November 28, 2007  nº 569  -  Vol. 5  
 

"When you do the common things in life in an uncommon way, you will command the attention of the world."

George Washington Carver

In today's Grammatigalhas: Cybercrime reaches epidemic proportions. The most interesting questions arise at the points where criminal opportunities presented by the new technologies stretch the bounds of criminal law. So, let's have a look at the legislation framework.

  • Top News

"Decoupling the Train" theory put to test

The notion that the rest of the world has "decoupled" from the U.S. came into vogue earlier this year, as overseas economies -- particularly emerging markets -- continued to post robust growth and Europe and Japan appeared to be enjoying a long-delayed upturn. Policy makers joined the decoupling parade. In the spring, the IMF included a chapter in its April World Economic Outlook called "Decoupling the Train." The gist: The current weakness of the U.S. economy stems largely from housing woes -- and housing is less global than, say, computers and other parts of the U.S. economy. That is good news for the rest of the world. But the U.S. is now flirting with something more severe than a mere slowdown. That -- along with rising oil prices and the specter of a global credit crunch -- is changing the picture. Europe is showing signs of faltering, while Japan may be at risk of sliding back into recession. While developing economies like China are still on a steady boil, recent drops in their stock markets suggest investors are beginning to doubt their immunity to a U.S.-led slowdown. The global economy, he says, now faces the potential for a late-20th-century-style spike in oil prices, a 21st-century global financial shock -- and an old-fashioned 19th-century-style slowdown in global trade.

Feds Drop Request for Amazon.com Book Buyer Names

Unsealed court records reveal that federal prosecutors have withdrawn a controversial subpoena that sought the identities of 24,000 Amazon.com customers who purchased used books online. The about-face came after U.S. Magistrate Judge Stephen Crocker of the Western District of Wisconsin ruled the customers have a First Amendment right to shield their reading habits from the prying eyes of the government. 

Mid-East leaders in fresh talks 

Bush will host White House talks with the Israeli and Palestinian leaders who have reached agreement on a joint document to begin new negotiations on an independent Palestinian state. Bush pledged to devote his remaining time in office to achieving what he called an "ambitious goal.”

Musharraf steps down as military chief

President Gen. Pervez Musharraf says goodbye to his troops ahead of standing down as military chief. Under intense pressure from international backers as well as domestic foes, Musharraf acquiesced at last to demands that he retire from the military if he wished to continue serving as president. Musharraf has indicated that he may accept most of the demands put forth by opposition parties in the face of his November 3 declaration of emergency rule but that he will not reinstate ousted Supreme Court justices.

The authoritative resource for information on the worldwide legal profession

Martindale-Hubbel's Legal Network is the most complete, widely used and trusted source of information on the worldwide legal profession - and one of the most effective ways for lawyers to promote their practices. The Lawyer Locator to find the credentials of more than one million lawyers and firms is available in a click here.

Before you open the door to the boardroom, peek through the keyhole!

Have a look at the new section of the Migalhas website and discover the professional development opportunities with large corporations presented by Michael Page International. Click here to peep through the hole!

________________

100% Migalhas:  www.migalhas.com

______________

  • MiMIC Journal

Criticism as EU-China talks begin

The annual summit between officials from the European Union and China has got off to a shaky start following criticism of China's closed economy. EU Trade Commission said the Chinese government did not adequately protect the intellectual property rights of European companies. But there were some warm words about the record levels of trade between the EU and China. The summit is later expected to focus on the weakness of the Chinese yuan.

China chief justice applauds judicial reform 

Xiao Yang, chief justice of China's Supreme People's Court  has said that court reforms over the last 10 years have achieved judicial efficiency and improved the quality of trials and rulings  in China, the China Daily reported Monday. Xiao noted that judicial committees, the highest decision-making bodies at each level of the Chinese judicial system, have been reformed so that panel decisions are more fair. Prior to judicial reforms, the judicial committees allowed closed sessions without direct contact with either party to the case, but under new reforms, the panels will take part in the trial process. Xiao added that judicial committees have to "hear cases in person to better understand the facts and reduce the chances of biased rulings" when considering "difficult, complicated or socially important" cases. Judicial committees also now use secret ballots to vote on their rulings to avoid bias on the bench, and the judicial committees have been divided into panels exclusively for criminal cases and other civil or administrative cases to improve accuracy.

  • Grammetigalhas

Legal Meaning Is Not Everyday Meaning

Spam

Unsolicited e-mail, often of a commercial nature, sent indiscriminately to multiple mailing lists, individuals, or newsgroups; junk e-mail. Also known as "unsolicited commercial e-mail" (UCE), "unsolicited bulk e-mail" (UBE), "gray mail" and just plain "junk mail," the term is both a noun (the e-mail message) and a verb (to send it). Spam is mostly used to advertise products and sometimes to broadcast some political or social commentary.

The term was supposedly coined from a Monty Python comedy sketch in the early 1970s, in which every item on a restaurant menu contained SPAM, and there was nothing a customer could do to get a meal without it. The sketch was derived from the fact that in England during World War II, SPAM (Hormel's processed meat) was abundantly available while other foods were rationed. Many believe spam is an acronym for "sales promotional advertising mail" or "simultaneously posted advertising message."

