December 13, 2012 in Corporate
There is provided a device and system for restraining detainees through devices attached to the detainees and configured to administer electrical shocks when certain predetermined conditions occur. Restraining devices may be activated by internal control systems or by external controllers that transmit activation signals to the restraining device. External controllers may be actuated by an external controlling entity such as a detention guard or other person or system, or may be controlled by an enabling signal sent by wired or wireless connections to the controller. There is also provided a system for detainee restraint where multiple detainees may be restrained collectively or individually in a controlled environment such as a detention facility, a jail, or a detainee transport vehicle.
December 6, 2012 in Corporate
The advent of set-top box devices and other media content access devices (“access devices”) has provided users with access to a large number and variety of media content choices. For example, a user may choose to experience a variety of broadcast television programs, pay-per-view services, video-on-demand programming, Internet services, and audio programming via a set-top box device. Such access devices have also provided service providers (e.g., television service providers) with an ability to present advertising to users. For example, designated advertisement channels may be used to deliver various advertisements to an access device for presentation to one or more users. In some examples, advertising may be targeted to a specific user or group of users of an access device.
November 3, 2012 in Corporate
Harris Corporation’s standard terms and conditions for the sale of their wireless surveillance products including the AmberJack, StingRay, StingRay II, Harpoon and KingFish products. The terms and conditions document was included in a contract signed with Tempe, Arizona on October 8, 2012 for $60,321.15 worth of surveillance software, equipment and training.
September 7, 2012 in Corporate, National Security Agency
With internet traffic growing exponentially, attacks on government and commercial computers by cyber terrorists and rogue states have escalated. Those wishing harm have espionage programs targeting the data systems used by the United States and allies. Drug traffickers and weapons dealers use the internet with encrypted communications. To counter these activities, the National Security Agency, an agency of the U.S. government, is building a fortified data center deep inside a mountain in Utah. This complex will house the world’s most sophisticated supercomputers dedicated to code breaking and data traffic analysis. Another site will eventually take delivery of the latest Cray supercomputer called Cascade to support the NSA’s need to crack codes faster to protect the nation and its allies.
August 10, 2012 in Corporate
Trap Wire dramatically increases the ability to detect pre-attack preparations and to take appropriate action to detect, deter and intercept tenorist attacks. A visual monitor of the entire system-a map with dynamic status indicators for each entity connected to the Trap Wire network- facilitates the ability of decisionmakers to absorb vast quantities of information quickly and efficiently. The dynamic status indicators show the threat level at each facility and highlight those that have moved to a higher threat level over the preceding 24 hours. Security officials can thus focus on the highest priorities first, taking a proactive and collaborative approach to defense against attacks. The information collected by Trap Wire can also be shared with law enforcement agencies to assist in their counterterrorism efforts.
July 13, 2012 in Corporate
A presentation from Victoria Sheckler, Deputy General Counsel of the Recording Industry Association of America, was presented at an International Federation of the Phonographic Industry meeting in Panama in April 2012. It contains information on an upcoming effort by internet service providers to police their users’ sharing of copyrighted material called the Copyright Alert System. The presentation also discusses other voluntary measures such as agreements by payment processors to stop doing business with sites that are “repeat offenders” and efforts to encourage domain name registrars to enforce stricter “whois” policies.
May 17, 2012 in Corporate, Illinois
On May 20-21, 2012, Chicago will host the 25th North Atlantic Treaty Organization (NATO) Summit – the first NATO Summit in the U.S. held outside of Washington, DC. Delegations from 28 NATO Member Countries, 24 International Security Assistance Force (ISAF) Partner Countries, and six other nations and international organizations will participate in the Summit. The Summit will bring economic benefits in the form of spending, tax revenues, employment, hotel guests, tourism, and broader global attention. Over 7,500 delegates and 7,300 staff, press, and other dignitaries are expected to attend the Summit. In addition, planning for the Summit prompted visits and spending by delegations during advance trips to Chicago. Building on the momentum of the Summit, many Chicago organizations have planned events that will generate additional economic impacts for the City. These ancillary events are expected to draw thousands of additional speakers, staff, attendees, and members of the media.
April 2, 2012 in Corporate
A 2010 price list for Harris Corporation wireless surveillance products was included in contract documentation for the purchase of multiple KingFish Dual Mode wireless measurement systems that went to Maricopa County, Arizona.
