Ars Technica

Part 5

Report Chapter

- Create a humor piece about the leaders of CtW.

Now, some members of Congress want an investigation. "The [Team Themis] techniques may have been developed at US government expense to target terrorists and other security threats," said a letter signed by the representatives. signed by the representatives.

"The e-mails indicate that these defense contractors planned to mine social network sites for information on Chamber critics; planned to plant 'false doc.u.ments' and 'fake insider personas' that would be used to discredit the groups; and discussed the use of malicious and intrusive software ('malware') to steal private information from the groups and disrupt their internal electronic communications."

Did anything illegal happen? The letter suggests that forgery, wire fraud, and computer fraud might have taken place and that Congress should investigate the ways that private contractors turn their military contracting experience on private targets.

Going after the lawyers Hunton & Williams, the middleman law firm in all this (and the middleman between a major US bank and Team Themis' similar plan to take down WikiLeaks), has steadfastly refused to comment on the whole story. But it too may find itself in trouble after a professional conduct complaint (PDF) was lodged against it last week in Washington, DC. (PDF) was lodged against it last week in Washington, DC.

The complaint was filed by Stop the Chamber and Velvet Revolution, two of the groups targeted for the potential Chamber of Commerce campaign. It accuses the three Hunton & Williams lawyers named in the HBGary Federal e-mails of "an extended pattern of unethical behavior that included likely criminal conduct."

*** You are reading on https://webnovelonline.com ***

Specifically, they solicited, conspired with and counseled three of its investigative private security firms to engage in domestic spying, fraud, forgery, extortion, cyber stalking, defamation, hara.s.sment, destruction of property, spear phishing, destruction of property, ident.i.ty theft, computer sc.r.a.ping, cyber attacks, interference with business, civil rights violations, hara.s.sment, and theft.

Credits ePub authoring by Dave Girard, www.can-con.ca. Graphics throughout by Aurich Lawson, www.aurichlawson.com.

Copyright Information Copyright Conde Nast. The following disclaimer applies to the information, trademarks, and logos contained in this doc.u.ment. Neither the author nor Conde Nast Digital make any representations with respect to the contents hereof. Materials available in this doc.u.ment are provided "as is" with no warranty, express or implied, and all such warranties are hereby disclaimed. Conde Nast Digital a.s.sumes no liability for any loss, damage or expense from errors or omissions in the materials available in this doc.u.ment, whether arising in contract, tort or otherwise. The material provided here is designed for educational use only. The material in this doc.u.ment is copyrighted by Conde Nast Digital, and may not be reprinted or electronically reproduced unless prior written consent is obtained from Conde Nast Digital. Links can be made to any of these materials from a WWW page, however, please link to the original doc.u.ment. Copying and/or serving from your local site is only allowed with permission. As per copyright regulations, "fair use" of selected portions of the material for educational purposes is permitted by individuals and organizations provided that proper attribution accompanies such utilization. Commercial reproduction or multiple distribution by any traditional or electronic based reproduction/publication method is prohibited. Any mention of commercial products or services within this doc.u.ment does not const.i.tute an endors.e.m.e.nt. "Ars Technica" is trademark of Conde Nast Digital. All other trademarks and logos are property of their respective owners.

*** You are reading on https://webnovelonline.com ***

Popular Novel