Free Essay

Case Stury

In:

Submitted By murasek1
Words 4098
Pages 17
SETUP.EXE Civil disobedience has long been an integral part of the democratic process in the United States. Those dissenters in Boston who disrupted trade in 1773 as a protest against unfair laws and business practices could not have imagined the modern­day equivalent: computer "hacktivists" (hacker + activist) leveraging exploits against digital networks to accomplish more or less the same thing. This case study explores the ways in which the general public, news media, lawmakers, and law enforcement have reacted to the more contentious hacktivist incidents that have transpired in the United States since 2009. The impact of these attacks has ranged from minor to catastrophic, and the most clever perpetrators have been able to evade apprehension. In response, the United States judicial system has strategically given severe punishments to the few hacktivists it can manage to catch. As other forms of disruptive activism are being punished with slaps on the wrist, these hacktivists and their allies are pleading their case to the public that these incommensurate punishments are cause for concern.
Command Prompt Through a discussion about the facts and the positions of the actors involved with regard to hacktivism, it will become clear that the lack of a plain and fair legal doctrine is indeed to blame for the pervasive confusion among plaintiffs and defendants alike. The goal of this study is to show just that: to highlight the ambiguity of the law through examples, to discuss the stiff legal repercussions these hacktivists have faced, and to consider the dialogue between the news media and the general public about the appropriateness of criminal sentencing and the nature and motives of hacking incidents. For those wishing to reform the law, there are several points worth considering. If, for the sake of free speech, an exception clause is enacted where disrupting online services becomes permissible, it must also take into account the potential for abuse. Business owners may fund clandestine hacktivist "protests" to hurt their competition, or hate groups may use this clause to advance oppression. If the punishments for breaking the law are lowered so as to allow for more moderate sentences in activist cases, then the more malicious hackers would simply plead "activist" to avoid long prison terms. This burgeoning phenomenon of hacktivism remains considerably unfamiliar to many people, and lacks definition. These incidents involve actors (hacktivists) working to disrupt the digital operations of a company or government body as a way of pushing a political agenda or drawing attention to perceived malfeasance. There is a debate over which methods are ethically permissible in pursuit of such a cause, and this discourse has shaped the semantic definition.
Technical Information A hacker group known as The Cult of the Dead Cow coined the term "hacktivism" in 1996 (Casserly, 2012), although it has only recently entered common parlance. A portmanteau of the words "hack" and "activism," dictionary.com defines it as "the practice of gaining unauthorized access to a computer system and carrying out various disruptive actions as a means of achieving political or social goals" (hacktivism, 2014). The term "hacking" has come to connote unauthorized digital activity, though it originally did not signify criminality. "Activism" on the other hand, is a term that acquired a positive connotation­­as a kind of civic duty when done within the confines of the law, the public generally smiles upon it. Hacktivism, consequently, is the grey area where these endeavors overlap. Whenever actors are willing to break the law in pursuit of what they claim to be a noble cause, their actions demand higher scrutiny, and this is precisely such a case. According to Julian Assange, the Editor­in­Chief of the influential and notorious Wikileaks website, the first hacktivist act occurred in October of 1989. At that time, protesters concerned with the hazards of nuclear power may have been responsible for developing the computer worm known as WANK (Worms Against Nuclear Killers) that infected machines at NASA and the US Department of Energy (Assange, 2006). The WANK worm was traced back to New Zealand but never to any individual or group. It was not particularly destructive; a computer infected with the worm would occasionally interrupt the user with a diverting political message before spreading itself. In the Internet age, those computer networks that were once recondite have become ubiquitous. The viral media phenomenon provides a natural fuel for hacktivism, even as the nuanced methods and justifications of these endeavors become lost in the buzz. There can be said to be two "schools" of hacktivist methods: orthodox and direct. Orthodox hacktivism is concerned with technologically novel approaches to provoke political or cultural change through the wider distribution of information, e.g. WikiLeaks. Direct protest hacktivists espouse more intrusive methods epitomized by the Distributed Denial of Service. This kind of massive “virtual sit­in” is a high­profile attack against an ideological foe's network service that renders it unusable to everyone (Rouse, 2013). The challenges are ethically significant: not only are such acts illegal, but the means to accomplish them obviously contradict the very free speech ideals these groups claim to tout. Furthermore, the wide distribution of secret information may not be the most noble cause if publishing it exposes officials to violent retaliation, endangering their lives. If a large corporation is found to be knowingly mistreating their customer base, is it an ethical act to incite thousands to disrupt an otherwise legitimate