Spyware 

Software that monitors user activity without user knowledge or consent.

Phishing

Phishing attacks use 'spoofed' e-mails and fraudulent websites designed to fool recipients into divulging personal financial data such as credit card numbers, account usernames and passwords, social security numbers, etc. By hijacking the trusted brands of well-known banks, online retailers and credit card companies, phishers are able to convince up to 5% of recipients to respond to them." This interest Group' mission is to "to provide a resource for information on the problem and solutions for phishing and email fraud.

Pharming 

luring people to disclose sensitive information by using bogus emails and websites

Spoofing attacks:

Brand spoofing: same as phishing.

Web spoofing: Web spoofing allows an attacker to create a "shadow copy" of the entire World Wide Web. Accesses to the shadow Web are funneled through the attacker's machine, allowing the attacker to monitor the all of the victim's activities including any passwords or account numbers the victim enters. The attacker can also cause false or misleading data to be sent to Web servers in the victim's name, or to the victim in the name of any Web server. In short, the attacker observes and controls everything the victim does on the Web.

IP spoofing: Inserting the IP address of an authorized user into the transmission of an unauthorized user in order to gain illegal access to a computer system. Routers and other firewall implementations can be programmed to identify this discrepancy.

URL Rewriting:
Rewriting all of the URLs on some Web page so that they point to the attacker's server rather than to some real server.

Man-in-the-middle attack

In cryptography, a man-in-the-middle attack (MITM) is an attack in which an attacker is able to read, insert and modify at will, messages between two parties without either party knowing that the link between them has been compromised. The attacker must be able to observe and intercept messages going between the two victims.

Practical advice: The Fight Against Phishing: 44 Ways to Protect Yourself. Click here.

Everyday "Legal" Jargon 

Cybercrime

Cybercrime is regarded as computer-mediated activities which are either illegal or considered illicit by certain parties and which can be conducted through global electronic networks.

International estimates indicate that cybercrime costs approximately $100 billion annually. In fact, only about 10% of all cybercrimes committed are actually reported and fewer than 2% result in a conviction. This is primarily due to two reasons. First, businesses and financial institutions feel that they have more to lose by reporting computer security breaches. They argue that customers will lose confidence in the company if business and financial transactions are know to be insecure. Second, a majority of cybercrime victims do not report crimes against them, assuming that law enforcement will provide little or no assistance....

Cyber-crime has reached epidemic proportions. More than 90 percent of the corporations and government agencies responding to a recent survey reported computer-security breaches. Disgruntled employees and hackers commit many cyber-crimes, and others are committed by con artists using the Web to perpetrate auction fraud, identity theft and other scams. Credit-card users are only liable for the first $50 of fraudulent charges, but financial institutions get hit hard. Identity thefts cost them $5.6 billion in losses and expenses . Some policymakers, wary of Internet-facilitated terrorist attacks, call for tough, new laws to prevent computer crimes. Others fear that such initiatives will trample on civil liberties. Still others want legislation to make Microsoft and other computer-software companies liable for damages caused by their software-security failures.

Leading financial institutions experienced a huge surge in the number of security attacks over the past year according to the Deloitte 2006 Global Security Survey released today. More than three-quarters (78%, up from 26% in 2005) of the world’s leading 150 institutions surveyed confirmed a security breach from outside the organization. "Almost half (49%, up from 35% in 2005) experienced at least one internal breach – confirming last year’s survey findings that internal breaches are an increasing threat." The fourth annual survey found that the top three most common attacks the global financial industry experienced over the past 12 months, both externally and internally, aimed to extort some form of monetary gain. "Phishing and pharming accounted for more than half (51%) of the external attacks, followed by spyware or malware utilisation (48%). "Insider fraud (28%) and leakage of customer data (18%) were cited by respondents among the top three most common internal breaches.

"Cybercrime" is not a rigorously defined concept. For our purposes, consider it to embrace criminal acts that can be accomplished while sitting at a computer keyboard. Such acts include gaining unauthorized access to computer files, disrupting the operation of remote computers with viruses, worms, logic bombs, Trojan horses, and denial of service attacks; distributing and creating child pornography, stealing another's identity; selling contraband, and stalking victims. Cybercrime is cheap to commit (if one has the know-how to do it), hard to detect (if one knows how to erase one's tracks), and often hard to locate in jurisdictional terms, given the geographical indeterminacy of the Net.

Our purpose in considering the subject of cybercrime is not to catalog it exhaustively, but rather to raise and consider questions of particular interest that are presented by cyber methodologies of committing crimes. The most interesting questions arise at the points where criminal opportunities presented by the new technologies stretch the bounds of criminal law.

In the United States, cybercrimes are the focus of legislation adopted at both the state and federal levels. The U.S. Constitution allocates lawmaking authority between the two levels according to certain principles, one of which is that even when federal jurisdiction to legislate exists, federal legislation is appropriate only when federal intervention is required. And while federal legislative authority can pre-empt the states' ability to legislate in a given area, it rarely does, so it is not unusual for federal criminal laws to overlap with state prohibitions that address essentially the same issues.

