This document is a declaration by Antoinette B. Shiner, the Information Review Officer for the Litigation Information Review Office at the Central Intelligence Agency (CIA). It provides additional details regarding the CIA's searches and withholdings in response to a Freedom of Information Act (FOIA) request from MuckRock, LLC regarding objections to agency data gathering practices. Specifically, it describes the CIA's supplemental searches using the same terms as before and additional hard copy searches that did not uncover any new records. It also explains that upon re-review, one document is now being released in full and another is being released in part, but that information in the other two documents remains exempt from release under FOIA Exemption 3 to
Судья приказал Google выдать почту пользователя с зарубежных серверовAnatol Alizar
This memorandum addresses the government's motions to compel Google to comply with two search warrants issued under the Stored Communications Act. Google has partially complied by producing data stored in the US, but has refused to produce other data, relying on a recent Second Circuit decision. The court must determine whether Google must disclose electronic data stored outside the US pursuant to these search warrants targeting US persons under investigation for crimes occurring solely in the US.
Department of homeland security foia 2016 hqfo-00609 acknowledgmentBryan Johnson
From our initial FOIA request,
"The purpose of is FOIA is to provide the public with knowledge of why DHS' enforcement operations overwhelmingly targeted family units and unaccompanied minors who were ordered removed in the Charlotte and Atlanta Immigration Courts."
This document is a motion filed by the State of Texas seeking to file a bill of complaint against Pennsylvania, Georgia, Michigan, and Wisconsin challenging their administration of the 2020 presidential election. Texas alleges that these states unconstitutionally changed their election laws, resulting in significant irregularities. Texas argues that non-legislative actors improperly amended election statutes, treated voters differently in different areas, and weakened ballot integrity measures. Texas requests that the Supreme Court delay the deadline for states to certify electors to allow investigations into these issues.
This document is the Defendant's response to the Plaintiff's motion for summary judgment in a FOIA case. It argues that the Plaintiff's motion should be denied for the following reasons: 1) the records sought were compiled for a law enforcement purpose by the FBI; 2) Exemption 7(A) applies because disclosure of the records could reasonably interfere with an ongoing law enforcement investigation by another agency; 3) affidavits submitted by the FBI are presumed to be made in good faith and the FBI's invocation of exemptions is entitled to deference. The response provides undisputed facts and arguments supporting the application of Exemption 7(A) to withhold the requested records.
Recycling of Cellular Telephones in Mainepleasure16
This document is a memorandum opinion from a United States District Court regarding the government's application for an order authorizing the installation and use of a pen register and caller identification system on two telephone numbers and the production of real-time cell site information. The court initially denied the application, finding the government needed to show probable cause to obtain real-time cell site information. The government then submitted a letter arguing existing statutes allow such information upon less than probable cause. The court examines these statutes and determines they do not authorize access to real-time cell site information without a showing of probable cause.
Right To Privacy Under OPRA Newsletter 050109Todd Ruback
The New Jersey Supreme Court upheld a lower court ruling that residents have an expectation of privacy in their personal information contained in public records. The case involved a request for bulk release of land title records containing social security numbers and other personal data. The Court found that personal information like SSNs must be redacted from records before release under the Open Public Records Act to balance privacy and disclosure. Requestors must pay redaction costs. The ruling provides guidance for governments on balancing privacy and access rights when releasing records with personal information.
Ministry of Justice's 14 January 2020 response to Freedom of Information request originally submitted 7 September 2019, though due to obstruction by whatdotheyknow and obfuscation tack-ticks by MoJ (changing reference numbers etc) the effective submission date deemed by the MoJ was 15 December 2019. Eventual reference number: 191215005, original 190907001 and other previously quoted numbers 191020004 and 191125041. Concerns late production and backdating of documents designed to ‘plug gaps’ and corruption of documents by conflation, amendment or post-dated creation.
This letter from the U.S. Attorney's Office requests to admit evidence of uncharged acts by the defendants in a criminal case involving computer hacking and harassment. The defendants, Felix Roque (the mayor of West New York) and his son Joseph Roque, are charged with conspiring to disrupt a website critical of Felix's administration through hacking into email and social media accounts. The prosecution seeks to introduce evidence that after obtaining information from the hacked accounts, Felix contacted individuals associated with the website to harass and intimidate them, as this evidence directly proves the charged conspiracy and harassment offenses.
Судья приказал Google выдать почту пользователя с зарубежных серверовAnatol Alizar
This memorandum addresses the government's motions to compel Google to comply with two search warrants issued under the Stored Communications Act. Google has partially complied by producing data stored in the US, but has refused to produce other data, relying on a recent Second Circuit decision. The court must determine whether Google must disclose electronic data stored outside the US pursuant to these search warrants targeting US persons under investigation for crimes occurring solely in the US.
Department of homeland security foia 2016 hqfo-00609 acknowledgmentBryan Johnson
From our initial FOIA request,
"The purpose of is FOIA is to provide the public with knowledge of why DHS' enforcement operations overwhelmingly targeted family units and unaccompanied minors who were ordered removed in the Charlotte and Atlanta Immigration Courts."
This document is a motion filed by the State of Texas seeking to file a bill of complaint against Pennsylvania, Georgia, Michigan, and Wisconsin challenging their administration of the 2020 presidential election. Texas alleges that these states unconstitutionally changed their election laws, resulting in significant irregularities. Texas argues that non-legislative actors improperly amended election statutes, treated voters differently in different areas, and weakened ballot integrity measures. Texas requests that the Supreme Court delay the deadline for states to certify electors to allow investigations into these issues.
This document is the Defendant's response to the Plaintiff's motion for summary judgment in a FOIA case. It argues that the Plaintiff's motion should be denied for the following reasons: 1) the records sought were compiled for a law enforcement purpose by the FBI; 2) Exemption 7(A) applies because disclosure of the records could reasonably interfere with an ongoing law enforcement investigation by another agency; 3) affidavits submitted by the FBI are presumed to be made in good faith and the FBI's invocation of exemptions is entitled to deference. The response provides undisputed facts and arguments supporting the application of Exemption 7(A) to withhold the requested records.
Recycling of Cellular Telephones in Mainepleasure16
This document is a memorandum opinion from a United States District Court regarding the government's application for an order authorizing the installation and use of a pen register and caller identification system on two telephone numbers and the production of real-time cell site information. The court initially denied the application, finding the government needed to show probable cause to obtain real-time cell site information. The government then submitted a letter arguing existing statutes allow such information upon less than probable cause. The court examines these statutes and determines they do not authorize access to real-time cell site information without a showing of probable cause.
Right To Privacy Under OPRA Newsletter 050109Todd Ruback
The New Jersey Supreme Court upheld a lower court ruling that residents have an expectation of privacy in their personal information contained in public records. The case involved a request for bulk release of land title records containing social security numbers and other personal data. The Court found that personal information like SSNs must be redacted from records before release under the Open Public Records Act to balance privacy and disclosure. Requestors must pay redaction costs. The ruling provides guidance for governments on balancing privacy and access rights when releasing records with personal information.
Ministry of Justice's 14 January 2020 response to Freedom of Information request originally submitted 7 September 2019, though due to obstruction by whatdotheyknow and obfuscation tack-ticks by MoJ (changing reference numbers etc) the effective submission date deemed by the MoJ was 15 December 2019. Eventual reference number: 191215005, original 190907001 and other previously quoted numbers 191020004 and 191125041. Concerns late production and backdating of documents designed to ‘plug gaps’ and corruption of documents by conflation, amendment or post-dated creation.
This letter from the U.S. Attorney's Office requests to admit evidence of uncharged acts by the defendants in a criminal case involving computer hacking and harassment. The defendants, Felix Roque (the mayor of West New York) and his son Joseph Roque, are charged with conspiring to disrupt a website critical of Felix's administration through hacking into email and social media accounts. The prosecution seeks to introduce evidence that after obtaining information from the hacked accounts, Felix contacted individuals associated with the website to harass and intimidate them, as this evidence directly proves the charged conspiracy and harassment offenses.