service in protest? Though there are many well­known names affiliated with hacktivism, one of the most significant groups is expressly the least well­known. On numerous occasions, the amorphous hacktivist collective known as Anonymous has come together in ad hoc arrangements to launch DDoS attacks on various websites and internet services. These self­styled "operations" include such targets as governments, religious organizations, and corporations. Hacktivists engaging in these acts claim to be doing it for justified reasons, and contend that the outdated laws fail to account for their noble motives and advanced methods. As it stands now, a person publishing the names of undercover agents (which often leads to their murder) has a good case for being protected by the law, while the act of flooding a website with extra traffic (inconveniencing them for a few days) is an offense punishable by decades in a federal prison. It seems likely that the lack of resolution on these ethical and legal matters will only provide more fuel for continued hacktivist attacks.
Usernames The actors involved in this challenging phenomenon can be broadly organized into four primary groups: the hacktivists, the media, the general public, and law enforcement agencies. In order to present an exhaustive discussion of this case, it is necessary to consider the different motives and objectives that these actor groups have, and to highlight the nuanced controversies within their relevant contingents. One goal that hacktivists tend to have in common is to expand access to information; an idea popularly summarized by the saying "Information wants to be free" (Brand, 1987, p. 202). In some cases, like the recent and ongoing attacks against Kenyan government websites, this act of surreptitiously finding and publicising private information serves to expose corruption (Misiko, 2014). Discouragingly, hackers are often motivated by ego (Pipkin, 1997, p.26), and desiring to demonstrate their skill with impunity, they use the cover of hacktivism as a post­hoc justification for their activities (Olson, 2012). Some hacktivists insist that the activity must include strong prohibitions against destructive hacking, arguing that their skills should only be used to amplify voices, not to silence them (Ludlow, 2013). Unscrupulous hacktivists, on the other hand, are perfectly willing to destroy online content, so long as such content is at odds with their broader goals. It's worth noting that the desperate destructive contingent–those willing to deface, delete, or deny access to online information–is typically responsible for drawing the most media attention. The goal of the news media, in this case, is to inform the public about hacktivism and, to a lesser extent, interpret these events (Olson). There is a risk that the owners of these outlets, with their diverse market interests, may be able to leverage their reporting in order to discourage hacktivist criticism and attacks­­a sobering possibility. News outlets such as Time Magazine , CNET , Wired , The Guardian , and Gawker are among those that have reported extensively on the phenomenon. These digital magazines may also find themselves the victims of hacker attacks, as in the 2010 hack of Gawker (Gustin, 2010), when a group of hacktivists became upset at the news site's unfavorable coverage of their exploits. Targeting the media is a risky gambit, since without the attention of the media, hacktivists would have no way to get their message the general public (C­SPAN, 2012, 7:06). To achieve their political or social goals, hacktivists must persuade the masses. The general public's opinion is split at present, but they will ultimately decide the extent to which hacktivists' activities are justified or whether they should remain illegal. The public serves as both the scorekeepers and the score. Individual actors within the public sphere may be enticed to either participate in or to resist hacktivist activities. This actor group is the one most capable of putting pressure on lawmakers and law­enforcers. The general goal of law­enforcers is to uphold the law, protecting citizens and businesses while defending their private property rights. Pertinent entities included in this actor group are the FBI in the US, the SOCA in the UK (now NCA), INTERPOL, as well as several private security companies, including those that have been targeted by hacktivists such as HBGary and Stratfor (Olson). Directing these officials are the lawyers, judges, and lawmakers who create, interpret, and amend the laws that deal with computer related activities. Hacktivism is disruptive by nature–a quality intensified because its technological exploits let it catch conventional institutions flat­footed. These four actor groups (the hacktivists, media, general public, and law­enforcers) are grappling with one another to bring about their goals. In addition to the Internet, the battleground for this struggle is in the courts.
