This document lists search terms that were used by the government to search electronic devices seized from Benjamin Wey's office and apartment in January 2012 as part of a criminal investigation. The document compares the original search terms authorized in the search warrant with an expanded list of search terms run by the government in May 2013. Terms highlighted in yellow were added and not included in the original warrant.
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
Protected Harbor's 2022 Legal Services Data Breach Trend Report is a comprehensive analysis of the evolving cybersecurity landscape in the legal industry. This report offers valuable insights into emerging trends, challenges, and opportunities that legal professionals and firms may encounter in the year ahead. Through in-depth research and expert analysis, it sheds light on the impact of technological advancements, changing regulations, and client expectations on legal services. Stay ahead of the curve with this indispensable guide to the future of legal services.
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
Case 1
1. What exactly occurred?
Twitter is one of popular social media that targeted to be hacked.
The social network said in that approximately 250,000 user accounts were potentially compromised, with attackers gaining access to information including user names and email addresses. The company first detected signs of an attack earlier in the week, which led to an investigation and the discovery of a larger breach. The company detected unusual access patterns that led to identify unauthorized access attempts to Twitter user data. They discovered one live attack and were able to shut it down in process moments later. However, their investigation has thus far indicated that the attackers may have had access to limited user information. Twitter has reset the passwords and revoked session tokens, which allow user to stay logged into the service without reentering a password, for all of these accounts. Affected users will not be able to log in and will receive an e-mail instructing them to reset their password.
2. How was the company affected?
Twitter reports that 250,000 user accounts may have compromised. The company is able to detect the hacker immediately and send e-mail to the affected users instructing them to reset their passwords. They also recommend all users to create strong passwords and disable Java in their browsers.
3. What (if any) measures has the company taken since the breach to prevent future similar incidents?
The company offers tips for all of its users going forward, including using strong passwords that mix numbers and symbols with upper- and lowercase letters, not using the same password for multiple accounts, update and upgrade antivirus software and disabling Java. The company also provides tips to keep the account secure and also steps to take if your account has been compromised.
4. In your opinion, did the company have sufficient security safeguards in place prior to the breach?
In my opinion, Twitter has sufficient security safeguards in place prior to the breach. Twitter is able to detect the attacker before they get through all 200 million monthly active users. 250,000 accounts of affected users is a small amount comparing to the number of Twitter active users. After they notice the attack, the company have been reset the password of affected users and send them e-mail to change their password. I believed that after the breach Twitter would be more aware of the security protection.
Case 2
1. What exactly occurred?
Google detected a coordinated attempt by Chinese entities to compromise the accounts of Chinese dissidents. David Drummond, Google’s chief counsel, said, “A primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists.” According to George Kurtz at McAfee, the attacks were part of a large-scale, well-organized operation called Aurora. As a result, Google has stopped censoring its search results in China, and has considered pulling out of the country entir ...
Managing the Legal Concerns of Cloud ComputingAmy Larrimore
Presented at the 2013 Pennsylvania Bar Institute as an edition in an annual series on legal concerns around cloud computing ,. This one covers how technology overlaps and where the risk needs to be managed in between systems.
The Protected Harbor 2022 Legal Services Data Breach Trend Report (2).pdfProtected Harbor
Protected Harbor's 2022 Legal Services Data Breach Trend Report is a comprehensive analysis of the evolving cybersecurity landscape in the legal industry. This report offers valuable insights into emerging trends, challenges, and opportunities that legal professionals and firms may encounter in the year ahead. Through in-depth research and expert analysis, it sheds light on the impact of technological advancements, changing regulations, and client expectations on legal services. Stay ahead of the curve with this indispensable guide to the future of legal services.
Case 11. What exactly occurred Twitter is one of popular soci.docxtidwellveronique
Case 1
1. What exactly occurred?
Twitter is one of popular social media that targeted to be hacked.
The social network said in that approximately 250,000 user accounts were potentially compromised, with attackers gaining access to information including user names and email addresses. The company first detected signs of an attack earlier in the week, which led to an investigation and the discovery of a larger breach. The company detected unusual access patterns that led to identify unauthorized access attempts to Twitter user data. They discovered one live attack and were able to shut it down in process moments later. However, their investigation has thus far indicated that the attackers may have had access to limited user information. Twitter has reset the passwords and revoked session tokens, which allow user to stay logged into the service without reentering a password, for all of these accounts. Affected users will not be able to log in and will receive an e-mail instructing them to reset their password.
2. How was the company affected?
Twitter reports that 250,000 user accounts may have compromised. The company is able to detect the hacker immediately and send e-mail to the affected users instructing them to reset their passwords. They also recommend all users to create strong passwords and disable Java in their browsers.
3. What (if any) measures has the company taken since the breach to prevent future similar incidents?
The company offers tips for all of its users going forward, including using strong passwords that mix numbers and symbols with upper- and lowercase letters, not using the same password for multiple accounts, update and upgrade antivirus software and disabling Java. The company also provides tips to keep the account secure and also steps to take if your account has been compromised.
4. In your opinion, did the company have sufficient security safeguards in place prior to the breach?
In my opinion, Twitter has sufficient security safeguards in place prior to the breach. Twitter is able to detect the attacker before they get through all 200 million monthly active users. 250,000 accounts of affected users is a small amount comparing to the number of Twitter active users. After they notice the attack, the company have been reset the password of affected users and send them e-mail to change their password. I believed that after the breach Twitter would be more aware of the security protection.
Case 2
1. What exactly occurred?
Google detected a coordinated attempt by Chinese entities to compromise the accounts of Chinese dissidents. David Drummond, Google’s chief counsel, said, “A primary goal of the attackers was accessing the Gmail accounts of Chinese human rights activists.” According to George Kurtz at McAfee, the attacks were part of a large-scale, well-organized operation called Aurora. As a result, Google has stopped censoring its search results in China, and has considered pulling out of the country entir ...
Frukostseminarium om molntjänster, 19 mars 2015, Rigoletto.
Talare: Erkan Kahraman, Projectplace och Geir Arild Engh-Hellesvik, Transcendent Group Norge.