There are a number of federal statutes which address varieties of cybercrimes. The omnibus federal cybercrime statute is 18 U.S. Code § 1030. This statute makes it an offense to do any of the following to and/or by means of a computer used by a financial institution, by the federal government or used in interstate or foreign commerce or communication:

gain unauthorized entry into a government computer and thereby discover information which is intended to remain confidential, information which the perpetrator either unlawfully discloses to someone not authorized to receive it or retains in violation of the law;

gain unauthorized entry to a computer and thereby gains access to information to which the perpetrator is not entitled to have access;

gain unauthorized access to a computer and thereby furthers the perpetration of a fraud;

cause damage to a computer as the result either of gaining unauthorized access to it or of inserting a program, code or information into the computer; or

transmits, in interstate or foreign commerce, a threat to cause damage to a computer in order to extort money or property from a person or other legal entity.

Section 1462 of title 18 of the U.S. Code prohibits using a computer to import obscene material into the United States, while 18 U.S. Code Section 1463 outlaws using a computer to transport obscene material in interstate or foreign commerce. Section 2251 of title 18 of the U.S. Code makes it a crime to employ a minor in or induce a minor to participate in making a visual depiction of a sexually explicit act if the depiction was created using materials that had been transported (including transportation by computer) in interstate or foreign commerce. Section 2251(A) of title 18 of the U.S. Code prohibits using a computer to sell or transfer custody of a minor knowing the minor will be used to create a visual depiction of sexually explicit conduct. Sections 2252 and 2252(A) of title 18 of the U.S. Code makes it a crime to use a computer to transport child pornography in interstate or foreign commerce.

Another statute - 18 U.S.C. § 1028 - makes it a crime to produce, transfer or possess a device, including a computer, that is intended to be used to falsify identification documents. Finally, 18 U.S.C. § 2319 makes it a federal offense to infringe a valid copyright. Many of the other statutes outlaw "traditional" crimes - such as threatening the President's life - and in so doing, encompass conduct that is committed via a computer.

While some suggest cybercrime legislation and enforcement should be reserved for federal authorities, there is a historical preference for having states play the primary role in criminal law enforcement and they are addressing cybercrimes. This paper surveys legislation the various states have adopted to that end.

Framework

Each of the fifty states is free to assert its own legislative idiosyncrasies. There is no formal mechanism - at either the state or federal level - which requires or even prods states to adopt uniform, consistent laws. There are model statutes, such as the Restatements, Uniform Acts and the Model Penal Code, that are drafted by private groups and offered to the states as examples, in the hope that states will adopt their provisions and thereby move closer to uniform legislation.

The framework utilized below, based on the Model State Computer Crimes Code, was created by organizing state cybercrime statutes into eight categories: procedural issues; non-sexual crimes against persons; sexual crimes; crimes involving computer intrusions and damage; fraud and theft crimes; forgery crimes; gambling and other crimes against public morality; and crimes against government.

A. Procedural Issues

Many states have adopted legislation that targets procedural issues involved in prosecuting cybercrimes. Some have added definitional sections that augment cybercrime-specific statutes and/or general criminal statutes. Others have adopted statutes which set offense levels and penalties for cybercrimes, establish time periods for commencing prosecution of cybercrimes, and address possible defenses to cybercrime charges.

Still others address jurisdiction. It can be difficult to apply traditional jurisdictional predicates-such as committing all or part of a crime within a state or "causing harm" to someone in a state through acts committed outside a state -- to cybercrimes. In an effort to overcome these difficulties, states are devising different standards for cybercrimes. One approach declares that if someone perpetrates a crime by accessing a computer in another state, the offender will be "deemed to have personally accessed the computer" in both states and can be prosecuted in either state. Other states exercise jurisdiction if the "transmission that constitutes the offense" originates in that state or is received in it; Ohio asserts jurisdiction over one who allows "any writing, data [or] image... to be disseminated or transmitted into this state in violation of the law of this state." Some cyber-sex-crime laws base jurisdiction on the victim's presence within the prosecuting state and the defendant's awareness of facts which made the victim's presence within that state "a reasonable possibility;" others assert jurisdiction over one who commits "computer pornography" if the offense involved "a child residing in this state, or another person believed by the person to be a child residing in this state."

B. Non-sexual Crimes Against Persons

There are relatively few statutes dealing with non-sexual crimes against persons. No state, for example, has a "cyber-homicide" provision, though a few make it an offense to break into or tamper with a computer system and thereby cause the death of one or more persons or create a strong probability of causing death to one or more persons. Virginia makes it an offense to use "a computer or computer network without authority and with the intent to cause physical injury to an individual."

Only about sixteen states outlaw online stalking or harassment, and several of them require that an offender transmit a "credible threat" to injure the victim, the victim's family, or "any other person." Other statutes are broader, making it a crime to use a computer to "engage in a course of conduct" that would cause a "reasonable person" to "suffer intimidation or serious inconvenience, annoyance or alarm," as well as to fear death or injury to themselves or to members of their family. Some states have expanded their "obscene phone call" statutes so that they encompass using a telephone or an "electronic communication device" to contact someone and threaten to injure that person or his/her family, to use obscene language, or to make repeated contacts in an effort to annoy the person. Earlier this year, a New York court held that a similar provision encompassed harassing or threatening messages sent via the Internet. Bills have been introduced to make online stalking and/or harassment an offense in states where it is not currently outlawed.