A Program Has Committed an Illegal Action Hacktivism is a global phenomenon, but the scope of this case study is limited to policies pertaining to the United States. Furthermore, even though the individual cyberlaw policies of privately held companies are significant, all of these must conform to federal laws, and will only be referenced as they become applicable. The relevant federal laws, consequently, deserve investigation. Three of those worth mentioning are the Computer Fraud and Abuse Act of 1986 (CFAA), the Electronic Communications Privacy Act of 1986 (ECPA), and the law prohibiting wire fraud. Title 18 § 1343 of the U.S. Code defines wire fraud as any scheme to fraudulently obtain money or property by electronic means, setting a maximum penalty of 20 years for the crime. Through it serves as the foundation for the anti­hacking laws that would come after it, the prohibition against wire fraud is mostly a historical footnote. Hackers have indeed been indicted under this law, but its reach is narrowly defined: the prosecution has the burden of demonstrating how the offender intended to benefit financially or materially. The definition of hacktivism stated previously does not involve any such benefit of money or property. This policy is only indirectly relevant today. In order to address this deficiency, several sections of Title 18 were amended in 1986 with the Electronic Communications Privacy Act of 1986. Title I of the ECPA, known as the “Wiretap Act,” adds guidelines to the law for protecting electronic communication and stored information from government wiretapping without its first obtaining a warrant. Law enforcement officials need to comply with this law in prosecuting lawbreaking hacktivists. What makes it particularly relevant to this case is that, according to Frontline, "under the law, unauthorized access to computer messages, whether in transit or in storage, is a federal crime" ( Who's Responsible?, 2001). Many Hacktivists do commit this crime in reading such messages, but this law deals with only a fraction of the relevant activities. In recent years, the law that has been most applicable to the hacktivism phenomenon is the Computer Fraud and Abuse Act of 1986. It outlaws the better part of the hacktivist playbook: unauthorized use of computer hardware or software, Distributed Denial of Service (DDoS) attacks (Sauter, 2014, p. 12), password cracking, insertion of unauthorized code, and much more. While it is more extensive than previous legislation, much of the law is currently up to individual interpretation, and other virtual acts are not covered by the CFAA at all. Source Code Hacking has been successfully prosecuted under the ECPA and the law prohibiting wire fraud (under Title 18 § 1343 of the U.S. Code), but the Computer Fraud and Abuse Act of 1986 (CFAA) is the most relevant and inclusive law under which hacktivists are charged. Enacted by congress in 1986 (and amended several times since then, as recently as 2008), the CFAA amended and helped to clarify the computer fraud law already in existence ( 18 U.S.C. § 1030 ) and increased the range of offenses that it covered, such as distribution of malicious code, denial of service (DDoS) attacks (Sauter, 2014, p.12), password cracking, insertion of unauthorized code, and many more. It also limits federal jurisdiction in cases involving computers belonging to the federal government or to certain financial institutions, as well as interstate computer crimes. The primary purpose of this law is to deter domestic hacking of government or other institutional computer systems. Specific sections under the CPAA and 18 U.S. Code § 1030 cover seven separate offenses. The first section is not of direct significance to this case, as it deals with computer espionage, and it is written much like the Espionage Act of 1917, adding provisions concerning foreign relations. The second is computer trespassing and stealing government, financial, or commerce information. The third section is concerned with criminals specifically trespassing in a computer owned by the government. The fourth deals with computer fraud. The fifth section prohibits damaging a protected computer using viruses, worms, and other technological weapons of destruction. Finally, the sixth and seventh sections cover trafficking in passwords to government or commerce computers and threatening to damage a protected computer. As of a 2008 amendment, threats to steal data from a computer or publicly disclose said stolen data, or to not repair the damage that a hacker already made on the computer are expressly prohibited. ( 18 U.S.C. § 1030 ) Two of the most widely reported cases prosecuted under the CFAA were those of self­described hacktivists Aaron Swartz (Bilton, 2011) and Jeremy Hammond (Stampler, 2013). Swartz was a renowned entrepreneur and activist whose unauthorized attempt to publicise a collection of academic research journals got him arrested. Faced with 35 years in prison and 13 felony charges, he tragically took his own life in 2013. Hammond had been associated with the hacktivist group Anonymous, and his hack against the security company Stratfor earned him a 10 year prison sentence under this law. Since these occurrences, particularly the suicide of Aaron Swartz, many legislators and members of the public have pushed for reforms to the CFAA stating that, “The government was able to bring such disproportionate charges against Aaron because of the broad scope of the Computer Fraud and Abuse Act (CFAA) and the wire fraud statute.” They argue that interpretations of this law with its vague wording would “criminalize many everyday activities and allow for outlandishly severe penalties” (Reilly, 2013). This lack of specificity opens up a lot of opportunities for legal abuse, so these critiques are convincing. Historically, laws are passed reactively, but ideally legislators should enact laws that take current technology into account and that allow prosecutors to examine motive when considering sentencing. The US government has generally tried to avoid sending its citizens to prison for crimes where the offense is inconsequential and the consequences minimal. Hacking is often a nonviolent crime because the property damage is rarely permanent. The CFAA allows for sentences more severe than those for rapists and murderers. Similar property damage crimes are typically handled with much shorter jail sentences and repayment of monetary damages. There is an obvious need to evaluate actual case and give prosecutors guidance for more appropriate sentencing.

