With the performance gains promised by HHVM and PHP 7, WordPress site admins are living in pretty exciting times. The PHP world at large is in a proverbial space race, and every WordPress site will (eventually) benefit. But early adopters and folks who manage their own servers shouldn’t be the only ones who get early access to these face melting bumps in speed. In this talk, I’ll be introducing you to things you can do to get your code ready for these next generation hosting environments. And we’ll cover where you can host your code once it’s ready. If you’re interested in attending this talk, a passing familiarity with the command line helps, but isn’t a hard requirement.
Defeating x64: The Evolution of the TDL RootkitAlex Matrosov
n this presentation we will be discussing the evolution of the notorious rootkit TDL (classified by ESET as Win32/Olmarik and Win64/Olmarik) which in its latest incarnation is the first widespread rootkit to target 64-bit versions of Microsoft Windows operating systems. The most striking features of the rootkit are its ability to bypass Microsoft Windows Driver Signature Checking in order to load its malicious driver, and its implementation of its own hidden encrypted file system, in which to store its malicious components. Between its first appearance on the malware scene and the present its architecture has been drastically changed several times to adapt to new systems and respond to countermeasures introduced by antivirus and HIPS software. In the presentation we will cover the the following topics: the evolution of the user-mode and kernel-mode components of the rootkit; techniques it has used to bypass HIPS; modifications to the hidden file system; bootkit functionality; tne recently introduced ability to infect x64 operating systems; and, finally, approaches to removing the rootkit from an infected system. In addition, we will present our free forensic tool for dumping the hidden rootkit file system.
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...Jakub "Kuba" Sendor
We use Macs a lot at Yelp, which means that we see our fair share of Mac-specific security alerts. Host based detectors will tell us about known malware infestations or weird new startup items. Network based detectors see potential C2 callouts or DNS requests to resolve suspicious domains. Sometimes our awesome employees just let us know, “I think I have like Stuxnet or conficker or something on my laptop.”
When alerts fire, our incident response team’s first goal is to “stop the bleeding” – to contain and then eradicate the threat. Next, we move to “root cause the alert” – figuring out exactly what happened and how we’ll prevent it in the future. One of our primary tools for root causing OS X alerts is OSXCollector.
OSXCollector (https://github.com/Yelp/OSXCollector) is an open source forensic evidence collection and analysis toolkit for OS X. It was developed in-house at Yelp to automate the digital forensics and incident response (DFIR) our crack team of responders had been doing manually.
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
Slides de Jonathan Zdziarski en HOPE/X Talk; explicando el agujero de seguridad (backdoor) que Apple puso en iOS desde siempre, con acceso a iPhone y iPad sin explicacion alguna para seguridad real
With the performance gains promised by HHVM and PHP 7, WordPress site admins are living in pretty exciting times. The PHP world at large is in a proverbial space race, and every WordPress site will (eventually) benefit. But early adopters and folks who manage their own servers shouldn’t be the only ones who get early access to these face melting bumps in speed. In this talk, I’ll be introducing you to things you can do to get your code ready for these next generation hosting environments. And we’ll cover where you can host your code once it’s ready. If you’re interested in attending this talk, a passing familiarity with the command line helps, but isn’t a hard requirement.
Defeating x64: The Evolution of the TDL RootkitAlex Matrosov
n this presentation we will be discussing the evolution of the notorious rootkit TDL (classified by ESET as Win32/Olmarik and Win64/Olmarik) which in its latest incarnation is the first widespread rootkit to target 64-bit versions of Microsoft Windows operating systems. The most striking features of the rootkit are its ability to bypass Microsoft Windows Driver Signature Checking in order to load its malicious driver, and its implementation of its own hidden encrypted file system, in which to store its malicious components. Between its first appearance on the malware scene and the present its architecture has been drastically changed several times to adapt to new systems and respond to countermeasures introduced by antivirus and HIPS software. In the presentation we will cover the the following topics: the evolution of the user-mode and kernel-mode components of the rootkit; techniques it has used to bypass HIPS; modifications to the hidden file system; bootkit functionality; tne recently introduced ability to infect x64 operating systems; and, finally, approaches to removing the rootkit from an infected system. In addition, we will present our free forensic tool for dumping the hidden rootkit file system.