The purpose of this paper is to review the topic of data breach from two perspectives: first, an overview of the trends in data breach litigation, and second, a more granular perspective of practical data protection processes that may serve as a guidepost to help reduce the risk of likelihood of data breach. Taken together the reader will understand why a measured approach to data protection can reduce the risk of financial liability from a data breach lawsuit.
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more...
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
Exploring new mobile and cloud platforms without a governance strategy can
have consequences.
At the beginning of my IT career, I witnessed a number of decisions and project management practices which, at the
time, just didn't seem to make sense. But I was young, and I often thought to myself that the people involved must have
some other reasoning, some justification for their actions that I was just not privy to.
In short, I remained quiet when I should have spoken up. What two decades of experience has taught me is that there
is rarely reasoning or justification behind actions that, at a gut-level, are clearly bad IT practices. We inherently
recognize when common sense has taken a back seat.
There is most definitely a dark side to BYOD. For the most part, I am an advocate for the consumerization of IT (using
non-standard apps and tools as a way to increase end user engagement and productivity) and support the bring-your-
own-device model.
However, as a seasoned manager and IT operations leader, I recognize the risks that come with the model if
organizations do not properly plan out their strategies, putting sufficient protections and governance practices in place
to manage the potential risks that could come from these unsupported devices and applications. End users often want
what’s NEW, but there are valid reasons for imposing and enforcing safeguards when giving mobile business users
access to your otherwise secure, scalable, and compliant systems.
Some people equate governance with bureaucracy and hierarchical systems, but those perceptions often come from a
lack of appreciation for the potential risks involved. Governance is about checks and balances -- supporting the tools
and systems your end users want, but in a way that is manageable and which follows defined protocols.
Examples of rogue IT practices
A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b)recent uSamp survey
(http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b) found that 41% of US mobile business
users have used unsanctioned services to share or sync files, despite 87% saying they are aware that their company
has a document sharing policy that prohibits this practice. And, 27% of mobile business users who “went rogue”,
reported immediate and direct repercussions, from lost business to expensive lawsuits and financial penalties that cost
$2 billion.
While most IT professionals understand these risks viscerally, some business users need to crash and burn before
they are willing to adjust their risky behaviors, which is not a message your employer wants to hear. Luckily, there is
another way: learning from the mistakes of others. This month, I am one of six mobile security and IT experts judging a
(http://www.rogueitstories.com/)"Rogue IT" contest (http://www.rogueitstories.com/). We’re collecting anonymous stories from the
community ...
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
Presentation to the Science and Technology Committee of the American Bar Association on legal issues associated with employers enabling employee Bring Your Own Device policies.
For today’s digital businesses, being prepared to meet new compliance requirements when storing and managing consumer data will not only minimize risk, but also enable more valued and trusted customer experiences that drive increased loyalty, engagement and revenue. To gain better perspective on this important issue, it’s important to understand:
- The trends driving governmental regulatory shifts and the basic tenets of these new laws
- The challenges faced by executives across the enterprise when managing privacy compliance for consumer data
- The emergence of cloud-based solutions that help businesses manage privacy compliance by acting as end-to-end customer data storage and management solutions that are far more scalable and flexible than legacy systems
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
The extra factors are implemented to prove the user’s identity beyond a simple password. The definition states that to be two-factor authentication it must require the user to provide at least two of the factors listed above.
http://www.portalguard.com
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
Shawn Tuma, Cybersecurity & Data Protection Partner at Scheef & Stone, L.L.P., presented to the Dallas Bar Association's Corporate Counsel Section on May 3, 2016. The title was Cybersecurity: What the GC and CEO Need to Know.
A hands-on cybersecurity presentation: preparing an action plan before you are attacked, contracting tips and available insurance coverage.
Social media competence and ethics OklahomaJon Sutten
Jabez LeBret, author of Online Law Practice Strategies, speaks with the Oklahoma State Bar about the responsibility lawyers have to stay competent and up to date with social media. What are they ethically responsible to know?
Your firm needs to be committed to protecting information assets, including personal data and client documents. As a trusted advisor to our clients, the expectation is that we are aware of threats and are guarding their data. Data privacy and information security are fundamental components of doing business today, no matter how large your firm is.
In this paper we will look at three specific ways of protecting our clients:
1. Protection through our ability to research and improve intellectual capital
2. Protection through policies, procedures and processes
3. Protection by securing client data
Letter to Google CEO Larry Page from privacy advocatesGillian Shaw
Letter from privacy commissioners across Canada and around the world to Google chief executive calling for a meeting to answer their privacy concerns over Google Glass.
Frukostseminarium om molntjänster, 19 mars 2015, Rigoletto.
Talare: Erkan Kahraman, Projectplace och Geir Arild Engh-Hellesvik, Transcendent Group Norge.
The purpose of this paper is to review the topic of data breach from two perspectives: first, an overview of the trends in data breach litigation, and second, a more granular perspective of practical data protection processes that may serve as a guidepost to help reduce the risk of likelihood of data breach. Taken together the reader will understand why a measured approach to data protection can reduce the risk of financial liability from a data breach lawsuit.
iStart feature: Protect and serve how safe is your personal data?Hayden McCall
The revelations of the Heartbleed vulnerability in April and the recent implementation of Australia’s new privacy regime in March have put data breaches firmly back in the limelight. Clare Coulson finds out more...
Exploring new mobile and cloud platforms without a governance .docxssuser454af01
Exploring new mobile and cloud platforms without a governance strategy can
have consequences.
At the beginning of my IT career, I witnessed a number of decisions and project management practices which, at the
time, just didn't seem to make sense. But I was young, and I often thought to myself that the people involved must have
some other reasoning, some justification for their actions that I was just not privy to.
In short, I remained quiet when I should have spoken up. What two decades of experience has taught me is that there
is rarely reasoning or justification behind actions that, at a gut-level, are clearly bad IT practices. We inherently
recognize when common sense has taken a back seat.
There is most definitely a dark side to BYOD. For the most part, I am an advocate for the consumerization of IT (using
non-standard apps and tools as a way to increase end user engagement and productivity) and support the bring-your-
own-device model.
