Articles Posted in Technology

In California, the stalking laws are included under Section 646.9 of the Penal Code, which states that any person who willfully and maliciously, and repeatedly follows or harasses another person and who makes a credible threat with the intent to place that person in reasonable fear for his or her safety or that of an immediate family member is guilty of stalking. Stalking cases may include additional related charges such as: (1) Trespassing; (2) Vandalism; (3) Burglary; (4) Criminal Threats; and (5) Obscene, Threatening, or Annoying Phone Calls.

Please keep in mind that willfulness is a standard related to the culprit’s state of mind. For example, when the person is acting purposefully, then he/she has the “conscious object” of engaging in conduct and believes or hopes that the attendant circumstances exist. If the person is acting knowingly, then he/she is practically certain that his conduct will lead to the result. If the person is acting recklessly, then he/she is aware that the attendant circumstances exist, but nevertheless engages in the conduct that a “law-abiding person” would have refrained from. If the person acts negligently, then he/she is unaware of the attendant circumstances and the consequences of his conduct, but a “reasonable person” would have been aware. Finally, if the person acts with strict liability, then mental state is irrelevant and he/she is strictly liable.

In the last few years and with the emerging of the world wide web, a new kind of stalking has developed which is also called “cyber stalking.” This type of misconduct occurs when the violator utilizes the Internet, electronic mail (e-mail) or other communication devices to harass and stalk others. For example, it can occur by sending e-mails to the victim, impersonating another person in online chat rooms and e-mail messages, and disseminating lies in cyberspace. It is also important to note that the Internet is a cheap and efficient method for “cyber stalkers” to anonymously cause harm to their victims.

If you use email in your day-to-day business operations the CAN-SPAM Act is a law that sets the rules for commercial email. It also establishes the requirements for commercial messages, provides recipients the right to have the sender stop emailing them, and mentions the penalties for related violations.

The CAN-SPAM Act applies to bulk email and all commercial messages, which the law defines as “any electronic mail message the primary purpose of which is the commercial advertisement or promotion of a commercial product or service,” including email that promotes content on commercial websites. The law makes no exception for business-to-business email which means all email. As an example, a message to former customers announcing a new product line is required to comply with the law.

Each violation of the CAN-SPAM Act is subject to penalties of up to $16,000. Here are the CAN-SPAM Act’s main requirements:

In light of the circumstances, numerous states have enacted “cyberstalking” or “cyberharassment” laws or currently possess laws that specifically include electronic forms of communication within more traditional stalking or harassment laws. In addition, many states have enacted “cyberbullying” laws in reaction to issues related to protecting minors from online bullying or harassment.

Cyberstalking constitutes use of the world-wide-web (i.e., the Internet), electronic mail or other electronic communications to stalk. It generally refers to a pattern of threatening or malicious behaviors. It may be considered the most dangerous of the three types of Internet harassment, based on a posing credible threat of harm. Penalties range from misdemeanor to felony. See Cal. Civil Code § 1708.7, Cal. Penal Code § 646.9.

Cyberharassment is different from cyberstalking since it may not involve a credible threat. It usually pertains to threatening or harassing email messages, instant messages, or to blog entries or websites dedicated solely to tormenting a person. Some state legislatures have dealt with this issue by inserting provisions which address electronic communications in general harassment statutes, while others have created stand-alone cyberharassment statutes. See Cal. Penal Code §§ 422, 653.2, and 653m.

Samsung Electronics, the second largest maker of mobile phones, claims that Apple Inc. has infringed upon its patents since entering the mobile-phone market with the iPhone 3G, a lawyer for Samsung told a Dutch court as the Korean company seeks a ban on some Apple products in the Netherlands.

“Apple just entered the market in 2008 without taking care of the licenses,” Bas Berghuis van Woortman, a lawyer for Simmons & Simmons LLP who represents Samsung, said in The Hague court. “Apple is consciously, structurally infringing the 3G patents.”

The parties will be discussing settlement soon as this is yet another legal battle between two technology giants over intellectual property rights.

In the recent years, politically-motivated hackers have made sensitive information available to bloggers and mainstream media at unprecedented rates. For example, Wikileaks released leaked Afghan war logs and government diplomatic cables. Anonymous individual hacked and released emails from the computer security firm HBGary. A college student gained access to and released emails from Sarah Palin’s Yahoo account. LulzSec hacked into and publicly released confidential data belonging to Sony and others. Most recently, the Antisec movement hacked into over 70 police departments and released confidential emails and other files.

A this time, some important questions to ask ourselves would be as follows:

1. What are some applicable legal issues when publishing information obtained by hackers?

Facebook Inc., which is currently considered the world’s largest social network, plans more acquisitions so to improve its site design, keep services more reliable and advance its mobile features to compete with Twitter and Google which are active in the same arenas.

Facebook’s director of corporate development, Vaughan Smith stated that, the company aims to make approximately 20 purchases in year 2011 which is up from 10 last year and one in 2009.

It is important for our blog readers to know that Facebook obtains income from advertising and takes certain commission when software developers sell virtual goods on its website. As we know, Facebook is a closely-held company and it does not disclose its financials. Based on my research, the company is seeking to generate $2 billion or more in earnings before interest, taxes, depreciation and amortization in 2011.

In April 2010, David Kernell faced trial for “hacking” into then-Alaskan Governor Sarah Palin’s personal email account.

In November 12, 2010, David Kernell was indicted (i.e., a grand jury believed there was sufficient evidence to place him on trial on federal charges). Thereafter, a jury convicted him of two charges. First, computer fraud. Second, obstruction of justice. David Kernell’s defense was that his conduct was a prank. However, the jury was not pursuaded and he was sentenced to one year and one day in federal prison with a recommendation to spend his time in a halfway house.

This case is illustrative of the types of crimes an email hacker may face including: (1) Wire Fraud; (2) Computer Fraud; (3) Identity Theft; and (4) Obstruction of Justice.

A rise in attacks by hackers in 2011 is showing limits of an older generation of security software from Symantec Corp. (www.symantec.com) and McAfee Inc. (www.mcafee.com) and is placing pressure on these high-tech companies to upgrade products.

These and similar companies are seeking to keep up with cloud computing and the growth of workers plugging mobile devices into networks. According to Johannes Ullrich, a researcher at the SANS Technology Institute (www.sans.edu), none of the recent attacks tied to hacker groups such as Anonymous and Lulz Security could have been repelled by traditional antivirus programs or firewall software.

George Kurtz, who is the current chief technology officer at McAfee, now part of Intel Corp. (www.intel.com), expressed his concern by comparing the current predicament to a “security Armageddon” which is also of great concern for end users and customers.

The White House will host a Twitter town hall with President Barack Obama on July 6. The president will answer questions submitted via Twitter, which limits messages to 140 characters. The town hall will focus on jobs and the economy, and a video feed of Obama’s answers will be streamed online.

See www.twitter.com/salaratrizadeh for more information.