Search for: "James Hacker" Results 541 - 560 of 598
Sorted by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
10 Mar 2019, 8:08 am by Dave Maass
Recognizing the year’s worst in government transparency The cause of government transparency finally broke through to the popular zeitgeist this year. [read post]
14 Sep 2020, 8:41 am by Nathaniel Sobel
Durham’s Investigation of Then FBI Director Comey in 2017 Schmidt reports in his book that around March 2017, Attorney General Jeff Sessions tapped Durham—then an assistant United States attorney in Connecticut—to open a leak investigation into FBI Director James Comey following reporting by the New York Times that Comey had asked the Justice Department to refute Trump’s baseless allegations that former President Barack Obama had ordered the wiretapping of Trump… [read post]
20 Apr 2022, 7:30 am by Guest Blogger
For the Balkinization symposium on Daniel Carpenter, Democracy by Petition: Popular Politics in Transformation, 1790–1870 (Harvard University Press, 2021). [read post]
8 Apr 2008, 9:45 am
LITERARY FICTION The Portrait of a LadyHenry James James’s mastery of psychology has never been more elegantly expressed nor more gripping than in his tale of Isabel Archer, a young American in search of her destiny, and Gilbert Osmond, the ultimate cold fish and one of literature’s most repellent villains. [read post]
18 Dec 2014, 9:17 am by Robert B. Milligan and Michael Wexler
We will release the 2015 trade secrets webinar series in the coming weeks. 2013 National Year in Review: What You Need to Know About the Recent Cases/Developments in Trade Secrets, Non-Compete, and Computer Fraud Law The first webinar of the year, led by Michael Wexler, James McNairy and Joshua Salinas, reviewed noteworthy cases and other legal developments from across the nation in the areas of trade secret and data theft, non-compete enforceability, computer fraud, and the interplay… [read post]
17 Jan 2020, 3:00 am by Jim Sedor
It is not yet clear what the hackers found, or precisely what they were searching for. [read post]
30 Sep 2020, 1:34 pm by Joanna Herzik
Update 9/30/2020: We received a report of another scam. [read post]
8 Feb 2021, 7:38 am by Joanna Herzik
Update: 2/8/2021: We received a report of another scam. [read post]
3 Jun 2020, 1:21 pm by Joanna Herzik
An attorney received an email from a person named James Marshall, who claimed to be with a company called Compass Upstream Services LLC, based out of Texas. [read post]
12 Jun 2020, 3:00 am by Jim Sedor
It has also put renewed focus on the assortment of online state voter registration systems, which were among the chief targets of Russian hackers in 2016. [read post]
29 May 2020, 3:16 pm by Joanna Herzik
An attorney received an email from a person named James Marshall, who claimed to be with a company called Compass Upstream Services LLC, based out of Texas. [read post]
4 Dec 2020, 8:07 am by Joanna Herzik
Updated 12/4/2020: We received a report of another scam. [read post]
8 Jul 2020, 8:08 am by Joanna Herzik
An attorney received an email from a person named James Marshall, who claimed to be with a company called Compass Upstream Services LLC, based out of Texas. [read post]
6 Aug 2020, 1:55 pm by Joanna Herzik
Update 8/6/2020: We received a report of another scam. [read post]
27 Jul 2020, 8:04 am by China Law Blog
As James Lewis bluntly stated in a recent report, “despite 40 years of effort, investment, and espionage, China is unable to make advanced semiconductors. [read post]
16 Feb 2012, 11:43 pm by INFORRM
The phone hacking saga has produced an extensive cast of victims and villains. [read post]
10 Apr 2012, 8:43 am by Lovechilde
State’s Diplomatic Security office, its internal Stasi, monitored my home email and web usage for months, used computer forensics to spelunk for something naughty in my online world, placed me on a Secret Service Threat Watch list, examined my finances, and used hacker tools to vacuum up my droppings around the web -- all, by the way, at an unknown cost to the taxpayers. [read post]
18 Jul 2012, 5:57 am by Rob Robinson
 http://bit.ly/M3Jirh (Casper Manes) Five Initial Steps to Take to Meet the Governance, Risk and Compliance Obligations - http://bit.ly/OCJuNW (Charles Skamser) Five Steps To Stop More Than 85% of Hacker Attacks On Your Network - http://bit.ly/NGQCYv (John Mello) How Instant Mobile Commerce Will Disrupt The Way You Do Business - http://onforb.es/Q2cvYu (Ben Kerschberg) Is Your Internet Provider Now Spying on You? [read post]