Debugging The vague wording used in the existing law, 18 U.S.C. § 1030, allowed prosecutors to charge Aaron Swartz with so many offenses that he felt the only thing he could do was end his life. The amount of charges were possible because the specifics of the CFAA are not explicitly defined creating many situations where people are breaking the law without any knowledge of actually doing wrong. Ignorance of the law is not an excuse, but even so, does accessing an insecure hot spot from the parking lot of a coffee shop warrant 35 years in prison? The CFAA places many in the cross hairs of the law as hacktivism continues to increase. When the specifics of something as serious as computer fraud are left to the interpretation of those who wrote the law the issues truly affect everyone involved. As the use of technology continues to grow at a rapid pace and the CFAA is sitting idle it seems likely that there will be more inappropriate charges and possibly sentences for otherwise minor incidents. This truly impacts both sides of the table as lawmakers are exploited for their inability to follow the tech trends and unnecessarily seek “hardened criminals.” Aaron’s Law is a cogent demonstration of how disconnected the CFAA is to current technology and its use. The idea behind Aaron’s Law is replacing the vague portion of the CFAA that reads, “exceeds authorized access,” with “circumvention of technological measures designed to prevent unauthorized access” (Murfin, 2014). This clarification would give much­needed guidance to lawyers and judges to assist them in the properly assessing the incident, bringing appropriate charges, and sentencing defendants. The extreme sentences that attempt to make an example out of hackers are more likely to contribute to the animosity people already feel towards the government. This is partly due to the fact that many consider violent crimes to be much worse than non­violent crimes, such as hacking. Therefore violent criminals are the ones that deserve harsh sentences and the full weight of the justice system. In comparison to blood being spilt on the streets, “messing up” someone’s computer hardly fits the hardened criminal criteria. The current status quo has lawmakers seen as overstepping their authority, and regular technology users confused about what use constitutes a crime leading them to unknowingly being classified as "criminals." An overhaul of the CFAA is overdue. While it is true that the damage done by hacking can be detrimental to the common good in addition to organizations targeted in the attack, we must realize that most often the crime does not match the punishment. When hacktivists cause damage, there needs be an appropriate legal punishment available from the justice system. All parties would benefit from a narrower definition of the CFAA, and a broader range of consequences such that the punishment can fit the crime. Breaking the law is certainly not condoned. However, any law written, especially those concerning technology, should appropriately address the incident. While many hacktivists do not intend to harm the general public, it does happen. Because hacktivism exists on so many different levels there needs to be a better way to approach the situation without making examples out of hackers when the crime is far less disruptive in nature. Using an outdated law and using fear as a future deterrent is pure laziness from the lawmakers when it is their job to create appropriate laws for all to abide by and understand.
Clean‐Up It is hard to deny the growing presence of the internet in the lives of citizens both in the United States and globally. As technology has continued to advance, more and more of the daily activities people participate in are occurring online. As businesses, personal identities, and recreation­ and therefore money and information­ flow to an online forum, it is inevitable that some look for a way to cheat the system. While the agenda of these individuals range from moral to selfish, one thing has become abundantly clear: legislation has not advanced at a pace equal to that of technology. Even though non­violent protests of certain types are considered free speech and legal in the real world, activities that many consider the equivalent in an online setting are illegal. Especially in a digital forum, freedom of speech and protection of property are equally as important, and many would consider these to be two of the most primary functions of the internet. Therefore, looking at the conclusions of current cases brought against both hacker and hacktivists alike, it is apparent that current legislature needs clarification and additional laws addressing internet activity need to be decisively made if the internet is going to be a free yet safe environment for everyone. References
Assange, J. (2006, November 25­27). The Curious Origins of Political Hacktivism.
CounterPunch . Retrieved from http://www.counterpunch.org/2006/11/25/the­curious
­origins­of­political­hacktivism/
Bilton, N. (2011, July 19). Internet Activist Charged in M.I.T. Data Theft. The New York Times.
Retrieved from http://bits.blogs.nytimes.com/2011/07/19/reddit­co­founder­charged­with
­data­theft/
Brand, S. (1987). The Media Lab: Inventing the future at MIT . New York, NY: Viking.
Casserly, M. (2012, December 3). What is Hacktivism? A short history of Anonymous, Lulzsec and the Arab Spring. PC Advisor. Retrieved from http://www.pcadvisor.co.uk/features
/internet/3414409/what­is­hacktivism­short­history­anonymous­lulzsec­arab­spring/
Coleman, G. (2014). Hacker, hoaxer, whistleblower, spy: The story of anonymous. Brooklyn,
NY: Verso.
Computer Fraud and Abuse Act of 1986, 18 USC § 1030
C­SPAN. (2012, April 14). Parmy Olson on Internet hacker group 'Anonymous'. [Video File].
Retrieved from: https://www.youtube.com/watch?v=qeSEQpkcYaA
Docherty, N., MacIntyre, L., Canadian Broadcasting Corporation., WGBH Educational
Foundation., & PBS Video. (2001). Frontline: Hackers. Alexandria, VA.
Electronic Communications Privacy Act of 1986, 18 USC § 2510, § 2701 et seq., § 3121 et seq. Firat, B., & Kuryel, A. (2011). Cultural activism: Practices, dilemmas, and possibilities .
Amsterdam: Rodopi B.V.
Gustin, S. (2010, December 13). Gawker media websites hacked, Staff and user passwords leaked. Wired . Retrieved from http://www.wired.com/2010/12/gawker­hacked/ hacktivism. (n.d.). Dictionary.com Unabridged . Retrieved October 08, 2014, from http://dictionary.reference.com/browse/hacktivism Ludlow, P. (2013, January 13). What is a ‘Hacktivist’? The New York Times . Retrieved from http://opinionator.blogs.nytimes.com/2013/01/13/what­is­a­hacktivist/ Mail and wire fraud, 18 USC § 1343.
Manhire, T. (2012, March 1). Kim Dotcom: I'm no piracy king. The Guardian . Retrieved from http://www.theguardian.com/technology/2012/mar/01/kim­dotcom­no­piracy­king Manning, C. (2014, June 14). The fog machine of war. The New York Times . Retrieved from http://www.nytimes.com/2014/06/15/opinion/sunday/chelsea­manning­the­us­militarys ­campaign­against­media­freedom.html
Misiko, H. (2014, July 30). How Anonymous and other hacktivists are waging war on Kenya.
The Washington Post . Retrieved October 20, 2014, from http://www.washingtonpost.com
/blogs/worldviews/wp/2014/07/30/how­anonymous­and­other­hacktivists­are­waging
­war­on­kenya/ Murfin, M. (2014). Aaron's law: Bringing sensibility to the computer fraud and abuse act.
Southern Illinois University Law Journal , 38(3), 469.
Olson, P. (2012). We are Anonymous: Inside the hacker world of Lulzsec, Anonymous, and the global cyber insurgency . New York: Little, Brown and Co.
Pipkin, D. L. (1997). Halting the hacker: A practical guide to computer security . Upper Saddle
River, NJ: Prentice Hall PTR.
Reilly, R. (January 15, 2013). Zoe Lofgren introduces 'Aaron's Law' to honor Swartz on Reddit.
Huffington Post . Retrieved from http://www.huffingtonpost.com/2013/01/15/zoe­lofgren
­aarons­law­swartz_n_2483770.html
Rouse, M. (2013, May). Distributed denial­of­service attack (DDoS). SearchSecurity . Retrieved from http://searchsecurity.techtarget.com/definition/distributed­denial­of­service­attack
Sauter, M. (2014). The coming swarm: DDoS actions, hacktivism, and civil disobedience on the
Internet . New York, NY: Bloomsbury.
Stampler, L. (2013, November 15). Hacktivist Jeremy Hammond sentenced to 10 years in jail.
Time . Retrieved from http://nation.time.com/2013/11/15/hacktivist­jeremy­hammond
­sentenced­to­10­years­in­jail/
Who's Responsible? Computer Crime Laws. (2001). Retrieved October 23, 2014, from http://www.pbs.org/wgbh/pages/frontline/shows/hackers/blame/crimelaws.html