OSXCollector: Automated forensic evidence collection & analysis for OS X (Bru...Jakub "Kuba" Sendor
We use Macs a lot at Yelp, which means that we see our fair share of Mac-specific security alerts. Host based detectors will tell us about known malware infestations or weird new startup items. Network based detectors see potential C2 callouts or DNS requests to resolve suspicious domains. Sometimes our awesome employees just let us know, “I think I have like Stuxnet or conficker or something on my laptop.”
When alerts fire, our incident response team’s first goal is to “stop the bleeding” – to contain and then eradicate the threat. Next, we move to “root cause the alert” – figuring out exactly what happened and how we’ll prevent it in the future. One of our primary tools for root causing OS X alerts is OSXCollector.
OSXCollector (https://github.com/Yelp/OSXCollector) is an open source forensic evidence collection and analysis toolkit for OS X. It was developed in-house at Yelp to automate the digital forensics and incident response (DFIR) our crack team of responders had been doing manually.
iPhone Apple iOS backdoors attack-points surveillance mechanismsMariano Amartino
Slides de Jonathan Zdziarski en HOPE/X Talk; explicando el agujero de seguridad (backdoor) que Apple puso en iOS desde siempre, con acceso a iPhone y iPad sin explicacion alguna para seguridad real
Picture This: Tracking Thieves & Pedophiles with Image MetadataTripwire
Over the past few years I have developed and used technologies that help recover stolen devices ranging from laptops, cell phones, iPods, flash drives and even high end digital cameras. One tool was CameraTrace which is a massive database of camera serial numbers discovered via distributed bots that scan popular photo sharing and social media websites extracting serial numbers and other data from the metadata of images. The tool has led to the recovery of several stolen cameras and is being utilized by law enforcement agencies across the country including the Homeland Security Investigations Cyber Crimes Center (HSI C3) Child Exploitation Investigations Unit who is using it along with several other sophisticated tools to help track down child pornographers and pedophiles many times before they are able to hurt a child.
The average American adult now checks their phone 150 times per day. There will be 26 billion autonomous Internet-connected devices by 2020.
Technology is now so intertwined with our daily lives and so ubiquitous in our society, it’s hard to believe that just eight years ago the first iPhone was released or that just 18 years ago the first social media site launched. It wasn’t until around 1995 that the word “Internet” even appeared on TV, according to The Atlantic.
Take a look back at the technology trends from years ago that today would have the average user shaking in their boots in FOMO.
Cybersecurity: How to Use What We Already Knowjxyz
Slides from my PSR keynote on how to secure software by bridging the gap between research and practice.
Video: https://t.co/mRr4CMrfKN
Event: https://iapp.org/conference/privacy-security-risk-2015
As the world becomes more connected, security needs to be at the forefront of people’s minds as they use mobile devices to live every day life. Here are 5 things to consider when using your mobile device.
Stem OPT Extension : DHS Requestion Court for 3 Months Extension of Deadlinehappyschools
DHS on Dec 22, 2015 requested Federal Court to extend the deadline of Feb 12, 2016 by another 3 months to May 10, 2016 to implement the Rule due to high volume of comments.
Sample opposition to motion to vacate in California with an attorney affidavi...LegalDocsPro
This sample opposition to California motion to vacate judgment with an attorney affidavit of fault is used to oppose a motion made under the mandatory attorney affidavit of fault provisions of Code of Civil Procedure section 473(b) on several grounds including that the motion is untimely, does not include the required attorney affidavit of fault, the attorney is covering up for the client and other grounds. The sample on which this preview is based is 12 pages and includes brief instructions, a memorandum of points and authorities with citations to case law and statutory authority and a sample declaration.
Sample collection of meet and confer letters for discovery in californiaLegalDocsPro
This sample collection of meet and confer letters for discovery in California contains over 10 sample meet and confer letters and responses to meet and confer letters including a (1) meet and confer letter for further discovery responses to interrogatories, requests for admission and requests for production of documents, (2) response to meet and confer letter for motion to compel further responses to interrogatories, (3) response to meet and confer letter for motion to compel further responses to requests for production of documents, (4) meet and confer letter for protective order for interrogatories, (5) meet and confer letter for protective order for requests for admission, (6) meet and confer letter for protective order for requests for production of documents, (7) Response to meet and confer letter for for protective order for interrogatories, (8) response to meet and confer letter for protective order for requests for admission, (9) response to meet and confer letter for protective order for requests for production of documents, (10) meet and confer letter for protective order for deposition, (11) meet and confer letter for motion to quash subpoena duces tecum, (12) meet and confer letter for motion to compel attendance at deposition, and (13) meet and confer letter for motion to compel testimony at deposition. The sample on which this preview is based is 42 pages and includes the meet and confer letters mentioned above. The author is a freelance paralegal that has worked in California and Federal litigation since 1995 and has created over 300 sample legal documents for sale.