C. Sexual Crimes

Next to the intrusion offenses discussed in the next section, sexual crimes account for the largest number of state cybercrime statutes. Most of the statutes are concerned with soliciting sex from minors or soliciting child pornography.

A number of states make it a crime to use a computer to solicit or lure a minor to engage in an "unlawful sex act." Since most, if not all, states have generic statutes that make it a crime for an adult to solicit sex from a child, and since these generic solicitation statutes would presumably encompass use of a computer for this purpose, these statutes appear to be redundant. States clearly do not agree, however, because bills have been introduced to add cyber-solicitation statutes to codes which do not already have them. For some reason, one state makes it a more serious offense to use a computer to solicit a child than to do so in person.

Several states make it a crime to use a computer to compile information about a child "for the purpose of facilitating, encouraging, offering or soliciting a prohibited sexual act" from that child. These statutes are part of an effort to outlaw child pornography. Many states prohibit using a computer to create, store and/or distribute child pornography, and many also prohibit using a computer to send obscene material to a child. Pennsylvania makes it an offense to use a computer to communicate with a child for the purpose of engaging in prostitution.

D. Crimes Involving Intrusion and Damage

By far the greatest number of state cybercrime statutes are concerned with computer intrusions and damage caused by intrusions. The intrusion statutes fall into two categories: trespass and vandalism statutes. Most states have a trespass ("hacking") statute which makes it a crime to purposely access a computer, computer system or network without authorization. Most states also have a vandalism ("cracking") statute which typically makes it a more serious crime to purposely access a computer without authorization and alter, damage or disrupt the operation of the computer and/or the data it contains. A few states add a "misuse of computer information" statute which prohibits copying, receiving or using information that was obtained by violating a hacking or cracking statute. New York has what is in effect a cyber-burglary statute that makes it a crime to break into a computer or computer system "with an intent to commit or attempt to commit or further the commission of any felony."

A few states outlaw the creation and transmission of viruses and other harmful programs, and bills to this effect have been introduced elsewhere. A handful make it a crime to introduce false information into a computer system for the purpose of "damaging or enhancing" someone's credit rating. A surprising number have created an "offense against computer equipment or supplies," which consists of modifying or destroying "equipment or supplies that are used or intended to be used in a computer, computer system, or computer network". Even more make it a crime to deny, disrupt, degrade, interrupt or cause the denial, disruption, degradation or interruption of computer services or of access to a computer. A few make it a crime to destroy computer equipment, and North Carolina makes it a crime to threaten to damage a computer or computer system in order "to extort money or any pecuniary advantage, or... to compel any person to do or refrain from doing any act against his will".

Several states outlaw "computer invasion of privacy," which consists of using a "computer or computer network with the intention of examining any employment, medical, salary, credit, or any other financial or personal data relating to any other person with knowledge that such examination is without authority". Others make it a crime to disclose someone else's computer password.

E. Fraud and Theft Crimes

A substantial number of states outlaw using computers to commit fraud, i.e., using a "computer, computer system, computer network, or any part thereof for the purpose of devising or executing any scheme or artifice to defraud" or for "obtaining money, property, or services by means of false or fraudulent pretenses, representations, or promises". States tend to incorporate embezzlement crimes into their computer fraud statutes, rather than creating separate "computer embezzlement" provisions.

A substantial number of states also outlaw "computer theft," which can encompass any of several discrete offenses: information theft; software theft; computer hardware theft; and theft of computer services. It can also encompass using a computer to commit a theft in a more traditional sense, e.g., to steal property other than data or computer hardware or software. A few states prohibit the unlawful possession of computer data and/or computer software.

Some states have enacted "identity theft" statutes, which make it a crime to "knowingly and with intent to defraud for economic benefit" obtain, possess, transfer, use or attempt "to obtain, possess, transfer or use, one or more identification documents or personal identification number of another person other than that issued lawfully for the use of the possessor." These statutes are not usually phrased as computer crime statutes, but they should qualify as cybercrimes because computers often play an intrinsic role in identity theft offenses.

F. Forgery Crimes

A few states outlaw computer forgery, which is defined as follows: "Any person who creates, alters, or deletes any data contained in any computer or computer network, who, if such person had created, altered, or deleted a tangible document or instrument would have committed forgery . . . shall be guilty of the crime of computer forgery." At least one state makes it a crime to possess "forgery devices," which include computers, computer equipment and computer software "specially designed or adapted to such use."

G. Gambling and Other Crimes Against Public Morality

Only one state has outlawed online gambling: Louisiana created the crime of "gambling by computer," which consists of conducting or assisting in conducting a "game, contest, lottery, or contrivance whereby a person risks the loss of anything of value . . . to realize a profit when accessing the Internet [or] World Wide Web . . . by way of any computer." The Louisiana statute also makes it a crime to develop, maintain or provide computer services, software "or any other product accessing the Internet, World Wide Web, or any part thereof offering to any client for the primary purpose of the conducting as a business of any game . . . whereby a person risks the loss of anything of value in order to realize a profit." Legislation targeting online gambling has been proposed in other states.