Similar Documents

Premium Essay

Solution to Case Stury - Warren Buffett

...Assessment of the eight major elements of Buffet's investment philosophy: 1 Economic reality, not accounting reality. Analysis: One tends to agree with Buffett on this philosophy. Accounting is a product of many estimates and judgments. It is essentially a rear-view mirror, looking back at what has happened. To add to the problem the view changes with each new accounting period. In contrast the economic reality is the view through the windshield at what lies ahead. It consists of intellectual property, creativity, know-how and the network of production and distribution systems. The brands and trademarks of a business are the symbols of the economic reality – symbols that indicate the reputation of the company. The economic reality changes much more slowly than the accounting reality as it is dependent on the response of the markets to new products and services that the company has to offer or to any substantive changes - up or down - in corporate reputation. 2. The cost of the lost opportunity. Analysis: Here Buffett is building on the economic principle of the efficient use of scarce resources where the notion of opportunity cost plays a crucial part in ensuring that resources are being used efficiently. The true cost of an investment is what you give up (opportunity) to get it. This includes not only the money spent in buying that asset but also the economic benefits that one has to do without because one bought that particular asset and thus can...

Words: 1340 - Pages: 6

Free Essay

Family

...With these developments, it is obvious that conflicts between parties of different nationalities occur and liability to tax on income of foreigners especially among those engaging in trading venture. Whilst the laws affecting domicile and residence may be sufficiently settled, it is paramount for courts to pursue a detailed analysis to ascertain specific preliminary issues so as to avoid controversial rulings. Courts often handle numerous financial cases that involve what can be best described as foreign or international elements. In such cases, court must decide whether it has the jurisdiction under the Family Law Act 1975 to make a decision on such cases. In the event that it is determined that the court is invested with the jurisdiction to determine the case, the court has to consider whether there is a system of law in foreign country that also has the jurisdiction to handle the case. As it was addressed in the case Attorney General of New Zealand v Ortiz [1984] AC 1, these benefits and costs to either party if the case resolution is made in foreign country as compared with the apparent country should also be a subject of concern. [1] Legal systems in most countries around the world adopt community property regime, which takes effect at the inception of marriage or at the time of divorce. For instance, California and Massachusetts in the United States have adopted community property regimes that support equal division of assets upon divorce. However, this provision...