March 25, 2012 in Corporate
This document describes a system for allowing advertisers to target on-line advertisements based on environmental factors of end users. When determining what ads to serve to end users, the environmental factors can be used independently or in combination with matching of keywords associated with the advertisements and keywords in user search queries. A web browser or search engine located at the user’s site may obtain information on the environment (e.g., temperature, humidity, light, sound, air composition) from sensors. Advertisers may specify that the ads are shown to users whose environmental conditions meet certain criteria. For example, advertisements for air conditioners can be sent to users located at regions having temperatures above a first threshold, while advertisements for winter overcoats can be sent to users located at regions having temperatures below a second threshold.
February 24, 2012 in Corporate
A manual for the California-based outsourcing company oDesk is used by “live content” moderators of Facebook to provide standards for monitoring photos and postings in accordance with Facebook’s abuse and inappropriate content provisions. The manual was originally provided to Gawker by a 21-year-old Moroccan man who says he was paid $1 dollar an hour to scan Facebook for illicit content.
January 3, 2012 in Corporate
The text of an email sent on January 1, 2012 by a senior member of Scientology’s Sea Org named Debbie Cook. The email was published on the website of the Village Voice, then was removed at the request of Ms. Cook. The email discusses Cook’s problems with the direction that the Church of Scientology has recently taken, including what she perceives an obsessive emphasis on fundraising and a more than $1 billion dollar unused cash reserve. Cook confirmed the email’s authenticity via Facebook.
December 15, 2011 in Corporate
Mobile device users may be tracked either via mobile-signal triangulation or via Global Positioning Satellite information. A mobile device user’s recent movements may be analyzed to determine trails or traffic patterns for device user among various locations. Mobile device trail information, either for an individual user or aggregated for multiple users, may be analyzed to determine a next destination for the user. Electronic advertising content, such as advertisements, coupons and/or other communications, associated with the next destination may be sent to an electronic device likely to be viewed by the mobile device user. Additionally, the identity of the mobile device user may be known and the advertisements or coupons may be tailored according to demographic information regarding the mobile device user. In addition, destinations may be recommended to mobile device users based on the recent locations the users have visited.
December 1, 2011 in Corporate
A presentation included in a collection of materials related to Trevor Eckhart’s research into the “mobile service intelligence” software produced by Carrier IQ. The document was specifically mentioned in a cease and desist order that the company sent to Eckhart demanding that he remove their “confidential training materials” and take down his analysis of the company’s software. Though the company later withdrew the legal complaint, this presentation remains unavailable from its original location and is only available via a number of mirrors at file-hosting sites.
November 23, 2011 in Corporate
A series of documents comprised of all publicly available versions of Facebook’s subpoena and legal compliance guides produced for law enforcement information requests. This site previously published the Facebook law enforcement guides from 2007-2010, which included a 2008 version of the manual that was originally published by Cryptome. The guides were referenced by privacy scholars and others in the media, yet Facebook would not even confirm to Reuters the authenticity of the documents. With two more editions provided by the latest #AntiSec leak (including a second expanded copy from 2010 and a shorter version from 2006), there are now 6 separate versions available from 2006-2010. All but one of the guides are labeled with version numbers documenting the evolution of the Facebook process for supplying user information to law enforcement.
November 20, 2011 in Corporate
A subpoena/legal compliance guide for Microsoft’s MSN Online Services, including Hotmail accounts, that was last revised April 2005.
November 20, 2011 in Corporate
Multiple versions of the subpoena/legal compliance guides issued by Blizzard Entertainment, makers of World of Warcraft, for law enforcement information requests. Two versions from 2008 and 2009 are included.
November 20, 2011 in Corporate
A subpoena compliance guide for AOL Inc. describing data retention practices and subpoena guidelines from October 2010.
November 19, 2011 in Corporate
Leading Democratic party strategists have begun to openly discuss the benefits of embracing the growing and increasingly organized Occupy Wall Street (OWS) movement to prevent Republican gains in Congress and the White House next year. We have seen this process of adopting extreme positions and movements to increase base voter turnout, including in the 2005-2006 immigration debate. This would mean more than just short-term political discomfort for Wall Street firms. If vilifying the leading companies of this sector is allowed to become an unchallenged centerpiece of a coordinated Democratic campaign, it has the potential to have very long-lasting political, policy and financial impacts on the companies in the center of the bullseye. It shouldn’t be surprising that the Democratic party or even President Obama’s re-election team would campaign against Wall Street in this cycle. However the bigger concern should be that Republicans will no longer defend Wall Street companies- and might start running against them too. Well-known Wall Street companies stand at the nexus of where OWS protestors and the Tea Party overlap on angered populism. Both the radical left and t he radical right are channeling broader frustration about the state of the economy and share a mutual anger over TARP and other perceived bailouts. This combination has the potential to be explosive later in the year when media reports cover the next round of bonuses and contrast it with stories of millions of Americans making do with less this holiday season.