At least one state has adopted legislation dealing with purchases of alcoholic beverages via the Internet. Others have proposed legislation to this effect, and some have proposed legislation which would make it illegal to sell cigarettes via the Internet to citizens of that state.

H. Crimes Against Government

Only a few states have make it a crime to use computers to obstruct law enforcement or the provision of government services. Illinois forbid using a computer to cause a "disruption of or interference with vital services or operations of State or local government or a public utility." Several states make it a crime to use a computer to interrupt or impair the delivery of essential services (e.g., services of a public or private utility, medical services, communication services or government services) or to otherwise endanger public safety.

Some states make it a crime to use a computer to obtain information "with the state or any political subdivision which is by statute required to be kept confidential." West Virginia prohibits the unauthorized accessing of information stored in a computer owned by its state legislature. Rhode Island makes it a crime to use a computer to destroy evidence for the purpose of obstructing an official investigation. Utah makes it an offense to fail to report a computer crime.

Proposed legislation

Some effort is being made to outlaw posting personal information about law enforcement officers on the Internet, as this Arizona bill illustrates: "It is unlawful for a person to knowingly make available on the World Wide Web the personal information of a peace officer if the dissemination of the personal information poses an imminent and serious threat to the peace officer's safety or the safety of the peace officer's immediate family and the threat is reasonably apparent to the person making the information available." A California bill discusses the importance of preventing the disclosure of a peace officer's or appointed official's home address via the Internet.

An Ohio bill would make it a misdemeanor to let prisoners have access to the Internet unless they are participating in "an approved educational program with direct supervision that requires the use of the Internet for training or research" and the access is provided in accordance with rules to be established by the Department of Corrections. And several states have introduced legislation that would criminalize "spamming," e.g., the sending of unsolicited email. A New Jersey bill would increase the penalties for accessing and/or damaging a "home computer." The legislative history of the provision explains that it is needed because the state's cybercrimes statutes currently do not provide sufficient protection for home computer owners who are victimized by hackers or crackers, since they tend to concentrate on intrusions and damage to commercial systems.

Conclusion

A review of cybercrime legislation adopted by the various states of the United States of America is an instructive exercise, for several reasons. On the one hand, one would expect that, as one of the more technologically advanced countries in the world, the constituencies which comprise the United States of America would have adopted substantive cybercrime legislation that is at once comprehensive and uniform. Yet that is not the case: As the previous sections demonstrate, there is a great deal of variation-both in terms of coverage and in terms of approaches-in the cybercrime legislation adopted by the various states.

This variation is no doubt the product of several factors. One factor is certainly the relative rapidity with which cybercrime has emerged as a distinctive problem; because cybercrime is such a new phenomenon, states, unsurprisingly, vary widely in the speed with which they have addressed the types of conduct which can be defined as "cybercrime." Another factor is the ambiguity inherent in the whole concept of "cybercrime:" On the one hand, we are confronted with what seem to be entirely new kinds of criminal activity which requires the adoption of new substantive criminal legislation; on the other hand, one can argue that we are simply dealing with "old wine in new bottles," e.g., with the use of the Internet and computer technology to facilitate the commission of long-extant crimes such as fraud. This ambiguity can, quite understandably, generate confusion and inaction among state legislators. And yet another factor is the complexity of the phenomena at issue; unlike much, if not most, of the criminal activity encountered in the "real world," the kinds of criminal activity that occur in cyberspace, in the "virtual world" can be quite complex and therefore can present significant challenges for legislators at both the state and federal level.

However, while one can justify the gaps that currently exist in state cybercrime legislation, this is not a situation that should continue, especially not in a country that prides itself on its technological advancement and expertise. Gaps in the law-especially in the law applicable to cybercrimes-benefit those who engage in socially-unacceptable conduct to exploit innocent persons. While this is an unacceptable state of affairs in the real, physical world, the effects of this failure-to-legislate can be particularly egregious when one is dealing with the cyber-world, in which individuals can be victimized by strangers, by persons whom they have never met, as to whose existence and motives they may well be quite ignorant and therefore as to whom they have no reason to be on notice, to be on guard and to attempt to take protective measures. Indeed, one aspect of the cyber-world is the essential futility discrete individuals encounter when trying to protect themselves from the often-creative depredations of online offenders.

Although the discrete states constituting the United States of America will necessarily encounter obstacles in their attempts to protect their citizens from these depredations, the enactment of adequate substantive cybercrime legislation is a necessary first step in the process. It is also an important symbolic gesture for other nations of the world, many of which are quite lacking in substantive cybercrime legislation. If the entities that comprise the United States of America do not, for example, adopt legislation making it a criminal offense to disseminate a computer virus, how can they condemn other nations for their failure to do so?

Ultimately, the adoption of substantive cybercrime legislation is a step taken toward recognizing that cybercrimes represent a new phenomenon in criminal activity: the globalization of criminal conduct. And the globalization of criminal conduct is a phenomenon which all jurisdictions - national as well as sub-national - must combine to combat.