Words: 659 - Pages: 3

Premium Essay

None

...Adapted from Bernhardt & Kinnear (1988). Cases in marketing management, pp. 6-16. Plano, TX: Business Publications, Inc. Pay careful attention to the following points. They are often used by instructors to evaluate either a written or oral analysis. 1. Be complete. Each area of the situation analysis must be discussed, problems and opportunities identified, alternative presented and evaluated using the situation analysis and relevant financial analysis, and a decision must be made. An analysis that omits part of the situation analysis or only recognizes one alternative is not a good analysis. Second, each area must be covered in-depth and within insight. 2. Avoid rehashing case facts. Every case has a lot of factual information. A good analysis uses facts that are relevant to the situation at hand to make summary points of analysis. A poor analysis just restates or rehashes theses facts without making relevant summary comments. 3. Make reasonable assumptions. Every case is incomplete in terms of some piece of information that you would like to have. A good case analysis must make realistic assumptions to fill in the gaps of information in the case. For example, the case may not describe the purchase decision process for the product of interest. A poor analysis would either omit mentioning this or just state that no information is available. A good analysis would attempt to present this purchase decision process by classifying the product and drawing upon real life...

Words: 487 - Pages: 2

Free Essay

Save Me

...are given. It is understandable then that we should seek out more opportunities to apply our skills and make more positive impacts within our jurisdictions. It is this general attitude that led us to get involved in investigating cold cases. How We Got Started Mark had, for several years, been consulting with our Coroner’s Division as a forensic anthropologist. During this time he came to learn that there were numerous coroners’ cases in which the identity of the decedent was unknown. These cases were kept in three-ring binders on a shelf in the Sergeant’s office. Over the years, in the course of this forensic work, we would discuss these cases and the progress that was being made on them. The conversation usually ran along the lines of us asking “any luck with that 1980 homicide victim?” and the sergeant answering “well, we’ve gotten so many new cases that I haven’t been able to even look at it yet.” This went on for a few years and through two different sergeants. One day we, as a crime analysis unit, were brainstorming about how we could broaden our “client base”, as it were. We had been successful in integrating ourselves into our Investigations Bureau and had been involved in numerous major cases. And, of course, we had always been active in producing tactical and strategic analyses for our patrol personnel. But we knew that we could be doing more, particularly given the size and responsibilities of our agency. It was during...

Words: 412 - Pages: 2

Free Essay

Business Case

...BUSINESS CASE Presented to the Accountancy Department De La Salle University In partial fulfillment Of the course requirements In ACCTBA2 (C33) March 2, 2015 A stakeholder is typically concerned with an organization delivering intended results and meeting its financial objectives. In general, a stakeholder can be one of two types: internal (from within an organization) or external (outside of an organization). The stakeholders in this situation are Lanie Marquez and Tim Rodriguez who are also partners in the retail distribution business and their capital contributions are as follows P500,000 and P300,000 respectively they are an internal stakeholder since they are also the owners. The total Capital of both stakeholders is P800,000 and with a monthly salary for both partners at P15,000 on the assumption that both of them will contribute to manage the business equally. Assuming that both managed the business equally the total salary for the year for Lanie and Tim are P180,000 each. They share profit and loss equally and no interest will be given on capital contributed. The problem for this situation is that Lanie is starting to get concerned with the behavior of her other partner Tim. He only manages the business 50% of the time, which will mean that his salary of P15,000 will need to decrease by also 50% since he does not manage the business equally with his partner. The business has seen a downturn in the profit outcome and for the current financial...

Words: 758 - Pages: 4

Premium Essay

Ralph's Grocery Case Summary

...Ralph’s Grocery and United Food and Commercial Workers Union The case that I chose for the week 6 critical thinking assignment concerns Ralph’s Grocery Company, located in California. It applies to this week’s material due to the fact that the case involves unlawful suspension and discharge of an employee, as reviewed by the National Labor Relations Board. Background In May 2011, Vittorio Razi was an employee at Ralph’s Grocery and was suspended and terminated after he refused to take a drug test without first consulting with his UFCW Local 324 representative. The company (Respondent) says that on the day in question, Razi’s behavior was in question, acting nervous, anxious, agitated, and slurred speech. After a couple managers discussed the...

Words: 750 - Pages: 3

Premium Essay

Chromogens Affecting Wealth Wear Staining Teeth

... Many people wonder why their own teeth stain so easily. The enamel on your teeth and chromogens are what stains your teeth, but what exact beverage stains teeth the most? I chose this topic because I was curious to know what stains teeth the most. It affects us daily because it could rot your teeth or you can’t pick up hot chicks anymore. So what causes teeth to stain? The temperature causes teeth to expand or contract making it easier for stains. So hot and cold drinks affect that. Color in foods and beverages come from chromogens. Chromogens are intensely pigmented compounds that stick to teeth enamel. Chromogens cause a lot of trouble when they mix and react with other stain causing and stain promoting factors. Tannis may be natural or synthetic tannis is another factor that stains teeth. Tooth enamel is porous making it extremely susceptible to stains. The darker the liquid the darker the stain. There are some examples that stain teeth. Not only sodas bad but also Gatorade. Beets are bad for you also. Mostly cause they’re concentrated. Berries dark skins stain teeth. Ketchup is also really bad because of its bright red color and high levels of acid. Dark liquids and sauces you put on your foods also stain teeth. Colored candy and popsicles both contain colorants that will transfer to the teeth and embed in the porous enamel. Fruit juices, especially grape and cranberry, leave a colorful tinge on the teeth and tongue. Colored sodas instantly discolor teeth. The citric acids...