Thomas Woznicki vs. Jeff Moberg (Decision, Wisconsin Court of Appeals)SteveJohnson125
This Decision, filed with the Wisconsin Court of Appeals on October 4, 2016, concludes as follows: “We conclude that Woznicki has failed to demonstrate that a public interest in nondisclosure of his District personnel file outweighs the strong and presumptive public interest in access to, and disclosure of, his personnel file under Wisconsin’s open records law. We therefore affirm the order denying Woznicki’s request for an injunction.
By the Court.—Order affirmed.”
This document is a second amended complaint filed by the State of Hawaii and Dr. Ismail Elshikh challenging President Trump's March 6, 2017 executive order restricting entry to the U.S. from six predominantly Muslim countries. The complaint alleges that the executive order violates the Establishment Clause of the First Amendment and federal immigration law by discriminating against Muslims. It asserts that the order harms Hawaii's economy, educational institutions, and sovereign interests in welcoming people from around the world. The plaintiffs seek to invalidate portions of the executive order.
This order grants the plaintiff's motion to convert a temporary restraining order into a preliminary injunction blocking enforcement of Sections 2 and 6 of President Trump's Executive Order 13780, also known as the "travel ban". The court found that the plaintiffs, the State of Hawaii and Dr. Elshikh, showed a strong likelihood of success on the merits of their claim that the Executive Order violates the Establishment Clause of the U.S. Constitution. The court also found that irreparable harm is likely if injunctive relief is not granted, and that the balance of equities and public interest favor blocking enforcement of Sections 2 and 6 of the order.
National Security Authorities Transparency Report 2013The Hacker News
The document provides statistics on the US government's use of national security authorities in 2013, including:
- 1,767 orders under FISA titles I, III, and IV affecting 1,144 targets; 1 order under section 702 of FISA affecting 89,138 targets.
- 178 applications under FISA title V affecting 172 specific subjects and 423 selectors under the NSA call records program.
- 19,212 national security letters issued resulting in 38,832 requests for information.
Wisconsin: Mailed Ballots Must Once Again Be Returned By Election Day, Court ...Baker Publishing Company
Mailed ballots in Wisconsin must be received by elections officials by election day, Nov. 3, to be counted, a federal appeals court ruled Thursday in a reversal of a previous decision that would have given extra time for ballots to be counted through Nov. 9 so long as they were postmarked by Nov. 3.
The latest ruling in the case, which may well be challenged at the US Supreme Court, means the deadline for absentee ballots to arrive remains at 8 p.m. on election day as is spelled out under state law. Judge William Conley, a federal judge in Wisconsin’s Western District, initially extended to Nov. 9 the deadline for ballots to arrive at local election clerks’ offices to account for an expected surge in mail-in ballots due to the coronavirus pandemic and anticipated mail service slowdowns caused in part by President Donald Trump and Postmaster Louis DeJoy’s intentional throttling of the US Postal Service ahead of the election.
California Says No to Weed for Prisoners and Inmates in JailEvergreen Buzz
No weed in jail says California, read this https://cannabis.net/blog/news/no-pot-in-prison-california-court-rules-that-inmates-cannot-have-marijuana-while-in-jail
Fisc usg motion to resume bulk data spyingAnonDownload
This document is the United States' response to a motion opposing the government's request to resume bulk data collection under Section 215 of the Patriot Act for a 180-day transition period. The response argues that Section 215, as amended by the USA FREEDOM Act, authorizes the Foreign Intelligence Surveillance Court to approve the bulk production of call detail records for 180 days as the government transitions to the new targeted production procedures under the USA FREEDOM Act. The response also argues this bulk collection is consistent with the Fourth Amendment.
The document provides information to obtain search warrants for multiple locations related to a drug investigation. It describes offenses of possession and trafficking of marijuana allegedly committed by Alexander LISI on October 1, 2013. The affidavit requests search warrants for a vehicle, residence, commercial unit, detached garage, and second residence, believing evidence of the offenses will be found. The items sought include marijuana, drug paraphernalia, records, electronics, and surveillance equipment.
Thomas Woznicki vs. Dennis Erickson (Wisconsin Supreme Court Ruling)SteveJohnson125
This is a 1996 Wisconsin Supreme Court ruling pertaining to a former New Richmond High School teacher named Thomas Woznicki who successfully fought to prevent the release of his personnel and telephone records. The ruling established the “Woznicki Notice” precedent, which gives public employees in Wisconsin the right to challenge the release of certain public records.
Frequently Asked Questions on the judgment of the Court
of Justice of the European Union in Case C-311/18 - Data
Protection Commissioner v Facebook Ireland Ltd and
Maximillian Schrems
Why Does the DEA Want You To Grow More Marijuana and Mushrooms?Evergreen Buzz
DEA wants more marijuana growth, read this https://cannabis.net/blog/news/the-dea-wants-you-to-grow-more-weed-and-magic-mushrooms-for-research-purposes
Lewis Barbe vs. US - Freedom of Information ActLewis Barbe
This court case helped establish the Freedom of Information Act. Specifically, it ruled that the Secretary of Labor must provide training materials like manuals, slides and films to Lewis Barbe that were used to train OSHA inspectors. This established that agencies must make certain records publicly available, including policies, interpretations, opinions and staff manuals. It exempts private or sensitive personal information. The act aims to create transparency around government activities.
This complaint alleges that Google infringes four patents related to protecting computer systems from malicious software. The plaintiffs are co-inventors and owners of the patents. They allege Google infringes the patents through its Chrome web browser, Chrome for Android mobile browser, Chromebook computers, and Nexus mobile devices. The complaint brings four counts of patent infringement and seeks damages and injunctive relief.
This document introduces an open source hardware board called the Tinker Board. It has a powerful quad-core processor, 2GB of RAM, WiFi/Bluetooth connectivity, and various ports. The document discusses its intended uses for education, making, and IoT applications. It provides an overview of the board's specifications and compares its performance to the Raspberry Pi. Instructions are given for setting up the board along with answers to frequently asked questions.
This document is a complaint filed by Microsoft Corporation against the United States Department of Justice and Attorney General Loretta Lynch seeking a declaratory judgment that 18 U.S.C. 2705(b) is unconstitutional. The complaint argues that 2705(b) violates the First and Fourth Amendments by allowing the government to obtain secrecy orders preventing Microsoft from notifying its customers when their private data is seized, without adequate safeguards. Microsoft asserts that over the past 18 months it has received nearly 2,600 such secrecy orders, most with no time limit, undermining customer privacy and Microsoft's free speech rights.
This document is a class action complaint filed against Valve Corporation regarding illegal online gambling related to the video game Counter-Strike: Global Offensive (CS:GO). The complaint alleges that Valve knowingly allowed, supported and profited from illegal gambling by permitting players to bet virtual items called "Skins" on esports matches through third party gambling websites, even though many players were minors. The complaint asserts that Valve's actions violated RICO statutes by facilitating an illegal gambling operation. The plaintiff, a Connecticut resident who gambled and lost money on CS:GO Skins, is seeking to represent a class of players who were allegedly harmed by Valve's actions.
This document discusses the use of nasal grafts in rhinoplasty surgery. It describes various types of cartilage grafts including columellar struts, shield grafts, spreader grafts, dorsal onlay grafts, and grafts to augment the fronto-nasal angle. These grafts are often needed in revision cases to improve nasal function and breathing or achieve a desired nasal shape. The lecture contains images from surgery to illustrate how the grafts are used and their effects. Common graft materials include septal, auricular and costal cartilage.
Новые документы Сноудена подтверждают взлом сервера АНБAnatol Alizar
This document provides standard operating procedures for the operational management of FOXACID infrastructure. It describes the roles and objectives for FOXACID operators, details the missions supported by different FOXACID servers, and outlines procedures for loading and testing server software, plugins, payloads and filters. Troubleshooting steps are also provided for when servers go down.