Can my employer fire me for no reason?
an “at-will” employment state. This means that in most cases, your employer can fire you at any time for any reason, for a bad reason, or for no reason at all. So your employer can fire you for complaining about your boss’s lack of
Can my employer retaliate against me?
Generally, yes. Most retaliation is not illegal. You should contact Heins & Minko Employment Attorneys to find out if you case has merit.
Are there exceptions to employment at-will?
employment contract, it may contain language that says your employer can only fire you “for cause” (i.e., a good reason). Additionally, if your employer made an oral or written statement (including pre-employment statements) that tends to limit its ...
Am I eligible for unemployment if my employer fired me for a bad reason or no reason?
Yes. Even if your situation does not fall into one of the exceptions of employment at will listed here, you may still be eligible for unemployment benefits if your employer did not terminate you for misconduct.
What is illegal discrimination?
Discrimination is treating someone differently based on his/her membership in a “protected class.” Protected classes include race, color, creed, religion, national origin, gender, sexual orientation, marital status, physical or mental disability, receipt of public assistance, and age. ...
What is illegal harassment?
(see the preceding paragraph for a list of protected classes) that creates a hostile environment or adversely affects the individual’s employment. Most harassment claims are for sexual harassment. While morally wrong, harassment is not legally wrong unless the reason you are ...
Can I take medical or parental leave?
State and federal laws require some employers to provide eligible employees with leave for the birth, adoption, or foster care of a child, and to care for a serious health condition of the employee or his/her close relative. Eligible employees may sue for damages if their employer denies or ...
Is my employer required to accommodate my disability?
Employers must reasonably accommodate a qualified employee’s disability, unless the accommodation imposes an undue hardship on the employer.
Act 10 continues to cause controversy in Wisconsin
the law unconstitutional in Sept. 2012 and a stay was put on enforcing
Prison guard union vote allowed by state
On behalf of Heins Law Office LLC posted in Employment Disputes on Thursday, May 30, 2013.
President Obama praises Gap for raising wages
behalf of Heins & Minko posted in Employment Disputes on Friday, February 28, 2014. Wisconsin residents may be interested in recent comments by President Obama on a newly announced plan by Gap Inc. to raise its minimum wage. On Feb. 19, President Obama praised the ...
Wisconsin equal rights claim results in settlement
attorney who has
Sample stipulation and order to appoint discovery referee in CaliforniaLegalDocsPro
This sample stipulation and order to appoint a discovery referee in California is used pursuant to Code of Civil Procedure section 638 to appoint a discovery referee to set the date, time and place for all hearings determined by the referee to be necessary, to direct the issuance of subpoenas, to preside over hearings, to take evidence, and to rule on objections, motions, and other requests made during the course of the hearing. The sample stipulation and order is 3 pages and includes brief instructions. The author is an entrepreneur and retired litigation paralegal that worked in California and Federal litigation from January 1995 through September 2017 and has created over 300 sample legal documents for sale. Note that the author is NOT an attorney and no guarantee or warranty is provided.
Join Logikcull and a panel of experts for lessons and best practices to be learned from the most important eDiscovery cases -- and debacles -- of the year. Seven cases will be featured. Come for the hardcore precedence. Stay for the surprise bonus lessons. Michael Simon and Timothy Lohse will host.
Picture This: Tracking Thieves & Pedophiles with Image MetadataTripwire
Over the past few years I have developed and used technologies that help recover stolen devices ranging from laptops, cell phones, iPods, flash drives and even high end digital cameras. One tool was CameraTrace which is a massive database of camera serial numbers discovered via distributed bots that scan popular photo sharing and social media websites extracting serial numbers and other data from the metadata of images. The tool has led to the recovery of several stolen cameras and is being utilized by law enforcement agencies across the country including the Homeland Security Investigations Cyber Crimes Center (HSI C3) Child Exploitation Investigations Unit who is using it along with several other sophisticated tools to help track down child pornographers and pedophiles many times before they are able to hurt a child.
