mail Attachment No From 0 NARCONON Substantive Query No Substantive Query — SF No LONDON not applicable To (Contact By Role Bcc Lookup) Title FW: NARCONON LONDON 098004 Amendments required to ARM Part B CC09050645 Subjec Dear Sir or Madam NARCONON LONDON - 1098004 With regards to my earlier email dated 31 January 2011, (please see cdpy attached below), I am pleased to confirm that the proposed changes have now been made to the figures on your Annual Return form. We would ask you to Please ensure that these amendments to the AR08 are minuted at the next . Trustees meeting. Thank you for your cooperation in this matter. • Kind regards Original Message ---------------- rom: CI Information Accountan Sent: 31/01/2011 eY To: NARCONON LONDON Subject: NARCONON LONDON 1098004 A endments required to AR08 Part B CC:09050645 Dear Sir or Madam NARCONON LONDON - 1098004 Thank you for submitting the above charity's Annual Return form for the financial period ending 31 December 2008. This information was received online on 27 May 2010. We have been undertaking checks of a sample of the forms we receive from charities. As a result we have noted a number of errors in Part B of your submission. The figures entered on the Annual Return should generally be extracted directly from the accounts without adjustment, as stated in our guidelines which are available on our website• We have suggested a number of amendments which are detailed in the attached documents. Our register which gives prominence to the financial information submitted by charities on our website and therefore it is important that the data submitted is accurate.
    [Show full text]