Words: 594 - Pages: 3

Free Essay

Fin 571

...efficient investigative products and services. As a result, the coverage requirements for ANACI and NACLC investigations have been enhanced to support a common content baseline for all agencies. Note that these enhancements apply only to those ANACI and NACLC cases submitted on an SF 86. The purpose of this FIN is to provide you with information concerning what case coverage changes have been made. The case price adjustments necessary to support these changes will be reflected in the FY 2007 case prices. ANACIINACLC Cases Currently, listed and developed issues which are identified in ANACI and NACLC cases (for non-DoD customers) are not pursued beyond the normal scope of the investigation. These cases are returned to the requesting agency so that the agency may decide whether to adjudicate the case based upon the information in hand, conduct additional follow-up themselves, or request a Reimbursable Suitability Investigation (RSI) from FISD to cover the additional issues. Beginning with FY 2007, expansion of these issues will become a standard part of both the ANACI and NACLC products. Effective October 1, 2006, issues apparent at scheduling or developed during the course of the investigation and which fall within the 5-year case coverage period, unless otherwise noted, will be expanded upon according to the following chart (exception: issues which are known to have been covered in previous investigations, or which would reasonably have been expected to...

Words: 772 - Pages: 4

Free Essay

Getting Ready for a Midterm

...find that you would like even more time. I recommend that you enter the exam promptly since I will make deductions for those exceeding the 9:00 o'clock end time even if you enter late. Third, know that the legal reasoning essay will come from Module 4 on immunity. The variety of scenarios in that question will force you to think about and explain the nuances between sovereign and personal immunity, between absolute and qualified immunity, about loss of immunity, etc. You will want to understand all four cases from that module well before the exam. I will expect specific citations to the cases and the principles that they enunciate. An additional case that might be useful for you to look at is Canton v. Harris. A second question will address the rulemaking process and the principles underlying it. You should "walk into" the exam (in a virtual sense) with a clear sense of a fully articulated rulemaking process, so that you can pick and choose elements as appropriate in the case you will be presented. The third question will be drawn from the text regarding the Constitutional framework. Finally, remember that "open book" exams can be as challenging as closed book because the "bar" (the expectation) is higher. I think you will find that prior preparation will make a good deal of difference. As stated before, when you open the exam, answer the questions initially in word and copy it back to the exam. That way, you will not lose work, time...

Words: 342 - Pages: 2

Premium Essay

Compensation Culture

...in which it is acceptable for anyone who has suffered a personal injury to seek compensatory damages through litigation from someone connected with the injury. It’s the idea that for every accident someone is at fault. For every injury, there is someone to blame. And, perhaps most damaging, for every accident, there is someone to pay. There are so many ridicilous cases througout history where people sue somebody or some company for no reason and get a lot of money from them. For example . A caretaker fell off a ladder and sued the local authority for not training him to use a ladder - and won.He could get up to 50.000 pounds compensation. One former ex policeman received nearly £90,000 compensation for the trauma of seeing a woman die after he crashed into her car during a 999 call .The husband of the woman killed by the policeman received £16,000 compensation. Policemen cause a tremendous number of accidents - so many, indeed, that one force has stopped its drivers from speeding. The effect is damaging to society. The courts become clogged up with greedy people out for themselves, many with no real case at all while other people with real compensation claims, the people disabled in accidents, crippled in operations or people who have lost loved ones due clear negligent behavior. All the other who just sue somebody with ridicilous acusations should be ashamed of themselves and I hope that in the future others avoid trying to cash in just because it seems so easy...

Words: 266 - Pages: 2

Premium Essay

Business

...Case - Swisher System Corporation I. Company Background: Swisher Systems Corporation (SSC) is an industrial heating company which was established in 1949. SSC is an innovator of flexible heating products, especially with its knit and braided heating element. The heating element is multi-stranded resistance wire that is knit and braided with fibreglass and is the base technology for almost all SSC products. SSC is known in the industry as being the highest quality flexible heat supplier which produces control devices and heating cable. SSC’s competitive advantage is on the quality products which maintains higher and safer temperature that are more flexible than their competitors or other products in the market. II. Facts of the Case: A. Mike Watkins  Director of Purchasing for Swisher Systems Corporation  Solely responsible for purchasing all materials of SSC.  Has various experiences in material management prior to SSC.  Has more than thirty-five (35) years of industrial purchasing experience. B. Products at Swisher Systems  All SSC products are solutions to industrial heating applications  SSC manufactures fifty percent (50%) standard products and fifty percent (50%) custom orders. o The custom products can be applied to virtually all industries that require heating products. Industries like semi-conductors, food processing, medical, petrochemical and others.  Biggest contributor of SSC’s sales is the cloth heating jacket, though expensive...