The average American adult now checks their phone 150 times per day. There will be 26 billion autonomous Internet-connected devices by 2020.
Technology is now so intertwined with our daily lives and so ubiquitous in our society, it’s hard to believe that just eight years ago the first iPhone was released or that just 18 years ago the first social media site launched. It wasn’t until around 1995 that the word “Internet” even appeared on TV, according to The Atlantic.
Take a look back at the technology trends from years ago that today would have the average user shaking in their boots in FOMO.
Cybersecurity: How to Use What We Already Knowjxyz
Slides from my PSR keynote on how to secure software by bridging the gap between research and practice.
Video: https://t.co/mRr4CMrfKN
Event: https://iapp.org/conference/privacy-security-risk-2015
As the world becomes more connected, security needs to be at the forefront of people’s minds as they use mobile devices to live every day life. Here are 5 things to consider when using your mobile device.
Stem OPT Extension : DHS Requestion Court for 3 Months Extension of Deadlinehappyschools
DHS on Dec 22, 2015 requested Federal Court to extend the deadline of Feb 12, 2016 by another 3 months to May 10, 2016 to implement the Rule due to high volume of comments.
Sample opposition to motion to vacate in California with an attorney affidavi...LegalDocsPro
This sample opposition to California motion to vacate judgment with an attorney affidavit of fault is used to oppose a motion made under the mandatory attorney affidavit of fault provisions of Code of Civil Procedure section 473(b) on several grounds including that the motion is untimely, does not include the required attorney affidavit of fault, the attorney is covering up for the client and other grounds. The sample on which this preview is based is 12 pages and includes brief instructions, a memorandum of points and authorities with citations to case law and statutory authority and a sample declaration.
Sample collection of meet and confer letters for discovery in californiaLegalDocsPro
This sample collection of meet and confer letters for discovery in California contains over 10 sample meet and confer letters and responses to meet and confer letters including a (1) meet and confer letter for further discovery responses to interrogatories, requests for admission and requests for production of documents, (2) response to meet and confer letter for motion to compel further responses to interrogatories, (3) response to meet and confer letter for motion to compel further responses to requests for production of documents, (4) meet and confer letter for protective order for interrogatories, (5) meet and confer letter for protective order for requests for admission, (6) meet and confer letter for protective order for requests for production of documents, (7) Response to meet and confer letter for for protective order for interrogatories, (8) response to meet and confer letter for protective order for requests for admission, (9) response to meet and confer letter for protective order for requests for production of documents, (10) meet and confer letter for protective order for deposition, (11) meet and confer letter for motion to quash subpoena duces tecum, (12) meet and confer letter for motion to compel attendance at deposition, and (13) meet and confer letter for motion to compel testimony at deposition. The sample on which this preview is based is 42 pages and includes the meet and confer letters mentioned above. The author is a freelance paralegal that has worked in California and Federal litigation since 1995 and has created over 300 sample legal documents for sale.
Can my employer fire me for no reason?
an “at-will” employment state. This means that in most cases, your employer can fire you at any time for any reason, for a bad reason, or for no reason at all. So your employer can fire you for complaining about your boss’s lack of
Can my employer retaliate against me?
Generally, yes. Most retaliation is not illegal. You should contact Heins & Minko Employment Attorneys to find out if you case has merit.
Are there exceptions to employment at-will?
employment contract, it may contain language that says your employer can only fire you “for cause” (i.e., a good reason). Additionally, if your employer made an oral or written statement (including pre-employment statements) that tends to limit its ...
Am I eligible for unemployment if my employer fired me for a bad reason or no reason?
Yes. Even if your situation does not fall into one of the exceptions of employment at will listed here, you may still be eligible for unemployment benefits if your employer did not terminate you for misconduct.
What is illegal discrimination?
Discrimination is treating someone differently based on his/her membership in a “protected class.” Protected classes include race, color, creed, religion, national origin, gender, sexual orientation, marital status, physical or mental disability, receipt of public assistance, and age. ...
What is illegal harassment?