As If Your Life Depended On It… or How to get to Carnegie Hall? - Practice, practice

A While/Awhile

When "awhile" is spelled as a single word, it is an adverb meaning "for a time" ("stay awhile"); but when "while" is the object of a prepositional phrase, like "Lend me your monkey wrench for a while" the "while" must be separated from the "a." (But if the preposition "for" were lacking in this sentence, "awhile" could be used in this way: "Lend me your monkey wrench awhile.")

Mute Point / Moot Point

"Moot" is a very old word related to "meeting", specifically a meeting where serious matters are discussed. Oddly enough, a moot point can be a point worth discussing at a meeting (or in court)—an unresolved question — or it can be the opposite: a point already settled and not worth discussing further. At any rate, "mute point" is simply wrong, as is the less common "mood point."

_____________

Tell your friends and colleagues you've read it in Migalhas International

_____________

  • Historia Verdadera

Constituyente boliviana

Los departamentos más ricos de Bolivia, que aportan un 80% del PIB del país, realizan un paro de hasta 48 horas para protestar contra un proyecto de Constitución aprobado por el oficialismo, sin participación opositora.

Sontanas

El vicepresidente de Venezuela, Jorge Rodríguez, desafió las últimas horas a los jefes de la Iglesia Católica en su país, a aclarar si participó en la organización de protestas opositoras que el lunes derivaron en violencia y causaron un muerto. Según versiones venezolanas la iglesia se ha convertido en una de las principales organizaciones opositoras a la reforma constitucional.

Chile - España

El secretario general de la Junta de Aeronáutica Civil (JAC), Jorge Frei, junto a la Subdirectora General de Explotación de Transporte Aéreo del Ministerio de Fomento Español, Eugenia Lloréns Beltrán de Heredia, acordaron en Santiago, un nuevo convenio aerocomercial que moderniza sustancialmente el antiguo texto suscrito por ambas naciones en 1974.

_______________

Read Migalhas LatinoAmerica every Tuesday and Thursday. Visit the website at www.la.migalhas.com

_______________

  • Brief News

Youth warned on future digital security

A new survey highlights the long-term implications for young people who leave an "electronic footprint" or lack of an awareness of the effects of "digital litter" in future. As many as 71 per cent would not want a college, university or potential employer to conduct an internet search on them unless they could first remove content from social networking sites. An increasing number of education institutions and employers are using the internet as a tool to vet potential students or employees could cost a person dearly in the future if something undesirable is found.

Sarkozy plans crisis talks

Sarkozy is to hold emergency talks with ministers to discuss a wave of urban violence. More than 120 police were injured in two nights of unrest, after two teenagers died on Sunday when their motorbike and a police car collided.

Venezuela recalls Colombia envoy

Chavez accused the Colombian president of lying and has recalled its ambassador to Colombia for consultations following a harsh exchange of words between the presidents of both countries. The Venezuelan government said it was carrying out an "exhaustive evaluation of its relationship" with Colombia. But Colombia said it would not follow suit and withdraw its envoy in Caracas.

Freddie Mac in $6bn share issue

Freddie Mac, the company that provides financing and guarantees to US mortgage lenders, is to sell $6bn of shares to cover more bad debt losses. It said the money was needed "in light of actual and anticipated losses". The move comes only a week after Freddie Mac said it was setting aside $ 2.5bn to cover bad debts for the three months from July to September. Most of the main US lenders have now revealed exposure to bad mortgage debt centered on the sub-prime sector.

New twist in Airbus share probe

Managers at defense and aerospace firm EADS were aware of problems affecting A380 planes before they sold their shares, a businessman has claimed. The new allegations will be given to an investigation of insider trading at EADS, the parent firm of Airbus. The trading in shares occurred shortly before news about delays to the A380 superjumbo were made public last June. EADS denies it knew about delays when millions of euros of shares were sold. The announcement wiped 26% off the value of Franco-German EADS. 

Citigroup Sells Abu Dhabi Fund $7.5 Billion Stake

US bank Citigroup has agreed to sell shares worth $7.5bn (£3.6bn) to an Abu Dhabi-owned investment company. The Abu Dhabi Investment Authority will become the largest shareholder in Citigroup with a stake of up to 4.9%. The stock market rallied Tuesday on a sharp fall in oil prices and news that Citigroup is about to get a major cash infusion.

Financial firms, capital depleted, hunt for cash

Faced with massive losses linked to the subprime-mortgage crisis and accompanying credit crunch, several of the nation's financial institutions -- from Wall Street investment firms to bond insurers -- are assessing their need for new sources of capital. And they are likely to intensify their fledgling efforts in coming months amid signs that they could face billions of dollars in additional losses as the mortgage-market fallout persists. Of course, one way to tap external capital is to merge operations. The merger boom that fizzled out this summer was driven by cheap and plentiful financing in the debt markets and a booming stock market. With credit increasingly tight and the stock market looking shakier, Wall Street may now see a round of opportunistic deal making.

Brazil urges nations to pay to curb climate change

Lula urged rich countries to pay to help curb climate change by protecting tropical forests and reiterated criticism of the United States for its import duties on biofuels. "You are not going to convince the poor anywhere in the world not to cut a tree without the right to a job and food in exchange," he said. Lula's message came ahead of next week's United Nations climate change conference in Bali, Indonesia, which the world body hopes will lead to negotiations on a new global pact to reduce carbon emissions blamed for global warming.