Words: 296 - Pages: 2

Free Essay

Ism 5014-Enterprise Information Systems

...certify that I am the author of this paper and that any assistance I received in its preparation is fully acknowledge and disclosed in the paper. I have also cited any sources from which I used data, ideas of words, whether quoted directly or paraphrased. I also certify that this paper was prepared by me specifically for this course. Student Signature: z ******************************************* Instructor’s Grade on Assignment: Instructor’s Comments: The cases that we analyzed as a group as part of the class requirements were very interesting. I was able to relate to both cases especially due to the company I work for. Case number 1, was related on how to survive and adapt to a new market place. As the company I work expands, it continues to navigate and explore new markets with the different products it manufactures. Case number 2, concentrated on how pay attention to contracts and making sure one does its homework before making any type of decisions. I was able to learn from both cases different type of information system solutions and how to manage it. The group projects were very helpful by allowing us to learn how to communicate and work together as a long distance team. It was very hard at first, especially because one of the team member drop the course one week before our first project was due. However, we shined as a group and we were able to complete the project in a timely manner. I learned that the best way to get a long distance project done is...

Words: 461 - Pages: 2

Premium Essay

D Unger V. Ed Rachal Foundation Summary

...Final Case Brief FACTS: Claude D’Unger worked for the Ed Rachal Foundation. This foundation owned a ranch that shared a border with the Rio Grande. Frequently, migrants would cross through the ranch. D’Unger suspected that another ranch employee was harassing migrants. Despite being told by his CEO to drop the issue, D’Unger contacted the authorities. It came out that there was no crimes committed, and D’Unger was fired as a result of his actions. Claude D’Unger claimed that the Foundation had breached its contract and that he had been wrongfully terminated and sued on these grounds. He also sued his CEO, Paul Altheide, claiming he had commited tortious interference. The county judge who reviewed his case ruled in favor of D’Unger, but a court of appeals reversed the breach of contract and...

Words: 422 - Pages: 2

Free Essay

Business Case for Hr Self Service Systems

...Business Case for HR Self Service Systems Table of Contents Executive Summary 3 Project Overview 3 Business Case for Proposed Project 4 Conclusion 5 References 5 Executive Summary This paper addresses the business case for implementing self service in the IT industry with the aim of gaining higher efficiency for a majority of HR functions and other benefits that can be derived from improved information access. The paper also discusses the various challenges an organization might face while attempting to implement self-service. The business case for self service revolves around reducing administrative costs and gaining better efficiency. It also aims at improving the overall performance and other benefits such as information management, trend analysis and also operational efficiency. The chief argument presented here is that a self-service initiative allows the HR to concentrate more towards the core functions such as people management instead of getting burdened with administrative tasks. While self-service has the ability to improve the service expectations from HR, it may also result in some of the savings being consumed in order to meet the higher quality expectations. However, on the long run, it is bound to reduce expenses to a great extent while enhancing the quality. Self-service also enables an organization to implement flexible work and helps employees to remain connected with the organization through a centralized HR system aimed at remote...

Words: 1107 - Pages: 5

Premium Essay

Random

...Ethics At Airbus 1) In each of the cases described above who benefits and who suffers from the alleged ethical and legal lapses of Airbus? Ans – When we observe across cases, its mostly the state and the airline company who is at loss due to these legal and ethical lapses Airbus – Sabena Case: As long as Van Espen’s case does not prove anything against any party, Airbus has gained significantly from the deal as it would have earned around $5bn order from the deal. The party which suffered significant loss should be the state as the Belgian government had 50.5% stake KAC – Airbus: Airbus gained a much needed order bill of around $1.1bn and possible order of $0.9bn, the employees of KAC Mr Al Mishari and its subsidiary ALAFCO, Dr. Mallalah & Mr El Fekih possibly would have earned (only a possibility) whereas the state of Kuwait higher costs, lost cash, earned higher depreciation costs and probably had to write-off it off India Inc. & Airbus: Airbus like all other cases earned the order book despite Boeing offered a deal to the Indian government $140mn cheaper. The state and eventually the airline paid $140mn more, raising its depreciation costs, debt service costs and got hold of carriers which were not properly tested thus risking the life of passengers Across cases observed, Airbus has been smart enough to save itself a persecution almost anywhere and has got large order books worth billions of dollars acquiring half of the market share but if Airbus is found...

Words: 981 - Pages: 4