(see the preceding paragraph for a list of protected classes) that creates a hostile environment or adversely affects the individual’s employment. Most harassment claims are for sexual harassment. While morally wrong, harassment is not legally wrong unless the reason you are ...
Can I take medical or parental leave?
State and federal laws require some employers to provide eligible employees with leave for the birth, adoption, or foster care of a child, and to care for a serious health condition of the employee or his/her close relative. Eligible employees may sue for damages if their employer denies or ...
Is my employer required to accommodate my disability?
Employers must reasonably accommodate a qualified employee’s disability, unless the accommodation imposes an undue hardship on the employer.
Act 10 continues to cause controversy in Wisconsin
the law unconstitutional in Sept. 2012 and a stay was put on enforcing
Prison guard union vote allowed by state
On behalf of Heins Law Office LLC posted in Employment Disputes on Thursday, May 30, 2013.
President Obama praises Gap for raising wages
behalf of Heins & Minko posted in Employment Disputes on Friday, February 28, 2014. Wisconsin residents may be interested in recent comments by President Obama on a newly announced plan by Gap Inc. to raise its minimum wage. On Feb. 19, President Obama praised the ...
Wisconsin equal rights claim results in settlement
attorney who has
Sample stipulation and order to appoint discovery referee in CaliforniaLegalDocsPro
This sample stipulation and order to appoint a discovery referee in California is used pursuant to Code of Civil Procedure section 638 to appoint a discovery referee to set the date, time and place for all hearings determined by the referee to be necessary, to direct the issuance of subpoenas, to preside over hearings, to take evidence, and to rule on objections, motions, and other requests made during the course of the hearing. The sample stipulation and order is 3 pages and includes brief instructions. The author is an entrepreneur and retired litigation paralegal that worked in California and Federal litigation from January 1995 through September 2017 and has created over 300 sample legal documents for sale. Note that the author is NOT an attorney and no guarantee or warranty is provided.
Join Logikcull and a panel of experts for lessons and best practices to be learned from the most important eDiscovery cases -- and debacles -- of the year. Seven cases will be featured. Come for the hardcore precedence. Stay for the surprise bonus lessons. Michael Simon and Timothy Lohse will host.
Sample California opposition to anti-SLAPP motion LegalDocsPro
This sample opposition to a special motion to strike or anti-SLAPP motion in California is designed to oppose a special motion to strike on the grounds (1) that it is untimely in that it was filed more than 60 days after service of the summons and complaint in violation of Code of Civil Procedure section 425.16(f); (2) defendant has failed to meet their burden of making a threshold showing that the challenged causes of action are ones arising from protected activity and (3) the motion should be denied as Plaintiff can show a reasonable probability of prevailing on their causes of action. The sample on which this preview is based is 13 pages and includes brief instructions, a memorandum of points and authorities with citations to case law and statutory authority, sample declaration and proof of service.
Lawweb.in judgment of us district court on motion for a negative inference ba...Law Web
Judgment of US District court on motion for a Negative Inference Based upon Plaintiff’s Alleged Deletion of Emails - See more at: http://www.lawweb.in/2016/04/judgment-of-us-district-court-on-motion.html?#sthash.T5WQGg2Q.dpuf
01062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
04062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
Here is Gabe Whitley's response to my defamation lawsuit for him calling me a rapist and perjurer in court documents.
You have to read it to believe it, but after you read it, you won't believe it. And I included eight examples of defamatory statements/
‘वोटर्स विल मस्ट प्रीवेल’ (मतदाताओं को जीतना होगा) अभियान द्वारा जारी हेल्पलाइन नंबर, 4 जून को सुबह 7 बजे से दोपहर 12 बजे तक मतगणना प्रक्रिया में कहीं भी किसी भी तरह के उल्लंघन की रिपोर्ट करने के लिए खुला रहेगा।
El Puerto de Algeciras continúa un año más como el más eficiente del continente europeo y vuelve a situarse en el “top ten” mundial, según el informe The Container Port Performance Index 2023 (CPPI), elaborado por el Banco Mundial y la consultora S&P Global.
El informe CPPI utiliza dos enfoques metodológicos diferentes para calcular la clasificación del índice: uno administrativo o técnico y otro estadístico, basado en análisis factorial (FA). Según los autores, esta dualidad pretende asegurar una clasificación que refleje con precisión el rendimiento real del puerto, a la vez que sea estadísticamente sólida. En esta edición del informe CPPI 2023, se han empleado los mismos enfoques metodológicos y se ha aplicado un método de agregación de clasificaciones para combinar los resultados de ambos enfoques y obtener una clasificación agregada.