Oil and gas auction attracts record bids in Brazil

The winning bids in the National Oil and Gas Agency's (ANP) auctions for oil and gas reserves on Tuesday amounted to a record 2.11 billion reais ($1.15 billion), the biggest figure ever reached in a public auction in Brazil. According to ANP, 46 percent of the 271 blocks auctioned were sold to a total of 67 companies. It was the biggest number of bidders since the Brazilian government decided to back away from state-owned Petrobras' monopoly in oil and gas exploitation in the country. The auction's biggest winning bidder was the OGX Petroleo e Gas, a subsidiary of the local holding EBX Group. The group offered 1.5 billion reais ($820 million) for 21 oil and gas blocks.

Brazil's BM&F exchange raises price in share offer

Brazil's Bolsa de Mercadorias e Futuros, the world's fourth-largest commodities and futures exchange, said it raised the price of shares in a planned initial public offering because of a surge in investors demand. Stakeholders in BM&F, as the exchange is called, plan to sell the shares at range of 18 reais-20 reais, up from a previous range of 14.50 reais-16.50 reais for the IPO. The increase in price was due to "an excess in demand seen in the order book by institutional investors." 

Judge suspended for jailing court

A US judge has been removed from the bench for jailing an entire courtroom audience after none of them admitted being responsible for a ringing phone. A commission on judicial conduct said Judge Restaino had acted "without any semblance of a lawful basis" and behaved like a "petty tyrant". The judge has said he was under stress in his personal life at the time.

Hot Seat

The head of the federal agency investigating Karl Rove's White House political operation is facing allegations that he improperly deleted computer files during another probe. Investigators are trying to determine whether the deletions were improper or part of a cover-up.

US wants Geneva Conventions clarified to deal with terrorism, top legal adviser says

John Bellinger III, the State Department's legal adviser, said the laws of war only apply to conflicts between nations — not to insurgents or international terrorist groups. "The United States remains absolutely committed to the Geneva Conventions," he told reporters on the sidelines of a conference hosted by the International Committee of the Red Cross, the guardian of the rules drawn up after World War II. "The Geneva Conventions do not give you answers about who can be held in a conflict with a non-state actor," such as insurgent groups, Bellinger said. "They do not tell you how long you can hold someone in a conflict with a non-state actor." He said the conventions "were designed in 1949 for different sorts of circumstances, and they don't provide easy answers in all cases to how to deal with international terrorists." Greater clarity is needed about which practices are permitted and which are prohibited, he said.

  • Daily Press Review

Pupil defends Sudan row teacher
BBC News, Centrist newscaster, London, England

Kabila reshuffles government
CongoPlanet.com, Independent online news aggregator

Kofi Jumah: Millions Debt Legacy
GhanaWeb, Online news portal, Amsterdam, Netherlands

Commonwealth Summit: Leaders Should Join Forces Against Rights Abuses
Human Rights Watch (Africa), International news press releases

'I won't fund Jacob Zuma' - Sexwale
iafrica, Online news portal, Cape Town, South Africa

SABC gets sole rights to ANC indaba
Independent Online, News portal, Cape Town, South Africa

Man arrested after girlfriend found in shallow grave
Mail & Guardian Online, Liberal, Johannesburg, South Africa

Escapees kill fellow prisoner
News24.com, Online news portal, Cape Town, South Africa

Penguins at risk from oil-spill in Antarctic shipwreck
Brazil Sun, Independent online news aggregator

D'Angel denies Beenie Man on Marco Dean DNA claim
Caribbean News Portal, Online news aggregator

US: Guantanamo Judge Allows Military Commissions to Proceed in Khadr Case
Human Rights Watch (Americas), International news press releases

Bolivia: Threat of ‘Secession' from the East
IPS Latin America, International cooperative of journalists, Rome, Italy

Bullet blitz! - MontegoBay cops under probe for 45-minute illegal gun salute
Jamaica Gleaner, Independent daily, Kingston, Jamaica

Peru: Photo of the day - Shining Path Terrorists Caught
Living in Peru, News portal, Lima, Peru

Image of politicians suffers another blow Down Under
The Globe and Mail, Centrist daily, Toronto, Canada

West Sumatran coastal residents worry about imminent earthquake
Antara News, News agency, Jakarta, Indonesia

Key dates in Musharraf's career as Pak's army chief
India Express, News portal, Mumbai, India

Small towns lap up home loans
India Times, Conservative daily, New Delhi, India

Australia with a new face
Japan Times, Independent centrist, Tokyo, Japan

Cops to be stationed on remote islands
Malaysian Star, Online news portal,  Selangor Darul Ehsan, Malaysia

Umbrella killer gets sentence reduced
New Zealand Herald, Conservative daily, Auckland, New Zealand

UN chief to visit Thailand next month
People's Daily Online, English-language, Beijing, China

Mike Carlton may walk over 2UE pay cut
Sydney Morning Herald, Centrist daily, Sydney, Australia

Taslima blames it on Kolkata police
The Hindu, Left-leaning daily, Chennai, India