Facebook обвиняют в плагиате проекта дата-центра в ШвецииAnatol Alizar
The document appears to be a legal case filing that was submitted to a federal court on March 23, 2015. It includes the case number, titles, and 23 numbered pages of text as part of the filing. However, without more context around the specific claims, parties, or issues in the case, it is difficult to provide a higher-level summary of the essential purpose or content of the legal filing.
Thomas Woznicki vs. Jeff Moberg (Decision, Wisconsin Court of Appeals)SteveJohnson125
This Decision, filed with the Wisconsin Court of Appeals on October 4, 2016, concludes as follows: “We conclude that Woznicki has failed to demonstrate that a public interest in nondisclosure of his District personnel file outweighs the strong and presumptive public interest in access to, and disclosure of, his personnel file under Wisconsin’s open records law. We therefore affirm the order denying Woznicki’s request for an injunction.
By the Court.—Order affirmed.”
This document is a second amended complaint filed by the State of Hawaii and Dr. Ismail Elshikh challenging President Trump's March 6, 2017 executive order restricting entry to the U.S. from six predominantly Muslim countries. The complaint alleges that the executive order violates the Establishment Clause of the First Amendment and federal immigration law by discriminating against Muslims. It asserts that the order harms Hawaii's economy, educational institutions, and sovereign interests in welcoming people from around the world. The plaintiffs seek to invalidate portions of the executive order.
This order grants the plaintiff's motion to convert a temporary restraining order into a preliminary injunction blocking enforcement of Sections 2 and 6 of President Trump's Executive Order 13780, also known as the "travel ban". The court found that the plaintiffs, the State of Hawaii and Dr. Elshikh, showed a strong likelihood of success on the merits of their claim that the Executive Order violates the Establishment Clause of the U.S. Constitution. The court also found that irreparable harm is likely if injunctive relief is not granted, and that the balance of equities and public interest favor blocking enforcement of Sections 2 and 6 of the order.
National Security Authorities Transparency Report 2013The Hacker News
The document provides statistics on the US government's use of national security authorities in 2013, including:
- 1,767 orders under FISA titles I, III, and IV affecting 1,144 targets; 1 order under section 702 of FISA affecting 89,138 targets.
- 178 applications under FISA title V affecting 172 specific subjects and 423 selectors under the NSA call records program.
- 19,212 national security letters issued resulting in 38,832 requests for information.
Wisconsin: Mailed Ballots Must Once Again Be Returned By Election Day, Court ...Baker Publishing Company
Mailed ballots in Wisconsin must be received by elections officials by election day, Nov. 3, to be counted, a federal appeals court ruled Thursday in a reversal of a previous decision that would have given extra time for ballots to be counted through Nov. 9 so long as they were postmarked by Nov. 3.
The latest ruling in the case, which may well be challenged at the US Supreme Court, means the deadline for absentee ballots to arrive remains at 8 p.m. on election day as is spelled out under state law. Judge William Conley, a federal judge in Wisconsin’s Western District, initially extended to Nov. 9 the deadline for ballots to arrive at local election clerks’ offices to account for an expected surge in mail-in ballots due to the coronavirus pandemic and anticipated mail service slowdowns caused in part by President Donald Trump and Postmaster Louis DeJoy’s intentional throttling of the US Postal Service ahead of the election.
California Says No to Weed for Prisoners and Inmates in JailEvergreen Buzz
No weed in jail says California, read this https://cannabis.net/blog/news/no-pot-in-prison-california-court-rules-that-inmates-cannot-have-marijuana-while-in-jail
Fisc usg motion to resume bulk data spyingAnonDownload
This document is the United States' response to a motion opposing the government's request to resume bulk data collection under Section 215 of the Patriot Act for a 180-day transition period. The response argues that Section 215, as amended by the USA FREEDOM Act, authorizes the Foreign Intelligence Surveillance Court to approve the bulk production of call detail records for 180 days as the government transitions to the new targeted production procedures under the USA FREEDOM Act. The response also argues this bulk collection is consistent with the Fourth Amendment.
The document provides information to obtain search warrants for multiple locations related to a drug investigation. It describes offenses of possession and trafficking of marijuana allegedly committed by Alexander LISI on October 1, 2013. The affidavit requests search warrants for a vehicle, residence, commercial unit, detached garage, and second residence, believing evidence of the offenses will be found. The items sought include marijuana, drug paraphernalia, records, electronics, and surveillance equipment.
Thomas Woznicki vs. Dennis Erickson (Wisconsin Supreme Court Ruling)SteveJohnson125
This is a 1996 Wisconsin Supreme Court ruling pertaining to a former New Richmond High School teacher named Thomas Woznicki who successfully fought to prevent the release of his personnel and telephone records. The ruling established the “Woznicki Notice” precedent, which gives public employees in Wisconsin the right to challenge the release of certain public records.
Frequently Asked Questions on the judgment of the Court
of Justice of the European Union in Case C-311/18 - Data
Protection Commissioner v Facebook Ireland Ltd and
Maximillian Schrems
Why Does the DEA Want You To Grow More Marijuana and Mushrooms?Evergreen Buzz
DEA wants more marijuana growth, read this https://cannabis.net/blog/news/the-dea-wants-you-to-grow-more-weed-and-magic-mushrooms-for-research-purposes
Lewis Barbe vs. US - Freedom of Information ActLewis Barbe
This court case helped establish the Freedom of Information Act. Specifically, it ruled that the Secretary of Labor must provide training materials like manuals, slides and films to Lewis Barbe that were used to train OSHA inspectors. This established that agencies must make certain records publicly available, including policies, interpretations, opinions and staff manuals. It exempts private or sensitive personal information. The act aims to create transparency around government activities.
This complaint alleges that Google infringes four patents related to protecting computer systems from malicious software. The plaintiffs are co-inventors and owners of the patents. They allege Google infringes the patents through its Chrome web browser, Chrome for Android mobile browser, Chromebook computers, and Nexus mobile devices. The complaint brings four counts of patent infringement and seeks damages and injunctive relief.
This document introduces an open source hardware board called the Tinker Board. It has a powerful quad-core processor, 2GB of RAM, WiFi/Bluetooth connectivity, and various ports. The document discusses its intended uses for education, making, and IoT applications. It provides an overview of the board's specifications and compares its performance to the Raspberry Pi. Instructions are given for setting up the board along with answers to frequently asked questions.
This document is a complaint filed by Microsoft Corporation against the United States Department of Justice and Attorney General Loretta Lynch seeking a declaratory judgment that 18 U.S.C. 2705(b) is unconstitutional. The complaint argues that 2705(b) violates the First and Fourth Amendments by allowing the government to obtain secrecy orders preventing Microsoft from notifying its customers when their private data is seized, without adequate safeguards. Microsoft asserts that over the past 18 months it has received nearly 2,600 such secrecy orders, most with no time limit, undermining customer privacy and Microsoft's free speech rights.
This document is a class action complaint filed against Valve Corporation regarding illegal online gambling related to the video game Counter-Strike: Global Offensive (CS:GO). The complaint alleges that Valve knowingly allowed, supported and profited from illegal gambling by permitting players to bet virtual items called "Skins" on esports matches through third party gambling websites, even though many players were minors. The complaint asserts that Valve's actions violated RICO statutes by facilitating an illegal gambling operation. The plaintiff, a Connecticut resident who gambled and lost money on CS:GO Skins, is seeking to represent a class of players who were allegedly harmed by Valve's actions.
This document discusses the use of nasal grafts in rhinoplasty surgery. It describes various types of cartilage grafts including columellar struts, shield grafts, spreader grafts, dorsal onlay grafts, and grafts to augment the fronto-nasal angle. These grafts are often needed in revision cases to improve nasal function and breathing or achieve a desired nasal shape. The lecture contains images from surgery to illustrate how the grafts are used and their effects. Common graft materials include septal, auricular and costal cartilage.