However, as a seasoned manager and IT operations leader, I recognize the risks that come with the model if
organizations do not properly plan out their strategies, putting sufficient protections and governance practices in place
to manage the potential risks that could come from these unsupported devices and applications. End users often want
what’s NEW, but there are valid reasons for imposing and enforcing safeguards when giving mobile business users
access to your otherwise secure, scalable, and compliant systems.
Some people equate governance with bureaucracy and hierarchical systems, but those perceptions often come from a
lack of appreciation for the potential risks involved. Governance is about checks and balances -- supporting the tools
and systems your end users want, but in a way that is manageable and which follows defined protocols.
Examples of rogue IT practices
A (http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b)recent uSamp survey
(http://harmon.ie/blog/new-survey-reveals-mobile-rogue-it-costing-us-organizations-almost-2b) found that 41% of US mobile business
users have used unsanctioned services to share or sync files, despite 87% saying they are aware that their company
has a document sharing policy that prohibits this practice. And, 27% of mobile business users who “went rogue”,
reported immediate and direct repercussions, from lost business to expensive lawsuits and financial penalties that cost
$2 billion.
While most IT professionals understand these risks viscerally, some business users need to crash and burn before
they are willing to adjust their risky behaviors, which is not a message your employer wants to hear. Luckily, there is
another way: learning from the mistakes of others. This month, I am one of six mobile security and IT experts judging a
(http://www.rogueitstories.com/)"Rogue IT" contest (http://www.rogueitstories.com/). We’re collecting anonymous stories from the
community ...
“Who’s Afraid of E-Discovery” was presented by George E. Pallas and Jason Copley from the Law Firm of Cohen Seglias Pallas Greenhall & Fuman PC for the members of the Mid-Atlantic Steel Fabricators Association.
BYOD - Bringing Technology to work | Sending Data EverywhereJim Brashear
Presentation to the Science and Technology Committee of the American Bar Association on legal issues associated with employers enabling employee Bring Your Own Device policies.
For today’s digital businesses, being prepared to meet new compliance requirements when storing and managing consumer data will not only minimize risk, but also enable more valued and trusted customer experiences that drive increased loyalty, engagement and revenue. To gain better perspective on this important issue, it’s important to understand:
- The trends driving governmental regulatory shifts and the basic tenets of these new laws
- The challenges faced by executives across the enterprise when managing privacy compliance for consumer data
- The emergence of cloud-based solutions that help businesses manage privacy compliance by acting as end-to-end customer data storage and management solutions that are far more scalable and flexible than legacy systems
Avoiding Two-factor Authentication? You're Not AlonePortalGuard
The extra factors are implemented to prove the user’s identity beyond a simple password. The definition states that to be two-factor authentication it must require the user to provide at least two of the factors listed above.
http://www.portalguard.com
Cybersecurity: What the GC and CEO Need to KnowShawn Tuma
Shawn Tuma, Cybersecurity & Data Protection Partner at Scheef & Stone, L.L.P., presented to the Dallas Bar Association's Corporate Counsel Section on May 3, 2016. The title was Cybersecurity: What the GC and CEO Need to Know.
A hands-on cybersecurity presentation: preparing an action plan before you are attacked, contracting tips and available insurance coverage.
Social media competence and ethics OklahomaJon Sutten
Jabez LeBret, author of Online Law Practice Strategies, speaks with the Oklahoma State Bar about the responsibility lawyers have to stay competent and up to date with social media. What are they ethically responsible to know?
Your firm needs to be committed to protecting information assets, including personal data and client documents. As a trusted advisor to our clients, the expectation is that we are aware of threats and are guarding their data. Data privacy and information security are fundamental components of doing business today, no matter how large your firm is.
In this paper we will look at three specific ways of protecting our clients:
1. Protection through our ability to research and improve intellectual capital
2. Protection through policies, procedures and processes
3. Protection by securing client data
Letter to Google CEO Larry Page from privacy advocatesGillian Shaw
Letter from privacy commissioners across Canada and around the world to Google chief executive calling for a meeting to answer their privacy concerns over Google Glass.
[Note: This is a partial preview. To download this presentation, visit:
https://www.oeconsulting.com.sg/training-presentations]
Sustainability has become an increasingly critical topic as the world recognizes the need to protect our planet and its resources for future generations. Sustainability means meeting our current needs without compromising the ability of future generations to meet theirs. It involves long-term planning and consideration of the consequences of our actions. The goal is to create strategies that ensure the long-term viability of People, Planet, and Profit.
Leading companies such as Nike, Toyota, and Siemens are prioritizing sustainable innovation in their business models, setting an example for others to follow. In this Sustainability training presentation, you will learn key concepts, principles, and practices of sustainability applicable across industries. This training aims to create awareness and educate employees, senior executives, consultants, and other key stakeholders, including investors, policymakers, and supply chain partners, on the importance and implementation of sustainability.
LEARNING OBJECTIVES
1. Develop a comprehensive understanding of the fundamental principles and concepts that form the foundation of sustainability within corporate environments.
2. Explore the sustainability implementation model, focusing on effective measures and reporting strategies to track and communicate sustainability efforts.
3. Identify and define best practices and critical success factors essential for achieving sustainability goals within organizations.
CONTENTS
1. Introduction and Key Concepts of Sustainability
2. Principles and Practices of Sustainability
3. Measures and Reporting in Sustainability
4. Sustainability Implementation & Best Practices
To download the complete presentation, visit: https://www.oeconsulting.com.sg/training-presentations
Discover the innovative and creative projects that highlight my journey throu...dylandmeas
Discover the innovative and creative projects that highlight my journey through Full Sail University. Below, you’ll find a collection of my work showcasing my skills and expertise in digital marketing, event planning, and media production.
Kseniya Leshchenko: Shared development support service model as the way to ma...Lviv Startup Club
Kseniya Leshchenko: Shared development support service model as the way to make small projects with small budgets profitable for the company (UA)
Kyiv PMDay 2024 Summer
Website – www.pmday.org
Youtube – https://www.youtube.com/startuplviv
FB – https://www.facebook.com/pmdayconference
Cracking the Workplace Discipline Code Main.pptxWorkforce Group
Cultivating and maintaining discipline within teams is a critical differentiator for successful organisations.