November 10, 2011 in Corporate
A “Sales Playbook” for distributors of Blue Coat equipment includes pricelists and a guide to selling web filtering technology including some of the very same models discovered by Telecomix to be in use by the Syrian government for spying on their population. These models include the SG-400 and SG-810, among others, which have a price range of $3,999 up to $34,999 depending on the specific model.
October 13, 2011 in Corporate, New York
As you know, for over three weeks, Zuccotti Park (the “Park”) has been used by “Occupy Wall Street” and other protesters as their home base. The Park is owned by a Brookfield affiliate and was recently renovated at Brookfield’s considerable expense as an amenity for the general public. It is intended to be a relaxing tree-filled oasis in the midst of the hustle and bustle of Lower Manhattan. We fully support the rights of free speech and assembly, but the manner in which the protesters are occupying the Park violates the law, violates the rules of the Park, deprives the community of its rights of quiet enjoyment to the Park, and creates health and public safety issues that need to be addressed immediately. Within the Park, the protesters have set up living spaces with tarpaulins, mattresses, sleeping bags, tables, bookshelves, gasoline-powered generators and other items that arc inconsistent with the rules and normal public use of the Park. At all hours of the day and night, protesters arc sleeping on benches and walkways, blocking normal pedestrian access to the general public and preventing cleaning and maintenance workers from performing necessary upkeep. When not blocked by protesters, the walkways throughout the Park are blocked by the various items and equipment brought to the Park by the protesters.
October 11, 2011 in Corporate
Abusive activity on the internet continues to rise, and public concern about the safety of the internet is clear. Verisign is aware that some reports have sought to portray the com/net TLDs as being at risk from maliciousness. All parts of the internet community are feeling the pressure to be more proactive in dealing with malicious activity. ICANN has recognized this and the new gTLD Applicant Guidebook requires new gTLDs to adopt a clear definition of rapid takedown or suspension systems that will be implemented. To address concerns over malware, Verisign is seeking to (i) provide a malware scanning service to assist registrars in identifying legitimate sites that have been infected and (ii) establish an anti-abuse policy to facilitate the takedown of abusive non-legitimate sites.
October 6, 2011 in Corporate
A method is described for tracking information about the activities of users of a social networking system while on another domain. The method includes maintaining a profile for each of one or more users of the social networking system, each profile identifying a connection to one or more other users of the social networking system and including information about the user. The method additionally includes receiving one or more communications from a third-party website having a different domain than the social network system, each message communicating an action taken by a user of the social networking system on the thirdparty website. The method additionally includes logging the actions taken on the third-party website in the social networking system, each logged action including information about the action. The method further includes correlating the logged actions with one or more advertisements presented to the one or more users on the third-party website as well as correlating the logged actions with a user of the social networking system.
October 5, 2011 in Corporate, United States
For those who wish to understand the true nature of our current financial system, the Pujo Committee’s 1912-1913 investigation of the “Money Trust” is essential reading. The Committee identified a concentrated group of Wall Street bankers who operated a sophisticated financial network unified by 341 interlocking directorships held in 112 corporations valued at more than $22 billion in resources and capitalization exerting significant control and influence over the U.S. economy and monetary system. The companies and individuals comprising this network were primarily agents of the Morgan and Rockefeller banking empires which dominated U.S. finance following the “Industrial Revolution”. The Committee names a number of prominent banking institutions as participating in this system including J.P. Morgan & Co., First National Bank of New York, Kuhn Loeb & Co. and individuals such as Paul Warburg, Jacob H. Schiff, Felix M. Warburg, Frank E. Peabody, William Rockefeller and Benjamin Strong, Jr. Understanding this system of overlapping financial networks and how those networks are used to dominate utilities, railroads, banking and the U.S. financial infrastructure throughout much of the twentieth century is key to the proper analysis of our current economic situation and the influence that the “Money Power” wields over global politics.
September 24, 2011 in Corporate
A presentation entered into evidence in a National Labor Relations Board lawsuit by the International Association of Machinists (IAM) against Boeing over the location of a new factory for constructing 787 Dreamliners in South Carolina. The presentation shows that Boeing determined a South Carolina location to be less profitable and more likely to fail, yet the company ultimately decided to locate the facility there to avoid unions and, according to IAM, to punish unions for past disagreements.