Новые документы Сноудена подтверждают взлом сервера АНБAnatol Alizar
This document provides standard operating procedures for the operational management of FOXACID infrastructure. It describes the roles and objectives for FOXACID operators, details the missions supported by different FOXACID servers, and outlines procedures for loading and testing server software, plugins, payloads and filters. Troubleshooting steps are also provided for when servers go down.
Facebook обвиняют в плагиате проекта дата-центра в ШвецииAnatol Alizar
The document appears to be a legal case filing that was submitted to a federal court on March 23, 2015. It includes the case number, titles, and 23 numbered pages of text as part of the filing. However, without more context around the specific claims, parties, or issues in the case, it is difficult to provide a higher-level summary of the essential purpose or content of the legal filing.
Waymo sued Uber, Otto, and Otto Trucking alleging trade secret misappropriation, patent infringement, and unfair competition. Waymo claims its former employee Anthony Levandowski downloaded over 14,000 confidential files from Waymo before leaving to set up a self-driving truck company that was later acquired by Uber. Waymo also claims one of its LiDAR component vendors was inadvertently sent machine drawings of an Uber LiDAR circuit board that bore a striking resemblance to Waymo's design, reflecting misuse of Waymo's trade secrets. Waymo is seeking damages and compensation for Defendants' unlawful conduct.
Решение окружного суда Северной КалифорнииAnatol Alizar
This order grants in part and denies in part Facebook's motion to dismiss claims brought by BladeRoom Group Limited and Bripco. The plaintiffs allege that Facebook and Emerson Electric enticed them to reveal confidential data center designs and construction methods with promises of partnership, but then misappropriated those designs for their own use. The order finds that most, but not all, of the plaintiffs' claims withstand a Rule 12(b)(6) review, so it grants the motion to dismiss in part and denies it in part.
Ещё шесть радиосигналов неизвестной природы получены из-за пределов нашей гал...Anatol Alizar
This document reports on radio and X-ray observations of FRB 121102, the only known repeating fast radio burst source. Six additional radio bursts from FRB 121102 were detected - five with the Green Bank Telescope at 2 GHz and one with the Arecibo Observatory at 1.4 GHz, bringing the total detected bursts from this source to 17. X-ray observations from Swift and Chandra show at least one possible counterpart, but the probability of chance superposition is high. Radio imaging with the VLA places an upper limit on any continuum emission at the location. The repeating nature of FRB 121102 indicates that at least some FRBs originate from a repeating phenomenon and not a cataclysmic event.
Частые вопросы владельцев и офицеров безопасности промышленных объектов: а существуют ли вообще на самом деле киберугрозы промышленным объектам? А не раздута ли тема? А относятся ли угрозы критической инфраструктуре, о которых так много говорят, к моему промышленному объекту? На основе каких данных все-таки строить модель угроз, чтобы она отражала действительность, и на ее основе можно было бы принимать решения о планировании и выполнении мероприятий по защите и их обоснованном финансировании? И как держать руку на пульсе и узнавать о появлении релевантных угроз моему предприятию и эффективных мерах противодействия? Ответить на эти вопросы могут помочь такие развивающиеся понятия как разведка киберугроз (Cyber Threat Intelligence) и обмен информацией об кибеугрозах (Сyber Threat Information Sharing). В докладе будет сделан обзор понятий, их преимуществ, особенностей и сложностей, а также примеров реализации, с акцентом на критическую промышленную инфраструктуру
Spanner is Google's globally distributed database that provides externally consistent distributed transactions across data centers worldwide. It uses a novel TrueTime API to assign globally meaningful timestamps to transactions despite distribution, enabling features like consistent backups and schema updates at global scale. The database replicates data across multiple zones using the Paxos consensus protocol and provides a SQL-like query interface along with a schematized semi-relational data model.
The mobile app economy continued strong growth in 2016, with worldwide time spent in apps increasing 25%, downloads growing 13 billion to over 90 billion, and app store revenue increasing 40% to over $35 billion. Usage metrics like time spent reflected growing user engagement with apps. Both iOS and Google Play saw increased downloads and revenue, led by gains in China, games, and categories like finance and travel. Overall revenue to publishers including third-party stores and advertising was nearly $89 billion.
Инструменты для проведения конкурентного анализа программных продуктов | Вла...Positive Hack Days
1. Что такое конкурентный анализ (КА) программных продуктов?
2. Методика и этапы КА.
3. Сложности реализации различных этапов КА.
4. Инструменты для автоматизации КА.
Стена лабораторий Онтологического верстака - 5.
По результатам работы лабораторий Онтологического верстака с сентября по февраль 2016 г.
На слайдах отражены только изменения по результатам занятия 12 февраля 2017 г.
vSphereTools - инструмент для автоматизации работы с vSphere | Тимур ГильмуллинPositive Hack Days
1. VIX API против pysphere.
2. vSphereTools - это набор скриптов от DevOps для поддержки работы с vSphere и виртуальными машинами.
3. Описание инструмента, его достоинства и недостатки, возможные доработки.
Как интернет вещей «убьет» известные нам методики проектирования интерфейсовAlexey Kopylov
Устоявшаяся методика проектирования взаимодействия основана на персонажах и сценариях. Эта методика плохо работает на массовых продуктах с большим количеством уникальных видов деятельности и вариантов использования. Также она плохо учитывает гетерогенности современных информационных продуктов и услуг.
На помощь нам приходят картирование услуг (в частности Customer Journey Map) и такие методики, как Jobs to Be Done и Agile/Lean варианты. Однако, неизбежно грядущий интернет вещей делает и эти методики морально устаревшими.
Что дальше? Какую метододлогическую базу мы должны построить, чтобы быть встретить новый дивный мир во всеоружии?
The Council on Environmental Quality (CEQ) Annual FOIA Report for fiscal year 2008 provides information on FOIA requests received and processed. It summarizes that CEQ received 35 requests and processed 50 total requests, with 5 pending at the end of the fiscal year. Most requests were partially granted or denied based on FOIA exemptions. CEQ also received 3 administrative appeals and processed all 3, with none pending. Exemption 5 was cited most frequently for withholding information from both requests and appeals.
This document provides information about the Central Intelligence Agency's (CIA) Freedom of Information Act (FOIA) annual report for fiscal year 2017. It includes the point of contact for the report, how to make a FOIA request to the CIA, definitions of key terms, descriptions of the types of information exempted from disclosure including intelligence sources and methods, statistics on the number of FOIA requests received and processed, how long requests took to process, the number of times various exemptions were cited, and details of administrative appeals.
The United States Court of Appeals reviewed a case where Cause of Action (Action), a nonprofit organization, filed three Freedom of Information Act requests with the Federal Trade Commission seeking documents. The FTC denied Action's requests for fee waivers for the first two requests. For the third request, the FTC provided some documents for free under its 100-page rule but did not determine if Action qualified for a fee waiver. The Court of Appeals had to determine if Action's claims regarding the third request were moot and clarify the standards for FOIA fee waivers.
Discovery Practice (Series: Newbie Litigator School - Fall Edition)Financial Poise
If you say the word “discovery” to a litigator, the reaction may not be kind. Discovery-the exchange of relevant information- usually in the form of documents or oral depositions, takes up the majority of a litigator’s time and costs clients the most money.
To view the accompanying webinar, go to: https://www.financialpoise.com/financial-poise-webinars/discovery-practice-2020/
This memorandum from the Office of Management and Budget provides clarifying guidance on the Paperwork Reduction Act in order to increase transparency and openness in government information collection. It summarizes the key requirements of the Act, including that agencies must seek public comment on proposed collections and get OMB approval. It defines what types of information and collections are and are not covered by the Act. The goal is to specify the central requirements of the Act and clarify policies to promote greater openness.
This document proposes revisions to certain State Fiscal Stabilization Fund (SFSF) program reporting requirements established in 2009. It extends the deadline for states to collect and publicly report SFSF data to January 31, 2012. It also proposes a priority for future Department of Education discretionary grants to states that developed statewide longitudinal data systems required under SFSF by the deadline. Additionally, it reminds grantees that the Department may identify them as high-risk and impose sanctions for failing to meet program requirements, and may take enforcement action against states failing to meet certain SFSF indicator requirements.