Forward-thinking leaders and business managers understand the impact that discipline has on organisational success. A disciplined workforce operates with clarity, focus, and a shared understanding of expectations, ultimately driving better results, optimising productivity, and facilitating seamless collaboration.
Although discipline is not a one-size-fits-all approach, it can help create a work environment that encourages personal growth and accountability rather than solely relying on punitive measures.
In this deck, you will learn the significance of workplace discipline for organisational success. You’ll also learn
• Four (4) workplace discipline methods you should consider
• The best and most practical approach to implementing workplace discipline.
• Three (3) key tips to maintain a disciplined workplace.
VAT Registration Outlined In UAE: Benefits and Requirementsuae taxgpt
Vat Registration is a legal obligation for businesses meeting the threshold requirement, helping companies avoid fines and ramifications. Contact now!
https://viralsocialtrends.com/vat-registration-outlined-in-uae/
Personal Brand Statement:
As an Army veteran dedicated to lifelong learning, I bring a disciplined, strategic mindset to my pursuits. I am constantly expanding my knowledge to innovate and lead effectively. My journey is driven by a commitment to excellence, and to make a meaningful impact in the world.
LA HUG - Video Testimonials with Chynna Morgan - June 2024Lital Barkan
Have you ever heard that user-generated content or video testimonials can take your brand to the next level? We will explore how you can effectively use video testimonials to leverage and boost your sales, content strategy, and increase your CRM data.🤯
We will dig deeper into:
1. How to capture video testimonials that convert from your audience 🎥
2. How to leverage your testimonials to boost your sales 💲
3. How you can capture more CRM data to understand your audience better through video testimonials. 📊
Falcon stands out as a top-tier P2P Invoice Discounting platform in India, bridging esteemed blue-chip companies and eager investors. Our goal is to transform the investment landscape in India by establishing a comprehensive destination for borrowers and investors with diverse profiles and needs, all while minimizing risk. What sets Falcon apart is the elimination of intermediaries such as commercial banks and depository institutions, allowing investors to enjoy higher yields.
Recruiting in the Digital Age: A Social Media MasterclassLuanWise
In this masterclass, presented at the Global HR Summit on 5th June 2024, Luan Wise explored the essential features of social media platforms that support talent acquisition, including LinkedIn, Facebook, Instagram, X (formerly Twitter) and TikTok.
B2B payments are rapidly changing. Find out the 5 key questions you need to be asking yourself to be sure you are mastering B2B payments today. Learn more at www.BlueSnap.com.
2. 15876667_4
UNITED STATES DISTRICT COURT
SOUTHERN DISTRICT OF NEW YORK
UNITED STATES OF AMERICA,
v.
BENJAMIN WEY and
SEREF DOĞAN ERBEK,
Defendants.
Crim. Action No.: 15-CR-00611 (AJN)
REPLY DECLARATION OF DAVID SIEGAL
David Siegal hereby declares pursuant to 28 U.S.C. § 1746:
1. I am a partner with the law firm of Haynes and Boone, LLP and counsel for
Defendant Benjamin Wey in this case. I have been Mr. Wey’s attorney in connection with the
investigation that led to this Indictment since on or about January 27, 2012.
2. I submit this reply declaration in further support of Mr. Wey’s Motion to
Suppress, to Dismiss the Indictment, and For Other Relief (the “Motion to Suppress”). I have
personal knowledge of the facts stated herein, and I believe each of them is true and correct.
3. Annexed hereto as Exhibit 46 is a copy of a December 19, 2014 Wall Street
Journal article entitled, “Are You Sure You Want to Use Email?” by Don Clark, Shira Ovide and
Elizabeth Dwoskin.
4. Annexed hereto as Exhibit 47 is a list comparing the search terms authorized by
Exhibit B of the search warrant with the expanded list of search terms run by the Government in
the spring of 2013, with highlighting to indicate the search terms that were not included in
Exhibit B to the search warrants.
5. Annexed hereto as Exhibit 48 is an agreement between Mr. Wey and the
Oklahoma Department of Securities dated July 13, 2005.
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 1 of 25
3. 15876667_4
6. In its opposition to Mr. Wey’s Motion to Suppress, the Government states that its
search terms were “developed in consultation with the defense.” (Opp., p. 53) While I do not
know to what this refers, apart from NYGG’s counsel having provided lists of attorney names to
the Government in 2012, I do not recall any “consultation” with the Government on its taint
process or its search-term development by NYGG’s counsel or myself.
****
I hereby declare under penalty of perjury that the foregoing is true and correct.
Dated: August 12, 2016
s/ David Siegal
David Siegal
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 2 of 25
5. THE WALL STREETJOURNAL.
This copy is for your personal, non-commercial use only. To order presentation-ready copies for distribution to your colleagues, clients or customers visit
http://www.djreprints.com.
http://www.wsj.com/articles/are-you-sure-you-want-to-use-email-1419030075
TECH
Are You Sur·e Yot-1 Want to Use Elllail?
Companies Rethink Policies About Deleting Messages in Wake of Sony Leaks
Devastating leaks from Sony's computer systems have dramatized the risks of storing corporate email for extended
periods. Workers remove a poster-banner for 'The Interview' from a billboard in Hollywood. AGENCE FRANCE-
PRESSE/GETTY IMAGES
By DON CLARK, SHIRA OVIDE and ELIZABETH DWOSKIN
Dec. 19, 2014 6:01 p.m. ET
Devastating leaks from Sony Corp.'s computer systems have dramatized the risks of
storing corporate email for extended periods. Some people in Silicon Valley wonder if it
is time to rethink that practice.
Electronic mail, despite many attempts to replace it, remains a vital communications
tool and an ad-hoc filing cabinet for employees at most companies. Retrieving
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 4 of 25
6. important information and attachments by searching mail-which can be stored
indefinitely-is simple and fast.
ADVERTISING
--------
!nHead inven1ed by ·reads
But as was highlighted in the Sony hack, this puts a single trove ofboth potentially
embarrassing communication and critical company secrets within easy reach of
cybercriminals. (Related Article: Obama Says Sony 'Made a Mistake' Canceling Film)
Many long-established companies have for some time had email-deletion policies, but
for a different reason: Complying with demands for stored communication in legal cases
can be expensive.