03062024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
31052024_First India Newspaper Jaipur.pdfFIRST INDIA
Find Latest India News and Breaking News these days from India on Politics, Business, Entertainment, Technology, Sports, Lifestyle and Coronavirus News in India and the world over that you can't miss. For real time update Visit our social media handle. Read First India NewsPaper in your morning replace. Visit First India.
CLICK:- https://firstindia.co.in/
#First_India_NewsPaper
An astonishing, first-of-its-kind, report by the NYT assessing damage in Ukraine. Even if the war ends tomorrow, in many places there will be nothing to go back to.
1. UNITED STATES DISTRICT COURT
FOR THE DISTRICT OF COLUMBIA
KEVIN POULSEN
520 Third Street, Suite 305
San Francisco, CA 94107,
Plaintiff,
vs.
DEPARTMENT OF HOMELAND SECURITY,
Washington, DC 20528,
Defendant,
and
Case No. 13-0498(CKK)
MASSACHUSETTS INSTITUTE OF
TECHNOLOGY
77 Massachusetts Avenue
Cambridge, MA 02139,
Intervenor-Defendant.
[PROPOSED] ORDER
Upon review and consideration of Intervenor-Defendant’s Motion to Intervene as
Defendant and Establish a Process For Review and Release of Documents it is, this ____ day of
______, 2013, hereby
ORDERED that Intervenor-Defendant’s Motion to Intervene is GRANTED; and it is
further
ORDERED that, before Defendant Department of Homeland Security (DHS) makes a
disclosure to Plaintiff of any documents responsive to Plaintiff’s FOIA request that originated
from MIT, discuss information obtained from MIT, or contain information regarding MIT
employees or networks (hereinafter “MIT-Related Documents”): (1) DHS shall, on a rolling
basis, provide to counsel for MIT copies of those MIT-Related Documents that it has designated
for disclosure to Plaintiff in the form DHS is prepared to disclose them to Plaintiff; (2) upon
receipt of such MIT-Related Documents from DHS, MIT will have five business days to review
and propose to DHS additional redactions (if any) to remove references to network
vulnerabilities and information likely to identify MIT employees or community members; and
(3) DHS will then, within five business days, promptly disclose such MIT-Related Documents to
Plaintiff in a manner that implements any redactions proposed by MIT; and it is further
ORDERED that if DHS disagrees with any redactions proposed by MIT in accordance
with the foregoing, DHS shall notify MIT and Plaintiff of such disagreement and MIT will have
!"#$%&'&()*+),,-./)!00%%%12*34$56%&&)-%%%789$:%,;<&/<&(%%%=">$%&%2?%@
2. five business days within which to make an application to the Court showing cause why the
redacted information at issue should not be disclosed to Plaintiff. After all parties have had an
opportunity to address the question, the Court will determine whether the information in question
should be provided to Plaintiff. If MIT does not make such an application within such time,
DHS will then release the documents to the Plaintiff with the redactions to which DHS agrees at
the conclusion of the five-day period.
The Clerk of the Court is directed to docket the Defendant-Intervenor’s Answer (a copy
of which was attached to the motion to intervene) and to forward a copy of this Order to all
Counsel of record in this Action.
Dated: _______________ _______________________________
COLLEEN KOLLAR-KOTELLY
United States District Judge
Copies to:
David L. Sobel
ELECTRONIC FRONTIER FOUNDATION
1818 N Street, NW
Suite 410
Washington, DC 20036
Counsel for Plaintiff Kevin Poulsen
Peter Rolf Maier
U.S. ATTORNEY'S OFFICE
Civil Division
555 Fourth Street, NW
Washington, DC 20530
Counsel for Defendant Department of Homeland Security
Patrick J Carome
Laura M. Hussain
Wilmer Cutler Pickering Hale and Dorr LLP
1875 Pennsylvania Ave., NW
Washington, D.C. 20006
Counsel for Movant-Defendant Massachusetts Institute of Technology
!"#$%&'&()*+),,-./)!00%%%12*34$56%&&)-%%%789$:%,;<&/<&(%%%=">$%@%2?%@