Search for: "John Does 5" Results 5581 - 5600 of 8,655
Sort by Relevance | Sort by Date
RSS Subscribe: 20 results | 100 results
15 Mar 2012, 9:53 am by William McGrath
John Kinnucan, the President of Broadband Research Corporation, was reportedly approached in November 2010 by federal agents and asked to cooperate with their insider trading investigation by wearing a wire (and told that he would face prosecution). [read post]
15 Mar 2012, 9:34 am by Gritsforbreakfast
John Abrams to cash in on the billions of dollars in new government contracting funds that started to flow after the creation of the Department of Homeland Security in 2003.Since 2006 ALIS functioned as the hidden force behind virtually all non-federal border-security operations in Texas. [read post]
14 Mar 2012, 12:30 pm
The news is a buzz the arrest of John K Harris for contempt of court. [read post]
14 Mar 2012, 7:57 am by Rob Robinson
– Federal Government Secretly Monitored Personal Webmail - bit.ly/woSX37 (Peter Vogel) “Judge Peck Approves a Discovery Process That Includes the Application of Predictive Coding” http://bit.ly/w6I7sW (Fulbright Briefing) Judge Peck’s Predictive Coding Opinion – Reporting The Reaction - bit.ly/yuoul2 (Chris Dale) Jurors All “Atwitter” – bit.ly/wOXGo7 (John Patzakis) Lessons Learned From Predictive Coding in ‘Da… [read post]
13 Mar 2012, 2:59 am
Clarke (NY-11), Steve Cohen (TN-9), Dianne DeGette (CO-1), Bob Filner (CA-5), Barney Frank (MA-4), Luis Gutierrez (IL-4), Janice Hahn (CA-36), Michael Honda (CA-15), Barbara Lee (CA-9), Zoe Lofgren (CA-16), James McGovern (MA-3), Jan Schakowsky (IL-9), Jackie Speier (CA-12), John Tierney (MA-6), Melvin L. [read post]
12 Mar 2012, 1:44 pm
The reform applies only to offerings under Rule 506 and does not directly affect offerings under other exemptions afforded by Regulation D or Section 4(2) of the Securities Act of 1933. [read post]
11 Mar 2012, 8:37 pm by Mithradates
And if you can’t (or won’t), does that make you an accomplice to the crimes you witness? [read post]
9 Mar 2012, 10:19 am by Robert Milligan
 Section 1030(a)(5)(C) of the CFAA makes it unlawful to “intentionally access[] a protected computer without authorization and as a result of such conduct, cause[] damage and loss. [read post]
If that is the real issue then, as Tobin says, “greater dialogue between refugee and human rights lawyers, scholars and judges” will be imperative. (5) If a human rights approach is accepted as being appropriate, then it must be right to examine key decisions to see to what extent they embody such an approach. [read post]