These policies typically call for automatic deletion of emails after a set period, often
after 90 or 120 days. But many companies-especially startups-have no retention
policies.
Some experts view the startling success of attackers in breaching Sony's defenses and
distributing sensitive emails-an incident that U.S. officials have linked to North Korea
-as a powerful argument for prompt destruction of nonessential messages.
"My belief is the retention policy should be 30 days,'' said Steve Blank, a veteran Silicon
Valley entrepreneur and academic. "I think the Sony-North Korea thing just kind of
reinforces the fact."
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 5 of 25
7. There are signs that some companies are heeding such calls. Cloud Sherpas, anAtlanta-
based firm that helps companies buy Gmail and other workplace technology from
Google Inc. and others, said two customers have changed their email retention systems
since the Sony hacking.
DISCOVER MORE
One ofthem, a big technology manufacturing firm on the West Coast, asked for a
customized software process to purge email of specific users whenever the business
deemed it necessary, said David Hoff, Cloud Sherpas' chieftechnology officer. The other
customer, a midsize manufacturer, added a Google function to automatically delete
emails after a year, with a shared "safe" folder in which employees could stow emails
that they needed to keep longer.
Deleting messages isn't necessarily an absolute defense against theft, since storage
systems frequently retain traces of data that can be retrieved under some
circumstances.
A Sony spokesman didn't respond to questions about the company's data-retention
policies or details about the breach.
'My beliefis the retention policy should be 30 days. I think the Sony-North Korea
thingjust kind ofreinforces thefact. '
-Steve Blank, a veteran Silicon Valley entrepreneur
Amid the uncertainty, some tech companies say they are reviewing their security
precautions, in part because customers in government and other sectors are demanding
to know their data will be safe.
"They have a lot more questions for us as we sell into those accounts," said Douglas
Murray, chief executive of Big Switch Networks Inc., a Silicon Valley startup that is using
a security firm to evaluate its safeguards. "People are concerned."
Executives at some startups say the very idea of regularly deleting emails is a foreign
concept, and may be too drastic a solution.
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 6 of 25
8. "Destroying email that has become a repository for employees to go back and do
research will be a significant culture change," said Justin Somaini, chieftechnology
officer at Box Inc., which offers online data storage and related services. "A better
approach than deleting email is the application ofhealthy security practices on the
content itself."
Another familiar option is encrypting mails to make them unintelligible in the event
they are stolen. Few companies encrypt all oftheir email, though, in part because many
employees correspond with others outside their organizations who aren't using the
technology.
Some startups, meanwhile, have been pushing alternatives to email that they believe
improve collaboration. They include Slack Technologies Inc. and HipChat.
Matt Mullenweg, chief executive ofthe startup Automaticc, said it mainly leans on tools
such as Slack and hardly uses email anymore. But those services also generate data that
could tempt attackers.
"Search is one of the big features ofthese tools, so deleting old stuffwould be
counterproductive," Mr. Mullenweg said, who said his company has no plans to start
deleting emails.
Many startups also rely on services like Google's Gmail, rather than storing and
managing email on their own servers as established companies tend to do.
President Barack Obama, in a news conference Friday, said the U.S. will respond to the hacking it traced to North Korea.
KEVIN LAMARQUE/REUTERS
"We expect our email to stick around forever," said Jonathan Gray, chief executive of the
big data startup Cask, which uses Gmail. "I think most would be best served thinking
that way."
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 7 of 25
9. Mr. Gray said his company has strict policies around handling sensitive data from its
enterprise customers, but had no internal policy governing how email data would be
deleted.
John Schroeder, chief executive ofbig data startup MapR, said the company takes a
similar stance. "We haven't implemented a deletion policy of any kind," he said, adding
that the company has strict policies for handling customer data.
At the opposite extreme are companies like Intel Corp., which grappled with email
retention issues in a private antitrust suit by rival Advanced Micro Devices Inc. that was
settled in 2009.
Some Intel employees failed to take the proper measures to stop relevant emails from
being destroyed by the company's auto-delete system.
WSJ.D
WSJ.D is the Journal's home for tech news, analysis and product reviews.
• Sony Made It Easy but Anyone Could Get Hacked; Here's Some Advice (http://www.wsj.com/articles/sony-
made-it-easy-but-any-of-us-could-get-hacked-1419002701)
• Who Needs Amazon or Wal-Mart? China Is Cutting Out the Middleman (http://www.wsj.com/articles/who-
needs-amazon-or-wal-mart-china-cuts-out-the-middleman-1418950309)
• Yahoo Halts Flickr Photo Sales Amid Backlash (http://blogs.wsj.com/digits/2014/12/18/yahoo-halts-flickr-
photo-sales-amid-backlash/)
• A Look at the Year's Tech Hits and Misses, and What's Up for 2015 (http://blogs.wsj.com/personal-
technology/2014/12/19/a-look-at-the-years-tech-hits-and-misses-and-whats-up-for-201 5/)
Now
the
company automatically deletes emails after 90 days, unless employees individually take
action to store them in folders, said Chuck Mulloy, an Intel spokesman.
These days, Silicon Valley companies seem more interested in reducing the risks with
additional technology. Some entrepreneurs have advocated messaging systems, along
the lines ofthe consumer service Snapchat, that are designed to delete messages soon
after they are viewed.
Others believe that companies should develop technology that gives individuals or
corporate owners ofthat data the ability to destroy it remotely if it falls into the wrong
hands, though the feasibility ofthe approach remains unclear.
"The sender should have the right to delete the email,'' said Muddu Sudhakar, chief
executive of Caspida, a Silicon Valley security startup. "These systems need to evolve to
support that capability."
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 8 of 25
10. -Steven Rosenbush andEvelyn M. Rusli contributed to this article.