The EPA is requesting information from Rochester Public Utilities regarding its Silver Lake Generating Station in Rochester, Minnesota. The EPA is making this request under the Clean Air Act to evaluate the facility's compliance with the Act. Rochester Public Utilities must submit the requested information within 45 days, following the instructions in Appendices B and C. Any confidential business information claims must meet the assertion and substantiation requirements in Appendix A.
An analysis of george h cohen official statement in response to washington ex...advocate123
George H. Cohen, Director of Federal Mediation and conciliation service, FMCS fraud, FMCS waste, FMCS abuse of management authority, FMCS gross mismanagement of government funds, FMCS OSC Complaint, FMCS MSPB complaint, FMCS Washington Examiner Articles of Waste and Fraud, FMCS Federal Times Article - Whistleblower, FMCS Prohibited Personnel Practices, FMCS Case File Emails, FMCS untruthful statement by Presidential Appointee George H. Cohen
This document provides an evaluation of the New York City Criminal Justice Agency (CJA) during Fiscal Year 1979-1980. CJA conducts interviews of arrested defendants, assesses their community ties, and makes release recommendations to judges. It also notifies defendants of upcoming court dates. The evaluation finds that CJA aims to decrease pretrial detention time, reduce failure-to-appear rates, and operate efficiently. It describes CJA's operations, administrative structure with central and borough offices, and research activities.
Discovery Procedure Public Records And ContributionSuper1gator
(1) Discovery is part of the pre-trial litigation process where each party requests relevant information from the other side to learn pertinent facts. Workers' compensation discovery in Florida allows depositions, interrogatories, and requests for documents.
(2) A public records request is a non-adversarial way to obtain information from a government entity without formal discovery. It provides an advantage over a request to produce because the requesting party does not have to wait 30 days for the records.
(3) A carrier providing insurance services on behalf of a public entity has a duty to provide its records in response to a public records request regarding a workers' compensation claim due to the strong public policy for transparency in Florida.
First-tier Tribunal Information Rights decision upholding the Information Commissioner's Decision Notice that the request(s) were vexatious. Concerns requests for information made to Humberside police to obtain the number of times the phrase "YOU CANT MAKE ME" appeared in police officers witness statements. Humberside Police relied on section 14(1) (vexatious requests) of FOIA.
Cia director grandiosity v. abilt justicePublicLeaks
This document is a declaration by John Brennan, Director of the Central Intelligence Agency, asserting the state secrets privilege and CIA statutory privileges to prevent disclosure of classified information in a lawsuit brought by a former CIA employee. Brennan asserts these privileges to protect information about specific CIA intelligence operations, the identities and roles of covert employees, and sources and methods. He argues that disclosure of such information could reasonably be expected to cause serious or grave damage to national security.
Ex-NSA Contractor Stole at Least 500 Million Pages of Records and SecretsThe Hacker News
The government is seeking the continued pretrial detention of Harold T. Martin based on the danger his release would pose to national security and the risk of flight. The evidence against Martin is overwhelming, as he was found in possession of over 50 terabytes of highly classified documents and information spanning two decades, including some marked Top Secret/Sensitive Compartmented Information. Martin held positions of trust providing him access to classified information, but violated that trust through the theft and retention of documents he was not authorized to possess. His crimes were extremely serious and endangered national security.
This document summarizes key topics in electronic discovery (e-discovery) including: the types of electronically stored information (ESI) that now exists; how e-discovery rules and case law have evolved to address ESI; common e-discovery issues like litigation holds, accessibility tiers, and sanctions; and ethical implications for attorneys regarding e-discovery competency and diligence. Recent cases demonstrate courts' increasing willingness to impose severe sanctions like adverse inferences, monetary penalties, default judgments, or case dismissal for failure to properly preserve ESI or comply with discovery orders.
A Powerpoint presentation from the Connecticut Freedom of Information Commission, posted on its website: http://www.ct.gov/foi/cwp/view.asp?a=3171&Q=504946
This order grants a motion by the Washington Post to intervene for the limited purpose of requesting the unsealing of exhibits filed under seal in connection with a class certification motion. The court applies the "compelling reasons" standard for sealing as the class certification motion is more than tangentially related to the merits of the case. While the parties agreed to unseal most documents, four "playbooks" used by Trump University remain contested. The court finds that much of the content in the playbooks is not confidential or only arguably trade secret, and orders the playbooks unsealed except for a few instances of actual trade secret information.
The document discusses the methodology for digital forensic analysis. It begins with an overview that defines computer forensics and outlines its key elements. It then details the three main steps in the forensic process: 1) Preparation/Extraction, which involves verifying tools and data, developing search leads, and extracting relevant information; 2) Identification, which involves determining the type of extracted data and identifying relevant data to answer the forensic request; and 3) Analysis, which involves connecting all the information to answer who, what, when, where, how and other questions to fully satisfy the forensic request. The document provides figures illustrating each step and explains how new leads developed at each phase can trigger repeating steps in an iterative process until the request is
The memorandum provides the following key points:
1) The Carter Page FISA warrant and renewals relied heavily on the Steele dossier, which was funded by the DNC and Clinton campaign. The source's political connections were not disclosed to the FISA court.
2) The FISA application cited a Yahoo News article that was based on leaks from Steele himself, incorrectly assessing that Steele did not directly provide the information.
3) Steele had numerous undisclosed contacts with the media in violation of FBI rules and demonstrated unreliability, yet continued to be cited in warrant applications.
4) Bruce Ohr maintained contact with Steele after he was terminated as a source, and Ohr's wife worked for Fusion
Similar to 13 млн документов ЦРУ рассекречено и опубликовано в онлайне (20)
Cryptanalysis of the GPRS Encryption Algorithms GEA-1 and GEA-2Anatol Alizar
The document analyzes cryptographic attacks on the GEA-1 and GEA-2 algorithms used to encrypt GPRS data. It finds that GEA-1 has a weakness allowing recovery of the initial state in 240 time using only 65 bits of known keystream. This weakness is very unlikely to occur by chance, indicating an intentional design to limit security to 40 bits for export regulations. For GEA-2, the document presents an attack requiring 245.1 time and 1600 bytes of known keystream to recover the state.
This document provides lecture notes on analytic geometry. It begins with an introduction discussing the goals of building an algebraic geometry framework for analytic situations by replacing topological abelian groups with condensed abelian groups. Condensed sets are defined as sheaves on the pro-étale site of the point, and behave like generalized topological spaces. The notes establish that quasiseparated condensed sets correspond to ind-compact Hausdorff spaces. This provides the needed abelian category structure to build an analytic geometry in parallel to algebraic geometry over schemes.
This document summarizes the solution of a cryptosystem involving unrelated cipher alphabets. There are 25 different cipher alphabets available. The plain text is encrypted by substituting each plaintext letter with the corresponding letter from the cipher alphabets, which may be used in the same or different sequences and orders. Once the 25 cipher alphabets are reconstructed by analyzing encrypted texts, subsequent messages can be easily solved even if the alphabets are used in a different order.
Британская разведка не может нанять шпионовAnatol Alizar
The UK intelligence and security agencies assess the threat from international terrorism in the UK as severe, meaning an attack is highly likely. This threat is predominantly driven by Daesh, which seeks to maintain its narrative of success despite military losses, and retains some territory. Daesh continues to prioritize and incite external attacks against the West through extremist propaganda. Since March 2017 there have been three successful terror attacks and several disrupted plots in the UK, reflecting a shift in the nature and scale of extremist attack planning. While Al-Qaeda also remains a threat, Daesh's extremist narrative has emerged as the main driver of radicalization and terrorism in the UK.
