So what has your AI been trained upon? A group of authors requests that their copyrighted works not be used for that purpose. Further, for many years American military emails (.MIL) have been mis-sent to Mali (.ML) due to typos. Now, that domain is being transferred back to that country’s control. Finally, I was very…
Category: Computer Fraud & Abuse Act
Interesting presentation on Cybercrime
Here’s a link to Jonathan Frieden’s post entitled “Defending a Criminal Case in a Cyber World” where he posts the outline of his recent talk on the subject. If you follow my blog regularly I’m sure this will be of interest to you.
Butera & Andrews v. IBM – Employer not liable for intentional hacking by unknown IBM employee
Butera & Andrews v. International Business Machines Corporation, 456 F.Supp.2d. 104, (1:06-CV-647, D. of Columbia, Order granting Motion to Dismiss, October 18, 2006.) Plaintiff Butera & Andrews is a law firm that specializes in federal government relations and litigation. It detected unauthorized intrusions into its computer systems in November of 2005. Security consultants tracked the…