Write to Don Clark at don.clark@wsj.com, Shira Ovide at shira.ovide@wsj.com and
Elizabeth Dwoskin at elizabeth.dwoskin@wsj.com
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 9 of 25
12. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
23 Rue Ferdinand-Hadler
32 Hollywood Road
Adam Cavise
Adges
Adrian Alfred Crimeni
Adriana Walker
Advantage Consultants
AgFeed
Ahmed Mohidin
aka Mary-Chantal Souilem
Akfgrif Neunie
Akil Channer
Albert Lee
Alex Li
Alexander Kibrik
Alexander Velez
Alexis Rittereiser
Aliya Morgan
Ana Cicero
Andrea Vellios
Andrew Aspromonte
Andrew Drake Jobe
Anthony DiGiovanni, Jr.
Anthony DiGiovanni, Sr.
Anthony Valente
Arnold Staloff
Bai Weijiang
Bank of Communications
Bank of East Asia
Barney Monte
Barry Cohen
Barry Konig
Barry Slotnick
Becky Cragin
Bei Lu
Ben Wey Family Trust
Bicornio Real Estate Ltd. (Signatory:)
Bill Chongtong Chen
Bill He
BMJT Holdings
BMO Capital Markets
Bodisen Biotech
Boris Hochman
Brandon Stewart
Brenda Diagnault
Brian Walker
bright_Li@2G3.net
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 11 of 25
13. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
Broadridge
Broadridge
Brown Brothers Harriman
Brown Brothers Harriman
Bryan Kimbrough
BW Insurance Trust
bwey
Calvin Vaval
Caribe Management
Carol Calabro
Cartan Holdings, Inc.
Chang Yuan WANG
Changyuan WANG
Chantal SOUILEM
Charles Schiro
Chase
Chen Ming
Chen Sheng
Chen ZHANG
China Natural Gas
Chris Cragin
Christopher Urbanski
Citibank
Citigroup
Claudia Allon
CleanTech
Corie Valente
Coventure International Inc.
Credit Suisse
Crescent Liu
Crescent LIU
Damion Escabar
Daniel Walker
Daria Rizzello
David Lu
David Mccusker
Dayle Byers
Deer Consumer Products
Deerfield Road, LLC
Deutsche Bank
Dixon Chen
Dogan Erbek
Dong Xin, a/k/a Xin Dong
Douglas Shebroe
Du Wei
Duane Jobe
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 12 of 25
14. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
Dunmore Global Investments
Etrade
Edward (Eddie) Ninive
Edward Irvin
Edward McMillan
Edward Mostafa
Elijah Graham
Elizabeth (Liz) Scholander
erbek@estgeneva.ch
Erika Newman
EST S.A.
Ester Saintable
Ethel Konig
Ever Trust
Everett Leonidas
Everton Capital
Farley Wang
farleycyw@yahoo.com
Federal Express
FedX
Finchley International Investments
First Merger Capital
First Merger Capital (Delaware), Inc.
First Merger Capital, Inc.
Focus Trading Investments
Four Tong Investments
Francine Curcio
Francis Perez
Francis Vetere
Frank DiMartini
Fred Rittereiser
Fufuko Walker
FusionTech
Futmon Holdings
Gary Cicero
Gary Smalley
Genovie Fernandez
George L. Calhoun
George Vellios
Gerard Diagnault
Gineva Escabar
GKM
Goldman Kurland
Graham Walker
Grayling
Greg Mulligan
Guo Sheng
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 13 of 25
15. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
Guy Durand
Han Bo
Han Hua
Harban Capital
Harlesten Assets
Harold Walker, a/k/a "Jim Walker"
Herman Palmero
Holladay (Stock Transfer)
Hong Ju Wang
HSBC
Huajun Ai
Ike Nairn
lnterbridge Capital Advisors
lnterwest Stock Transfer
Island Stock Transfer
J.P. Morgan
Jacquelyn Hart
Jacquelyn Rittereiser
James Hayes
James Jun Wang a/k/a Wang James Jun
James Schiro
James Shaughnessy
James Walker
James Wilent
Jameson Capital
Jason Schlombs
Jay Feeney
Jefferies
Jeffrey Gruehn
Jennifer Ninive
Jiahua WANG
Jingyi LIU
Joe Giamichael
John Adams
John Baginski
John Cragin
John Stadler
John Wang
Jonathan Woo
Jorge C. Ferreira
Joseph Allen
Joseph B. Gatkuoth
Joseph Giamichael
Joseph J. Steward
Joseph Naselli
Joseph R. Oleske
Joseph Rizzello
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 14 of 25
16. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
Joseph Valente
Josephine Aspromonte
JTE Insurance Trust
Justin Miller
Justin Rizzello
Kansas Rosalind Day
Karen Walker
Katherine I. Walker
Kathi Harms
Kathy Ninive
Kathy ZHANG
Katya Voronchuk
Keisha Harris
Keller Walker
Kevin Pickard
Kim Cragin
Kinwick
Labron Toles
Lai Yin Ling
Laura Tizio
Legent
Leroy Urbanski
Li Jun aka Jun Li
LI We
Li Yan a/k/a Yan Li
Li Yan, a/k/a Yan Li
Linda LIU aka Jia LIU
lindajialiu@gmail.com
lindajialiu@yahoo.com
Liu Junwei
Liu Xinting
liujia1018@vip.sina.com
Louise Adams
Lu Yuan
Luke Walker
Ma Wen
Mack L. Miller
Maline Rizzello
Marc Crimeni
Marie Robinson
Mark Robinson
Marsha Uchimoto
Martin Gilmartin
Martinez-Ayme
Mary Anne Wilent
Maryna Bilyska
Mascoma Savings Bank
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 15 of 25
17. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
Matthew Apfel
Maureen Gearty
Meadow Investments Group
Median Asset Investments
Melinda Cruz
Metlife
Michael Dugan
Michael Perlik
Michaela Wey Fam ily Trust
Michal Perlik
Michelle Harris
Ming LI a/k/a LI Ming
Morgan Stanley
mwei@nyggroup.com
mwey@nygg.com
Myron Rosenkranz
Nadine Aspromonte
Nan Wang
Nancy Ninive
Nancy Palmero
Nancy Wang
NASD
Nasdaq
New England Securities
New York Global Advisors
New York Global Capital
New York Global Group
New York Global Securities
nicebright@263.net
Nicholas Sinclair
Nicholas Sinclair
Nico Rizzello
Noelle Urbanski