Libratus is an AI developed by researchers at Carnegie Mellon University that achieved superhuman performance at no-limit Texas hold'em poker by defeating top human professionals in a 120,000-hand poker competition. It uses a three-part approach: 1) It computes an abstraction of the full game to develop a "blueprint" strategy for early rounds; 2) When later rounds are reached, it constructs finer-grained abstractions in real-time and solves them while ensuring strategies fit the overall blueprint; 3) It enhances the blueprint by adding missing branches and strategies based on opponents' actual moves. This game-theoretic approach uses application-independent techniques and marks the first time an AI has defeated humans at this
This document is a second amended complaint filed by ZeniMax Media Inc. and id Software LLC (collectively "ZeniMax") against Oculus VR, LLC, Palmer Luckey, Facebook, Inc., Brendan Iribe, and John Carmack (collectively "Defendants") in the United States District Court for the Northern District of Texas. ZeniMax alleges that Defendants misappropriated ZeniMax's intellectual property related to virtual reality technology that was disclosed to Oculus under a non-disclosure agreement. ZeniMax provided technical expertise, software code and hardware improvements that transformed Oculus' prototype headset. ZeniMax seeks damages for Defendants' alleged infringement and unjust enrichment from using Zeni
The document appears to be a court filing related to a civil case. It consists of 90 pages of legal documentation including references to case numbers, parties involved, dates and page numbers. However, without more context around the specific nature and details of the case, it is difficult to provide a high-level summary of the essential information and issues in only 1-3 sentences from this legal document.
В Instagram можно найти фотографии авиабилетов и присвоить себе бонусные милиAnatol Alizar
Global booking systems store travel data from airlines and passengers. They include price and availability rules as well as personal reservation information. Three dominant global distribution systems (GDS) are Amadeus, Sabre, and Galileo. Security protections for these systems are minimal, with coarse access controls, weak authentication methods, and a lack of basic security controls like rate limiting and logging. This exposes private traveler information and leaves the systems vulnerable to fraud and privacy abuse.
Рядовые сотрудники Uber использовали «режим Бога» для слежки за бывшимиAnatol Alizar
This document is a declaration from Samuel Ward Spangenberg, the plaintiff in a lawsuit against Uber Technologies. It details Spangenberg's employment with Uber as a Forensic Investigator, where he reported numerous issues regarding Uber's lack of data security and privacy safeguards. These issues included unsecured payroll data, ability of employees to access customer data without authorization, and lack of security for driver and financial information. Spangenberg objected to these practices and others during his employment with Uber.
Немецкий суд объяснил, почему блокировщики рекламы не нарушают законAnatol Alizar
The Hamburg District Court dismissed a claim brought by Spiegel Online GmbH against Eyeo GmbH, the developer of the Adblock Plus browser extension. Spiegel Online alleged that Adblock Plus violated competition law by blocking most of the ads on Spiegel Online's websites, while allowing ads on some sites that paid a fee. The court found that since Spiegel Online did not implement technical measures to only provide its content and ads together as a unified offering, Eyeo was not violating its rights by blocking some ads. Eyeo argued its fee structure and whitelisting process were justified based on administrative costs. The court ruled in favor of Eyeo and dismissed the claim.
ДНК составляет лишь половину объёма хромосомAnatol Alizar
The document describes a study that used a technique called 3D-CLEM (correlative light and electron microscopy) to analyze the structure of mitotic chromosomes at high resolution. Some of the key findings include:
1) 3D-CLEM revealed that prophase chromosomes have a smaller volume than metaphase chromosomes, likely due to the absence of a chromosome periphery structure at that stage of mitosis.
2) The extra volume observed in metaphase chromosomes compared to prophase chromosomes can be almost entirely accounted for by the nucleolar volume.
3) Analysis of wild-type and Ki-67 depleted chromosomes found that the periphery structure comprises 30-47% of the entire chromosome volume and more than 33%
The document discusses the strategic rationale and financial benefits of Tesla acquiring SolarCity. It argues that the acquisition will create an integrated sustainable energy company from energy generation to storage to transportation. It also expects SolarCity to add over $500 million in cash to Tesla's balance sheet over the next 3 years and for the combined company to realize over $150 million in annual cost synergies. The document provides an overview of SolarCity's business model, debt position, and liquidity to argue that the acquisition will be financially beneficial for both companies.
Intel добавит в CPU инструкции для глубинного обученияAnatol Alizar
This document provides an overview and reference for Intel's AVX-512 instruction set extensions. It discusses the key features of AVX-512 including 512-bit wide SIMD register and instruction support. It also describes the AVX-512 programming model and application programming interface, covering aspects such as register usage, instruction encoding, exception handling and programming interfaces like CPUID. The document also discusses system programming considerations for AVX-512 including state management using instructions like XSAVE, reset behavior, and exception handling.
Терагерцевое излучение применили для сверхбыстрой перезаписи спиновAnatol Alizar
The document demonstrates that intense terahertz pulses can be used to nonlinearly control spin dynamics in the antiferromagnet TmFeO3 through a novel mechanism. Resonant excitation of electronic orbital transitions of rare-earth Tm3+ ions by the terahertz electric field abruptly modifies the magnetic anisotropy. This triggers large-amplitude coherent oscillations of the iron spins that scale quadratically with the terahertz field strength, outperforming conventional linear Zeeman coupling to the magnetic field.
Параграф 702 Акта о негласном наблюдении в целях внешней разведкиAnatol Alizar
Section 702 of FISA allows the targeting of communications of foreign persons located abroad for foreign intelligence purposes. It prohibits targeting US persons anywhere or targeting persons abroad to acquire information from someone in the US. The Foreign Intelligence Surveillance Court annually reviews certifications defining categories of foreign targets and targeting/minimization procedures. Strict rules are in place to protect privacy, including requiring a foreign intelligence purpose for each use, documenting all targeting decisions, and promptly destroying any non-relevant information about US persons. Compliance is monitored through government and court reviews.
The document summarizes a study that applied multicriteria decision analysis (MCDA) to assess the harms of various drugs in the UK. An expert panel scored 20 drugs on 16 criteria related to individual and societal harms. They also weighted the criteria based on their relative importance. MCDA modeling showed that heroin, crack cocaine, and methamphetamine were most harmful to individuals. Alcohol, heroin, and crack cocaine were most harmful to others. Overall, alcohol was found to be the most harmful drug when considering both individual and societal harms, followed by heroin and crack cocaine. The results support previous work but provide more differentiation between drug harms through the improved scoring and weighting approach of MCDA.
Атмосфера Земли медленно теряет кислородAnatol Alizar
This document summarizes research on reconstructing past atmospheric oxygen (O2) levels over the past 800,000 years using O2/N2 ratios measured from ancient air bubbles trapped in ice cores from Greenland and Antarctica. The main findings are:
1) O2/N2 ratios from multiple ice cores show a consistent decline of 8.4‰ per million years over the past 800,000 years, equivalent to a 0.7% decline in atmospheric O2 levels.
2) This decline is unlikely to be explained by changes in air bubble formation processes or other non-atmospheric factors, as argon/nitrogen ratios from the same ice cores show an inconsistent increasing trend over the same
Атлас человеческого мозга с самым высоким разрешениемAnatol Alizar
This document describes a new comprehensive digital atlas of the adult human brain created by the Allen Institute for Brain Science. The atlas integrates neuroimaging data (MRI, DWI) with high-resolution histology (1 μm/pixel) from multiple stains across the entire brain of an adult female donor. It contains delineations of 862 brain structures based on cytoarchitecture and chemoarchitecture. This interactive online atlas provides cellular-level detail and aims to serve as a comprehensive reference for the neuroscience community.
सुप्रीम कोर्ट ने यह भी माना था कि मजिस्ट्रेट का यह कर्तव्य है कि वह सुनिश्चित करे कि अधिकारी पीएमएलए के तहत निर्धारित प्रक्रिया के साथ-साथ संवैधानिक सुरक्षा उपायों का भी उचित रूप से पालन करें।
Corporate Governance : Scope and Legal Frameworkdevaki57
CORPORATE GOVERNANCE
MEANING
Corporate Governance refers to the way in which companies are governed and to what purpose. It identifies who has power and accountability, and who makes decisions. It is, in essence, a toolkit that enables management and the board to deal more effectively with the challenges of running a company.