Brown faces new donor questions
BBC News, Centrist newscaster, London, England

Winehouse cancels tour
BreakingNews.ie, Online news portal, Cork, Ireland

How migrants will double population
Daily Express, Conservative tabloid, London, England

Sleaze scandal: Brown's chief fundraiser knew of illegal donations
Daily Mail, Conservative daily, London, England

BT adds social networking features to Tradespace
DMeurope, Online news portal, Amsterdam, Netherlands

Mersey pensions continue to fund weapons
icLiverpool, Online news portal, Liverpool, England

In French suburbs, same rage, but new tactics
International Herald Tribune, Independent daily, Paris, France

Sarkozy crisis talks after third night of riots
The Telegraph, Conservative daily, London, England

Brooke Astor's son 'swindled his mother's fortune'
Times Online, Conservative daily, London, England

Terrorists Pound Negev with Mortars, Hit Poultry Barn
Arutz Sheva, Online, right-wing, Tel Aviv, Israel

Saudi FM Saud al-Faisal on the Annapolis Summit
Asharq Al-Awsat, Pan-Arab daily, London, England

14 construction workers killed in Afghan air strike
Gulf News, Independent daily, Dubai, United Arab Emirates

Annapolis joint statement was completed with just minutes to spare
Haaretz, Liberal daily, Tel Aviv, Israel

Mideast: Much Ado About Annapolis
IPS Middle East, International cooperative of journalists, Rome, Italy

Bahrain Bay to exhibit at MIPIM Asia
Middle East North African Network, Online financial portal, Amman, Jordan

Musharraf Hands Over Army Command
Nahamet, Online news portal, Beirut, Lebanon

Fifteen die in bombing north of Baghdad, multiple shootings by US troops
The Daily Star, Independent daily, Beirut, Lebanon

After Shibam, Zabid attracts attention of Germany
Yemen Times, Independent weekly, Sana'a, Yemen

________________

How are we doing?

We would like to hear from you how we perform. What you like and what we should change or add... Send us an email; we aim to please!

Tell your friends and associates ...

... to subscribe to Migalhas International! www.migalhas.com

Express yourself

Want to share your opinion, your experience, your questions? You are welcome to do so. This forum is yours. Please contact the editor: [email protected]

Events

We welcome information about your events or conferences to come. Please contact the editor.

Sponsors

Become a sponsor. Spread your name in the business and legal spheres around the world in Migalhas International.

Subscription

To subscribe: Register your name and your address at www.migalhas.com

To unsubscribe: Send your name and e-mail address to in the subject line. We will remove your name soonest.

Address changes: If you want to continue to receive Migalhas International, please make sure we have your current e-mail address.

Contact

Michael Ghilissen, editor: [email protected]

Miguel Matos, publisher: [email protected]

Please feel free to send your comments, questions and suggestions to the editor.

Your comments

We always welcome information, articles, testimonials and comments about something you've read in Migalhas International. Please forward your contributions to the editor.

Confidentiality

When you add your name to Migalhas International, you can be sure that it's confidential. We do not share, trade, rent or sell this list. Our "privacy policy" contains no fine print. No one gets our list. Period. Your e-mail address is safe with us.

Sharing Migalhas International

If you'd like to share this Migalhas International with friends and colleagues, feel free to forward this issue including the copyright notice. Or, invite them to subscribe so they receive their own Migalhas International every week.

Sources

The content of the Migalhas International newsletter is edited for purposes of news reporting, comments and education from several sources, including: The New York Times, The Wall Street Journal, The Boston Globe, The London Times, Le Monde, Frankfurter Allgemeine, The Financial Times, Google News, Paper Chase (jurist.law.pitt.edu), The World Press Review: https://www.worldpress.org, Forbes, Fortune, Time, Newsweek, Harvard Business Review, American Lawyer Media, FindLaw.com, Reuters, Associated Press, Internet Business Law Services, Folha de Sao Paulo, O Estado do Sao Paulo, Lexis Nexis, West Law, CNN, The Globe and Mail, The Los Angeles Times, Wikipedia and more.

Fair use notice

This newsletter contains copyrighted material the use of which has not always been specifically authorized by the copyright owner. We are making such ma

emocracy, scientific, and social justice issues, etc. We believe this constitutes a 'fair use' of any such copyrighted material as provided for in section 107 of the US Copyright Law. In accordance with Title 17 U.S.C. Section 107, the material in this newsletter is distributed without profit to those who have expressed a prior interest in receiving the included information for research and educational purposes.

The messages that appear in this newsletter are for informational purposes only. They are not intended to be and should not be considered legal advice nor substitute for obtaining legal advice from competent, independent, legal counsel in the relevant jurisdiction.

Transmission of this information is not intended to create, and receipt does not constitute, an attorney-client relationship. The information contained on this list may or may not reflect the most current legal developments.

www.migalhas.com

Copyright 2007 - Migalhas International

The messages that appear in this newsletter are for informational purposes only. They are not intended to be and should not be considered legal advice nor substitute for obtaining legal advice from competent, independent, legal counsel in the relevant jurisdiction.

Transmission of this information is not intended to create, and receipt does not constitute, an attorney-client relationship. The information contained on this list may or may not reflect the most current legal development.