Norma Smalley
Norma Walker
Nova Lifestyle
NYG Capital
NYGC
NYGC Investment Consulting
nygcapital.com
NYGG
nygg.com
nyggroup.com
NYGS
Olga Gutnik
Omar Campbell
Otakar Ungerman
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 16 of 25
18. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
P.O. Box 3179
P.O. Box 663
Pacific Gold rim Resources
Patricia Aspromonte
Patrick W. Watson
Patty Shaughnessy
Paul Turner
Paul Turner
Pauline Bartley
Peg Lalor
Peifen ZHANG
Peng Guo
Penson
Peter Tsu
Phil Quartuccio
Qian Lu
Quianna Mongol
Quingan SHEN
Radnor
Ramnarain Jaigobind
Raquel Sanchez
Raymond James
Raymond Phillips
Regina Schwartz
Regina Schwartz
Rick Exton
rnewman@newmanmorrison.com
rnewman@nlawglobal.com
Robert Newman
Robert Newman
Robert Newman
Robert Rittereiser
Robert Volpe
Rodman & Renshaw
Ron Basu
Ron Zakai
Ronen Zakai
Roosen Commercial
RRZ Management
Ruide.tang@gmail.com
Rupert Barcoo
Samuel Walker
Sara Urbanski
Sarah WEI
Sarah@nygcapital.com
Scottrade
Sea boa rd Securities
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 17 of 25
19. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
SG Private Bank
Shao Huifa
Sharon Staloff
Sherry Pryor
Shiner International
Signature Bank
Signature Stock Transfer
Signature Stock Transfer
Smartheat
Snowcz2004@yahoo.com.uk
Song N. Hui a/k/a Hui Song N
Song Nian Hui, a/k/a Nian Hui Song
Sovereign Managers
Sovereign Trust
Stephanie Mccusker
Stephen Barbot
Stephen Lambrix
Stephen M. Barbot
Sterne Agee
Steros Christoforou
Steve Day
Stevens Resources
Strong Growth Capital
Stuart A. Jeffrey
Suite 1601-1603
Susanne Mulligan
Tag Events Corporation
Talman Harris
TD Ameritrade
TD Bank
Tereza Ungermanova a/k/a Teresa Ungerman
Terry Most
Thelma Robinson
Tian Vi WEI
Tianjin NYGC Investment Consulting
Tianyi WEI
Tianyl Wei Family Trust
Tiffany Fields
Timal Robinson
Timothy Calabro
Timothy S. Orr
TJWS Investment Consulting
Travis McDonald
UBS
user2012@126.com
Ven law Consultants
Verizon
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 18 of 25
20. Search Terms for Electronic Devices Seized in Jan. 2012 searches of Wey Office and Apartment
As of May 3, 2013
Vincent Cervone
Vincent Ficci
Vision Capital
Viviana Escabar
Wallace Mountain Resources
Wang Cheng
Wang Jiahua, a/k/a Jiahua Wang
Wang Yingkai
Wang Yu
Wang Yuan
Wanshuang Zhang
Wayne Bacheler
Wbb219@yanoo.com
We LI
WEI Tian Yi
Wendy Jobe
William Blair
William Ma
William Scholander
William Uchimoto
Witter
Wolf Enterprises
Wonderful Ltd.
Wong Hong
Wu Nan
Yang Xin Yun a/k/a Yun Xin Yang
Yang Xiu Yun, a/k/a Xiu Yun Yang
Yanxia ZHANG
Ye He
Yi Zhang
Yingmao WEI
York Capital Management
You Li Investment Consulting Ltd.
Yuzen HOU
Yvette Rogers
Zapnaps
Zhang Chen, a/k/a Chen Zhang
Zhao Guangyu
Zhe Pang
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 19 of 25
22. In the Matter of:
Benjamin Wei,
STATE OF OKLAHOMA
DEPARTMENT OF SECURITIES LGU5 Iiiv
FIRST NATIONAL CENTER, SUITE 860
120 NORTH ROBINSON
OKLAHOMA CITY, OKLAHOMA 73102
Respondent. ODS File No. 02-166
AGREEMENT
An investigation into the activities of Benjamin Wei was conducted by the
Oklahoma Department of Securities (Department), pursuant to the Oklahoma
Uniform Securities Act of 2004 (Act), Okla. Stat. tit. 71, §§ 1-101through1-701
(Supp. 2003), and the Oklahoma Securities Act (Predecessor Act), Okla. Stat. tit.
71, §§ 1-413, 501, 701-703 (2001 and Supp. 2003), in connection with the offer,
sale and/or purchase of securities and the provision of investment advice in
and/or from Oklahoma.
On January 22, 1997, Wei was registered. under the Predecessor Act as
an investment adviser representative of Elite Strong Growth Investment, Inc.
(Elite), an investment adviser. Wei's registration as an investment adviser
representative terminated on December 31, 2000.
On January 71 2000, Wei applied for registration under the Predecessor
Act as an agent of his closely held company, Benchmark Securities Group, Inc.
(Benchmark Securities}, a broker-dealer. On October 3, 2001, Wei's application
terminated without registration.
· On April 17, 2000, Wei, individually, and as president of Elite, entered into
an agreement with the Department to resolve certain deficiencies uncovered in
two on-site examinations of Elite. Pursuant to the agreement, Wei was not
allowed to act in a supervisory capacity for Benchmark Securities.
The Department's investigation revealed that between December 1999
and September 2001, Wei made recommendations to at least two (2) Oklahoma
residents for the purchase of shares of Ashton stock and warrants, shares of
PharmaPrint stock, and/or shares of Micron Electronics stock that were not
suitable for said customers. Wei failed ·to disclose the risks associated with the
purchase of these securities. Further, Wei made at least one trade that the
customer subsequently claimed was not authorized by the customer. On several
1
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 21 of 25
23. occasions, Wei failed to follow his customer's instructions with regard to their
investment accounts.