The presentation deals with the concept of Right to Default Bail laid down under Section 167 of the Code of Criminal Procedure 1973 and Section 187 of Bharatiya Nagarik Suraksha Sanhita 2023.
Capital Punishment by Saif Javed (LLM)ppt.pptxOmGod1
This PowerPoint presentation, titled "Capital Punishment in India: Constitutionality and Rarest of Rare Principle," is a comprehensive exploration of the death penalty within the Indian criminal justice system. Authored by Saif Javed, an LL.M student specializing in Criminal Law and Criminology at Kazi Nazrul University, the presentation delves into the constitutional aspects and ethical debates surrounding capital punishment. It examines key legal provisions, significant case laws, and the specific categories of offenders excluded from the death penalty. The presentation also discusses recent recommendations by the Law Commission of India regarding the gradual abolishment of capital punishment, except for terrorism-related offenses. This detailed analysis aims to foster informed discussions on the future of the death penalty in India.
Indonesian Manpower Regulation on Severance Pay for Retiring Private Sector E...AHRP Law Firm
Law Number 13 of 2003 on Manpower has been partially revoked and amended several times, with the latest amendment made through Law Number 6 of 2023. Attention is drawn to a specific part of the Manpower Law concerning severance pay. This aspect is undoubtedly one of the most crucial parts regulated by the Manpower Law. It is essential for both employers and employees to abide by the law, fulfill their obligations, and retain their rights regarding this matter.
Safeguarding Against Financial Crime: AML Compliance Regulations DemystifiedPROF. PAUL ALLIEU KAMARA
To ensure the integrity of financial systems and combat illicit financial activities, understanding AML (Anti-Money Laundering) compliance regulations is crucial for financial institutions and businesses. AML compliance regulations are designed to prevent money laundering and the financing of terrorist activities by imposing specific requirements on financial institutions, including customer due diligence, monitoring, and reporting of suspicious activities (GitHub Docs).
13 млн документов ЦРУ рассекречено и опубликовано в онлайне
1. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 1 of 12
UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
MUCKROCK, Lr.iC
Plaintiff,
v. Civil Action No.
1:14 - CV-00997(KBJ)
CENTRAL INTELLIGENCE AGENCY
Defendant.
DECLARATION OF ANTOINETTE B. SHINER,
INFORMATION REVIEW OFFICER,
LITIGATION INFORMATION REVIEW OFFICE,
CENTRAL INTELLIGENCE AGENCY
I. INTRODUCTION
I, ANTOINETTE B. SHINER, hereby declare and state:
1. I currently serve as the Information Review Officer
("IRO") for the Litigation Information Review Office at the
Central Intelligence Agency ("CIA" or "Agency"). I assumed this
position in January 2016.
2. Prior to becoming the IRO for the Litigation
I n formation Review Office, I served as the IRO for the
Directorate of Support for over sixteen months. In that
capacity, I was responsible for making classification and
r e lease determinations for information originating within the
Directorate of Support. Prior to that, I was the Deputy IRO for
the Director's Area of the CIA for over three years. In that
1
2. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 2 of 12
role, I was responsible for making classification and release
determinations for information originating within the Director's
Area, which included, among other offices, the Office of the
Director of the CIA, the Office of Congressional Affairs, the
Office of Public Affairs, and the Office of General Counsel. I
have held other administrative and professional positions within
the CIA since 1986, and have worked in the information review
and release field since 2000.
3. I am a senior CIA official and hold original
classification authority at the TOP SECRET level under written
delegation of authority pursuant to section l.3(c) of Executive
Order 13526, 75 Fed. Reg. 707 (Jan. 5, 2010). This means that I
am authorized to assess the current, proper classification of
CIA information, up to and including TOP SECRET information,
based on the classification criteria of Executive Order 13526
and applicable regulations.
4. Among other things, I am responsible for the
classification review of CIA documents and information that may
be the subject of court proceedings or public requests for
information under the Freedom of Information Act, 5 U.S.C.
§ 552, and the Privacy Act of 1974, 5 U.S.C. § 552a. Pursuant
to authority delegated by the Associate Deputy Director of the
CIA, I have also been appointed as a Records Validation Officer
("RVO"). As an RVO, I am authorized to sign on behalf of the
2
3. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 3 of 12
CIA regarding searches for records and the contents of any
located or referred records, including those containing
information under the cognizance of any or all CIA directorates
or areas.
5. I refer the Court to the Declarations previously
submitted by my predecessor, Martha M. Lutz, dated January 16,
2015 ("Lutz Declaration"), February 13, 2015 ("Supplemental Lutz
Declaration"), and July 23, 2015 ("Second Supplemental
Declaration"), which I incorporate by reference.
6. Through the exercise of my official duties, I have
become familiar with this civil action and the underlying FOIA
requests. In particular, I have reviewed the Plaintiff's Sur-
Reply in Opposition to Defendant's Motion for Partial Summary
Judgment and Reply in Support of Plaintiff's Cross-Motion for
Partial Summary Judgment ("Plaintiff's Sur-Reply") and the
Court's September 23, 2016, Order Requiring Supplemental
Briefing ("the Court's Order"). I am submitting this
declaration in support of the Government's Supplemental Brief.
The purpose of this Declaration is to address the Court's
requests for (1) more specificity regarding the CIA's searches
for responsive records in response to MuckRock's request for
"any objections to agency data gathering practices received by
this agency from telecommunications and web service providers;"
(2) a response from CIA to MuckRock's contentions, raised for
3
4. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 4 of 12
the first time in its reply brief, that the information CIA has
withheld from four specific documents is not information
regarding intelligence sources or methods as covered by the
National Security Act; and (3) additional detail regarding the
impact on the Agency of MuckRock's request for an electronic
copy of the complete CREST database. For the Court's
convenience , I have divided the remainder of this declaration
into four sections. Section II addresses the Court's
requirement for more specificity as to the searches conducted in
r esponse to Count 5 of Plaintiff's Complaint. Section III will
explain why CIA properly applied FOIA exemption (b) (3) to the
records responsive to Plaintiff's FOIA Request which Plaintiff
cites in its Sur-Reply . Finally, Section IV explains the
additional burden that would be placed on the Agency if required
to prepare an electronic copy of the CREST database for
Plaintiff.
II. THE CIA'S SEARCH FOR RESPONSIVE RECORDS
7. In this section, I further clarify the processing done in
response to the portion of Plaintiff's FOIA request at issue in
Count 5 of the Complaint. The CIA originally processed
Plaintiff's request for "a copy of any objections to agency data
gathering practices received by this agency from
telecommunications and web service providers," following the
4
5. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 5 of 12
procedures discussed in my previous declarations. (See Lutz
Deel. at ~~ 46-47; Sec. Supp. Lutz Deel. at ~~ 12-14).
8. Upon receiving the Court's Order, the CIA reconfirmed
the previously stated facts described in Ms. Lutz's Second
Supplemental Declaration, but was unable to confirm whether the
Directorates tasked with the searches had used any additional
search terms. Therefore, in an abundance of caution, the CIA
elected to re-task and re-run new searches following the same
procedures that were used the first time we processed
Plaintiff's request. This was done in order to ensure that the
Directorates' prior searches were reasonable, and to provide the
Court with more specificity as to how the Directorates' searches
were conducted and what search terms were used.
9. In addition to the search terms discussed in my
predecessor's prior declarations, the subject matter experts
within the three Directorates1 tasked with the search had the
latitude to add additional terms they deemed most likely to
return responsive documents. However, in this case, the subject
matter experts did not add any additional terms to the search,
1 The three Directorates tasked with the initial search, as described in my
predecessor's previous declarations, were the DIR, NCS, and DS&T. Since the
initial searches were performed, the CIA has undergone a modernization and
among other things, changed the name of the NCS to the Directorate of
Operations ("DO"), and added an additional directorate, the Directorate of
Digital Innovation ("DDI"). One of the offices that performed a search for
records in this case, previously located in the DIR, is now a part of the
DDI.
