The ACLU of Massachusetts is representing an anonymous Twitter user who has been targetted by an Assistant DA who is trying to build a case related to Occupy Boston; the court and the ADA have sealed the proceedings, so no one -- not even some of the ACLU staff working on the case -- is allowed to know what is going on:
I had gone to court to listen to our legal team argue a case to protect the First Amendment rights of our client, Twitter user @p0isAn0n, aka Guido Fawkes. That user, who wishes to remain anonymous throughout the proceedings, was the target of a Suffolk County Assistant District Attorney’s administrative subpoena to Twitter, dated December 14, 2011. As we wrote last week, the subpoena asked Twitter to hand over @p0isAn0n’s subscriber information, including our client’s IP address, which can be used to help track down someone’s physical residence...
The known knowns: the scrum of lawyers, defense and prosecution, addressed the judge. I saw the judge speak to the lawyers. Then I saw our attorneys return to their bench, closer to where I was sitting, out of earshot of the sidebar. But the ADA stayed with the judge. He spoke to her, with his back to the courtroom, for about ten minutes. Our attorneys didn’t get to hear what he said to her, didn’t have a chance to respond to whatever the government was saying about our client, about the case. It was frankly shocking.
After those ten minutes of secret government-judge conversation, our attorneys were invited back to the sidebar, whereupon the scrum of lawyers spoke with the judge for another ten or fifteen minutes. Then they dispersed. The judge uttered not one word to the open court. And that was it.
Stunned, I followed a group of reporters outside and listened as Attorney Krupp attempted to answer their questions. It was then I realized that the judge had impounded all the court records related to the case, and mandated complete secrecy governing the proceedings. The public wasn’t even to know whether our motion to quash had been approved or denied.
WTF? (What the Fawkes?)
In 2013, Lavabit — famous for being the privacy-oriented email service chosen by Edward Snowden to make contact with journalists while he was contracting for the NSA — shut down under mysterious, abrupt circumstances, leaving 410,000 users wondering what had just happened to their email addresses.
A new phishing attack hops from one Gmail account to the next by searching through compromised users’ previous emails for messages with attachments, then replies them from the compromised account, replacing the link to the attachment with a lookalike that sends you to a fake Google login page (they use some trickery to hide the […]
An anonymous editor from Crimethinc writes, “As 2017 opens, we face new challenges in an increasingly volatile world. Since last summer, we’ve been hard at work expanding our networks and updating our infrastructure to prepare for the global situation that is now unfolding. Over the next month, we’ll be announcing several ambitious new projects.”
Using my iPhone while it’s charging is always a hassle. With tucked-away outlets and the meager length of included lightning cables, comfortable scrolling while plugged in is annoying. These 10-Ft MFi-Certified Lightning Cables are super convenient and probably the best iPhone accessory purchase I’ve made.At over three times the length of normal cables, these reach anywhere you […]
With countless applications for modern life, artificial intelligence (AI) is one of the most in-demand fields of study in tech. Beyond modelling human decision making processes and learning abilities, AI can be used to analyze massive volumes of data and create complex interactive systems.This Machine Learning & AI for Business Bundle made mastering these concepts possible for […]
Computer hacking isn’t just something happening to the DNC. Major software companies need white-hat hackers to ensure the security of their products and users, and I came across a Computer Hacker Professional Certification Package that conveniently teaches those advanced IT techniques online.This course package will prepare you for various computer security certification exams with over 60 hours […]