The investigation further revealed that Wei failed to disclose to his
customers a consulting arrangement among PharmaPrint, Elite and Wei, and a
consulting agreement executed by Ashton Technology Group, Inc. (Ashton) and
Wei as the "U.S. Representative" of Tianjin New Hong Cheng Technology &
Trading Co., Ltd. (Tianjin), a People's Republic of China (China) corporation
owned by Wei's sister. Wei had discretionary authority over the Tianjin
investment account(s). Wei did not disclose the consulting agreements to his
customers at the time he was recommending and selling Pharmaprint stock and
Ashton stockand warrants to such customers.
The investigation further revealed that in 2000, Wei offered and sold an
Oklahoma resident an investment evidenced by a "Convertible Note" issued by
VIGUS.COM, INC. At the time of the transaction, Wei was not registered under
the Predecessor Act to transact business in the state of Oklahoma as an agent of
a broker-dealer or an issuer. The Convertible Note issued by VIGUS.COM, INC.
was not registered under the Predecessor Act.
Without admitting or denying the findings by the Administrator, Wei
desires to resolve the issues raised in the investigation expeditiously and in a
manner consistent with the purposes fairly intended by the policies and
provisions of the Act and the Predecessor Act.
NOW THEREFORE, the parties agree as follows:
1. Censure. Respondent consents to the issuance of a censure (the
"Order of Censure") and voluntarily waives his right to notice, hearing and appeal
as provided by the Act, the Predecessor Act, the Rules of the Oklahoma
Securities Commission and the Administrator of the Department of Securities
("Rules"), and the Oklahoma Administrative Procedures Act, Okla. Stat. tit. 75, §
250 et. seq.
2. Prohibition to Conduct Business. Respondent agrees that
subsequent to the execution of this Agreement he shall not request to register as
a broker-dealer, broker-dealer agent, investment adviser, investment adviser
representative and/or issuer agent under the Act. Respondent further agrees
that he shall not transact securities business on behalf of an issuer of securities
or as a broker-dealer, broker-dealer agent, investment adviser, investment
adviser representative and/or issuer agent in and/or from the state of Oklahoma.
3. Entire Agreement. Wei voluntarily consents to the issuance of this
Agreement and the Order of Censure and represents that the consent and
waivers contained herein are voluntary and given without threat, offer, promise,
or inducement of any kind or nature having been made or given by the
2
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 22 of 25
24. Department, its staff, the Administrator, or the Oklahoma Securities Commission.
Other than the Order of Censure, this writing constitutes the entire agreement of
the parties with respect to the subject matter hereof and supersedes any and all
prior and contemporaneous agreements, representations and understandings of
the parties. No supplement, modification or amendment to this Agreement shall
be binding unless executed in writing by each of the parties hereto.
4. Limitation on Agreement. Nothing in this Agreement shall
prohibit the Administrator from furnishing information to any other properly
constituted agency or authority. In the event any other agency or authority
commences an action in connection with information obtained by the
Administrator against Respondent, the Administrator may assist in such actions
as authorized by law. It is further agreed that the execution of this Agreement
does not mean that the Administrator has passed in any way upon the merits or
qualifications of, or recommended or given approval to, the transactions to which
it relates. ·
5. Effective Date. This Agreement shall be effective as of the date on
which it is signed by the Administrator as set forth below his signature hereto.
6. Consideration. In consideration for this Agreement, the
Administrator will not take further action against Wei in connection with the
activities described above provided, however, should Wei fail to comply with the
terms of this Agreement in any material respect or if Wei has made any false or
misleading statements to the Department in connection with this matter, the
Department will initiate action against Wei as authorized by the Act and/or the
Predecessor Act.
7. Applicability. This Agreement applies only to the activities of Wei
and to no others.
IN WITNESS WHEREOF, the parties have executed this Agreement as of
the date and year set forth below their signatures hereto.
Benjamin Wei
~~~
:;~ART:E: OF
Irving L. g t, A · istrator
Date: JULY 13, 2005
3
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 23 of 25
25. In the Matter of:
Benjamin Wei,
STATE OF OKLAHOMA
DEPARTMENT OF SECURITIES
THE FIRST NATIONAL CENTER, SUITE 860
120 NORTH ROBINSON
OKLAHOMA CITY, OKLAHOMA 73102
by the
Administrator
Respondent. ODS File No. 02-166
ORDER OF CENSURE
The Oklahoma Department of Securities (Department) conducted an investigation
into the activities of the named Respondent pursuant to the Oklahoma Uniform Securities
Act of 2004 (Act), Okla. Stat. tit. 71, §§ 1-101 through 1-701 (Supp. 2003), and the
Oklahoma Securities Act (Predecessor Act), Okla. Stat. tit. 71, §§ 1-413, 501, 701-703
(2001 and Supp. 2003).
In order to resolve the issues raised in connection with the Department's
investigation, Respondent voluntarily executed the Agreement that is attached hereto as
Exhibit "A" and incorporated herein by reference and consented to the issuance of this
Order.
IT IS HEREBY ORDERED THAT Benjamin Wei is censured for violations of
Sections 101, 201 and 301 of the Predecessor Act, and 660:10-7-42 and 660-10-5-42 of
the Rules of the Oklahoma Securities Commission and the Administrator of the
Department of Securities.
Witness my Hand and the Official Seal of the Oklahoma Department of Securities
,thi~~ ,~:~r.$'.;.;;·.~yot rmt 2005.
: • • ~ • ·' •' oo ·Ii""' s,.A'
.<~ ~~. - . t:'·· ···:
:- ~;-~
.
•-~· (SEAL).
.' ~:..
( ~ ... ~ :·
. _,. .
IRVING L I..:.A<Htf':!
OF THE
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 24 of 25
26. CERTIFICATE OF MAILING
The undersigned hereby certifies that on the 13th day of July, 2005, a true and
correct copy of the above and foregoing Agreement and Order of Censure was mailed to:
Richard J. Babnick, Jr., Esq.
Sichenzia Ross Friedman Ference L.L.P.
1065 Avenue of the Americas, 2151
Floor
New York, New York 10018
Brenda London
Paralegal
Case 1:15-cr-00611-AJN Document 61 Filed 08/12/16 Page 25 of 25