5
6. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 6 of 12
as they judged that the suggested terms were the ones most
l i kely to return documents responsive to the request.
10. Additional hard copy searches were conducted again by
hand of four different repositories of records in two offices,
for an even more thorough search. (For a description of CIA's
prior searches by hand, please see Lutz Deel. at ~~ 46-47; Sec.
Supp. Lutz Deel. at ~~ 12 - 14). The hard copy files searched
included the records of the Office of General Counsel, as well
as Policy Staff records in the front office of an entity of the
DDI. Those by- hand, hard copy searches were conducted by subject
matter experts in the field of information management who work
with records i n both the Office of General Counsel and the
Policy Staff on a daily basis.
11. No additional records were located as a result of
conducting t hese supplemental searches.
III. THE CIA PROPERLY APPLIED EXEMPTION 3 BASED ON THE NATIONAL
SECURI~Y ACT
12. Upon receipt of the Court's Order, CIA re-reviewed the
four documents for which Plaintiff questioned the validity of
the withholdings under Section 3 of the National Security Act,
to determine whether any additional information could be
released, wi th the following results:
a. Document 3, C06109746: This is a two - page document
entitled "Original Classification Authority Quick
6
7. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 7 of 12
Reference Guide," which was previously released in
segregable form with one redaction made on the basis of
FOIA exemption (b) (3) . Upon further review, this
document is now being released in full.
b. Document 13, C06245959: This is a fifty-four (54)
page document entitled "Classification Management Tools
(CM~) User Manual," which was previously withheld in full
on the basis of FOIA exemption (b) (3) based on the CIA
Act and the National Security Act. Upon further review,
the CIA has found that it has previously released
screenshots of certain pages of the manual. As a result,
CIA is now reprocessing the document and will release it
in part, consistent with those previous releases. The
remainder of the document remains exempt under FOIA
exemption (b) (3), pursuant to the CIA Act and National
SecJrity Act, because by viewing the document in its
entirety and seeing all of the classification management
tools available and the different ways in which they have
been applied in previous contexts, a reader is reasonably
likely to ascertain source revealing information, methods
by ~hich intelligence collection is obtained, and the
reasons why certain intelligence is collected.
c. Document 9, C06109753: This is a two-page document
whiqh was previously released in segregable form with
7
8. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 8 of 12
information withheld pursuant to FOIA exemption (b) (3) .
Although the Plaintiff speculates that the information
redacted refers to the Classification Management and
Collaboration Group ("CMCG"), and is the same information
disclosed in another document, this speculation is
incorrect. The withheld information Plaintiff describes
ref, rs to a different entity whose name and purpose have
not been previously released. The name of this entity
would reveal the methods it uses in accomplishing its
mission, and thus remains properly withheld under FOIA
exemption (b) (3) on the basis of the National Security
Act.
d. Document 14, C06244490: This is a nine-page document
dis, ussing certain covert capabilities of the CIA. As
such, it reveals intelligence sources and methods and is
properly withheld in full pursuant to FOIA exemption
(b) (3) and the National Security Act.
IV. THE BURDEN IMPOSED BY CREATING AN ELECTRONIC VERSION
or THE CREST DATABASE
13. As described in detail in my predecessor's previous
declaration ( providing MuckRock with its own electronic version
of the CREST database would require four time-consuming steps.
(See Supp. Lutz Deel., at~~ 12-16). This section provides
8
9. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 9 of 12
additional information regarding the burden imposed on the CIA,
as required by the Court.
14. Of the limited number of Data Transfer Officers
("DTOs"), the CIA has identified three who would have the
appropriate database accesses to create this electronic version
of CREST, all of whom would be performing this work as a
collateral duty in addition to their full-time employment in
various CIA offices.
15. One of these DTOs is the only employee with DTO
capabilities in an office with fewer than 35 employees, and is
the system administrator tasked with keeping a specific Agency
stand-alone network functioning, and performing all security
efforts necessary to maintain that network's accreditation.
This DTO also supports the employees who are tasked with
processing, scanning, and indexing the documents involved in the
CIA's automatic declassification review program under Executive
Order 13526, as well as working with documents which are to be
archived. If this DTO does not perform his duties with respect
to maintaining the security of the network and supporting the
employees of the office, this would significantly impair this
office's ability to process documents, which would lead to
significant backlogs in the Agency's ability to meet its
requirements under the automatic declassification review
program. Under section 3.3(a) of Executive Order 13526, all
9
10. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 10 of 12
classified records shall be automatically declassified at 25
years unless the information is reviewed and deemed to be exempt
from declassification. Therefore, a significant backlog in the
Agency's au~omatic declassification review program may result in
the inadvertent automatic declassification of information that
is currently and properly classified. While it is possible that
this DTO could work overtime to complete MuckRock's electronic
copy of CREST in addition to the DTO's regular duties, such
overtime wo~ld be costly and would need to be approved by senior
management in the DTO's office.
16. The second DTO that the CIA has identified as a
potential c f ndidate for creating MuckRock's electronic copy of
the CREST database is a contractor working in IT development.
This DTO would be unable to perform the mandatory duties under
his contract that contribute to keeping the CADRE document
processing ~ystem functional, which would negatively impact the
ability of CIA employees working with CADRE to process other
FOIA and Prl vacy Act requests2 . Removing an IT developer from
CADRE support would also lead to a slowdown in responding to and
troubleshooting CADRE system problems. Removing this contractor
from his typical duties would also mean that the CIA would be
unable to perform certain work for the National Archives and
2 For each of the past two years, the CIA has received an average of 2,500 FOIA requests per year.
10
11. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 11 of 12
Records Administration ("NARA"), which could impact the ability
of NARA to both refer documents to other government agencies for
coordination and make CIA records available in the CREST
database for members of the public to come to the computer
terminals maintained at NARA to view. In short, if this DTO
were to take time away from his current duties to make
MuckRock's personal electronic copy of the CREST database, this
might inhibit the CIA's ability to make those same records
available to all members of the public.
17. The third potential DTO that would be able to assist
in making MuckRock's copy of the CREST database is a contractor
working in ~ADRE customer support . If this DTO were to be
pulled away from the mandatory duties of that contract, he would
be unavailable to respond to employee emails and requests for
troubleshooting, or to answer general questions about the CADRE
system. Without this customer support employee, other members
of this small team would need to take time away from maintaining
CADRE'S security accreditation, running reports, and performing
other duties in order to assist CIA employees with general
questions and concerns with the CADRE system. This could
potentially affect the ability of this team to complete the
mandatory security accreditation work they are contracted to
complete on schedule in order to keep the system in compliance
with CIA regulations, because fewer hours could be devoted to
11
12. Case 1:14-cv-00997-KBJ Document 36-1 Filed 11/18/16 Page 12 of 12
this task. If CADRE' s security accreditation is slowed d·)wn or
not completed on schedule, this could have a ripple effec·: on
all CIA employees who use CADRE to perform a number of fu:1ctions
in various Agency offices , including offices such as mine , which
support onJoing litigation, and the office of the Informa:ion
and Privac~ Coordinator, which processes all incoming FOL; and
Privacy Ac~ requests .
18. gespi te the challenges , given the high public i :1terest
in the CREST database, the CIA has continued its efforts :owards
placing the entire CREST database online and has recently surged
resources to make it available for the general public as 3oon as
possible. As a result of these efforts, the CIA anticipa:es
that the enltire CREST database will be publicly available online
in an electronic reading room within the next year, and i3
preparing to commence uploading documents to that reading room
on a periodic basis beginning in the first quarter of 2017.
* * *
I
I hereby declare under penalty of perjury that the
forego ing is true and correct.
Executed this lith day of November 2016.
_fu~~'~Antoinette B. Shiner,
Information Review Officer,
Litigation Information Review Offic·=,
Central Intelligence Agency
12