|FROM ||Ruben Safir
|SUBJECT ||Subject: [NYLXS - HANGOUT] [firstname.lastname@example.org: Re: [conspire] Post Mortum legal explosion]
|Easier to read, I hope..
----- Forwarded message from Ruben Safir -----
Date: Thu, 17 Jan 2013 22:11:04 -0500
From: Ruben Safir
To: Ruben Safir , Ruben Safir ,
Aimee Zeltzer ,
Anne Gordon ,
Uncle Abogado? ,
Hannah Aizenman ,
Peter Norton ,
paul Robert Marino
Subject: Re: [conspire] Post Mortum legal explosion
User-Agent: Mozilla/5.0 (X11; Linux x86_64; rv:16.0) Gecko/20121025
On 01/17/2013 07:42 PM, Rick Moen wrote:
> Quoting Ruben Safir (ruben-at-mrbrklyn.com):
>> He is not the only legal opinion and there are many who disagree.
> I'm underwhelmed by your data. (In short, you are posting bullshit.)
"This week, the Fourth Circuit Court of Appeals affirmed that decision.
The CFAA is primarily a criminal statute designed to combat hacking.
Nevertheless, it permits a private party "who suffers damage or loss
by reason of a violation of [the statute]" to bring a civil action "to
obtain compensatory damages and injunctive relief or other equitable
relief." Although proof of at least one of five additional factors is
necessary to maintain a civil action, a violation of any of the
statute's provisions exposes the offender to both civil and criminal
A person can be liable under the CFAA if he:
1. Intentionally accesses a computer without authorization or exceeds
authorized access, and thereby obtains ... information from any
2. Knowingly and with intent to defraud, accesses a protected computer
without authorization, or exceeds authorized access, and by means of
such conduct furthers the intended fraud and obtains anything of value.
3. Intentionally accesses a protected computer without authorization,
and as a result of such conduct, recklessly causes damage, or causes
damage and loss.
Here, WEC alleged that Miller and Kelley violated the Act because they
were not permitted to download confidential and proprietary
information to a personal computer under WEC's policies, and they
breached their fiduciary duties by doing so. Based on that breach,
they either lost all authorization to access the confidential
information or exceeded their authorization.
WEC sought to hold Arc liable because it claimed that Miller and
Kelley undertook this conduct as Arc's agents.
The defendants moved for a 12(b)(6) dismissal, and the district court
held that WEC failed to state a claim for which the CFAA provided
relief. The Fourth Circuit Court of Appeals affirmed the district
court, noting that Miller and Kelley didn't hack WEC's system.
(Remember, the CFAA was created to combat hacking, not an employee
Judge Henry Floyd, writing for the three-judge panel, said, "We are
unwilling to contravene Congress's intent by transforming a statute
meant to target hackers into a vehicle for imputing liability to
workers who access computers or information in bad faith, or who
disregard a use policy. Providing such recourse not only is
unnecessary, given that other legal remedies exist for these
grievances, but also is violative of the Supreme Court's counsel to
construe criminal statutes strictly.""
In April, the Ninth Circuit Court of Appeals dismissed a federal
hacking charge against a California man, finding that the Computer
Fraud and Abuse Act (CFAA), which outlaws computer use that ?exceeds
authorized access,? was inapplicable to the case. For months, we?ve
wondered whether the Justice Department would appeal that decision to
the Supreme Court.
This week, we got our answer. The DOJ has decided not to petition for
Supreme Court review, reports Wired."
from Harvard Business School
The Author wrote for Yale Law review:
"Bazelon was raised in Philadelphia and attended Germantown Friends
School. She graduated from Yale College in 1993 and from Yale Law
School in 2000 and was an editor of the Yale Law Journal. She was
selected for and participated in the Dorot Fellowship in Israel from
1993-94. After law school she worked as a law clerk for Judge
Kermit Lipez of the United States Court of Appeals for the First
Bazelon is the granddaughter of David L. Bazelon, formerly a judge on
the United States Court of Appeals for the District of Columbia
Circuit, and second cousin twice removed of feminist Betty
Friedan. She lives in New Haven, Connecticut with her husband,
Paul Sabin, an assistant professor of history at Yale, and their sons,
Eli and Simon." ~~wikipedia
From the LA Times:
"Some legal experts believe the charges are unfounded since Swartz had
been a university fellow, which gave him the right to access the
They could be lieing, of course since there is no source quoted.
This is also worth a review and discusses both the legal and the
By Lawyer Stephen L Carter:
Stephen L. Carter is a professor of law at Yale, where he teaches
courses on contracts, professional responsibility,
While Kerr sat down and gave a long and detail writing of his
analysis, his is not a whole accepted opinion.
>> Where was there a applicable case like this? This case is unique, FWIW
> Reference was to all other past cases under 18 U.S.C. 1343 (wire fraud),
> 18 U.S.C. 1030(a)(4) (computer fraud), 18 U.S.C. 1030(a)(2)(C) and 18
> U.S.C. 1030(c)(2)(B)(iii) (unauthorised access), and 18 U.S.C.
> 1030(a)(5)(B) and 1030(c)(4)(A)(i)(I) & (VI) (computer damage).
Which one involves a political activist?
> I'm sure Swartz's case was 'unique' in many ways, but none of them
> relevant to the question.
That would be your opinion. None involve the taking of data from an
opened accessed computer by a political activist who never even
released the papers.
>> Prosecution of the law and public opinion are not ever seperate issues.
> Are you comprehensively misreading what I said deliberately, or is it
HAH - am I now your chew toy?!?
----- End forwarded message -----