Blog Jay Leiderman Law

Hearing scheduled in Andrew Luster’s appeal of rape sentence

An attorney for convicted rapist Andrew Luster, an heir to the Max Factor cosmetics empire, said a hearing is scheduled for Dec. 17 to set dates and times when legal motions surrounding Luster’s appellate court issues will be heard.

Attorney Jay Leiderman said Monday that Luster raised 20 legal issues in his appeal, including whether he was denied effective assistance of counsel at his trial and whether the judge used a proper method to calculate Luster’s prison sentence in 2003.

***

Leiderman said Luster, 48, was offered a favorable plea bargain deal of six to 16 years in prison but that his lawyer didn’t give him proper legal advice on the offer.

***

Andrew Luster

Jay Leiderman, unhappy that he only was able to reduce Andrew Luster’s sentence by 74 years, leaves the courthouse. Luster’s new sentence will be served at 50% time so he will be released when he is 62 as opposed to his release date before Leiderman got the sentence reduced. His original release would have come when Luster was 99 years old.

 

***

Ventura County Superior Court Judge Ken Riley, now retired, sentenced Luster to 124 years in prison. On June 19, 2003, Luster, who is Factor’s great-grandson, was caught at a taco stand in Puerto Vallarta, Mexico, by bounty hunter Duane “Dog” Chapman.

http://www.vcstar.com/news/2012/dec/10/hearing-scheduled-in-andrew-lusters-appeal-of/ 

twitter Facebooktwittergoogle_pluslinkedinmail

Notice of habeas corpus petition

To the Court of Appeal of the State of California, ______ District, Division ____, the _____ County District Attorney, the Attorney General for the State of California, the Warden of _____ State Prison; please take notice that:

Pursuant to Article VI, section 10 and Article I, section 11 of the California Constitution and Penal Code section 1473, and In re Clark (1993) 5 Cal.4th 750 n.7, petitioner [defendant’s name] seeks this Court’s writ of habeas corpus to relieve him of his wrongful criminal convictions and/or sentence and his unlawful confinement in the California Department of Corrections and Rehabilitation’s (“CDCR”) _______ State Penitentiary. Petitioner’s confinement is unlawful for the reasons and on the grounds stated in this petition and in Petitioner’s separately filed Memorandum of Points and Authorities, and supported by the attached exhibits, the declarations attached hereto, and the files and records in this matter, as well as any oral argument that may supplement this petition and any exhibits, declarations or the link filed subsequent to this petition as a result of the ongoing investigation.

HABEAS CORPUS

Known as “the great writ” habeas corpus petitions are the last refuge of an unjustly incarcerated prisoner

What is a habeas corpus petition?

Latin for “that you have the body.” In the US system, federal courts can use the writ of habeas corpus to determine if a state’s detention of a prisoner is valid. A writ of habeas corpus is used to bring a prisoner or other detainee (e.g. institutionalized mental patient) before the court to determine if the person’s imprisonment or detention is lawful. A habeas petition proceeds as a civil action against the State agent (usually a warden) who holds the defendant in custody. It can also be used to examine any extradition processes used, amount of bail, and the jurisdiction of the court.

See, e.g. Knowles v. Mirzayance 556 U.S.___(2009), Felker v. Turpin 518 US 1051 (1996) and McCleskey v. Zant 499 US 467 (1991).

 

twitter Facebooktwittergoogle_pluslinkedinmail

Monday, August 19, 2013

Remarks Made at the Jeremy Hammond / Barrett Brown Fundraiser 19 August 2013 New York

We live in times where our liberties are ever threatened.  Where the individual is presumed to yield to the state.

Things that should not have ever been forgotten have, until recently, seemingly been lost to history. Things that should be said and known every day as we Americans decide how we allow ourselves to be governed are no longer spoken except by an outlawed few.  Our privacy, the very gift that gives us our spirit of independence has become threatened.  Where the masses have forgotten, a new breed of patriot, the hacktivist, remembers. Words that have, over the years, lost their meaning have suddenly gained meaning anew. There is a war on information, but that is not a war that the government will win. The people will prevail. As the people must prevail.

Jeremy Hammond

Jay leiderman addresses a crowd at a protest after celebrated hacktivist Jeremy Hammond was sentenced

I want to read to you a bit:

THESE are the times that try men’s souls. The summer soldier and the sunshine patriot will, in this crisis, shrink from the service of their country; but he that stands by it now, deserves the love and thanks of man and woman. Tyranny, like hell, is not easily conquered; yet we have this consolation with us, that the harder the conflict, the more glorious the triumph. What we obtain too cheap, we esteem too lightly: it is dearness only that gives every thing its value. We know how to put a proper price upon goods; and it would be strange indeed if so celestial an article as FREEDOM should not be highly rated. 

Thomas Paine, The American Crisis, Winter 1776.  It is as appropriate now as it was at Valley Forge.  It shouldn’t be, but it is.

Let us not forget the principles upon which this country was born. As we look to our seemingly forgotten past we must embrace the fantastic promise of the digital revolution. It is our future.

The world is changing at a faster pace than it ever has before.  One person with the courage to come forward can change the world in ways they never could before.  But we must be mindful of the world as it is so that we can act to change it in ways that will benefit the future.

Money

Power

Sex

Drugs

Rock and roll

These things have become passé

Information is the new currency

Information is the new aphrodisiac

Information is the new high.

He who controls the information controls your world.

And your government knows it.

But we’re starting to know it too, thanks at least in part to the groundbreaking work of Jeremy Hammond and Barrett Brown, two of the first prophets of the digital age.

Barrett Brown

Political Prisoner Barrett Brown

Educate and inform the whole mass of the people… They are the only sure reliance for the preservation of our liberty, said Thomas Jefferson. But our government would likely seek to classify our founding fathers as terrorists if they dared seek to turn their rhetoric to reality today. How far we have drifted from the American ideals. What dangerous times are these.

Likewise, predictably lurking about Jeremy and Barrett are prosecutors and judges who want to turn these prophets into martyrs. Our aim is to see that they fail miserably in these endeavors.

At issue in the cases of both Hammond and Brown is the principle that people are entitled to privacy while the state must be transparent. Syllogistically, a good result in The United States v Hammond and The United States v. Brown translates into a good result for freedom, freedom for us all. At the same time, we must also recognize that what is good for freedom is antithetical to the emerging omnipresent surveillance state.

Jeremy is accused of hacking Strategic Forecasting Inc., commonly known as Stratfor.  Stratfor was thought of as a private CIA.  He has admitted to passing over 5 million emails to Wikileaks for publication.  He has pled guilty and faces a possible 10 years in federal prison.  Those emails gave us a glimpse of the evil and inappropriate relationship between the government and the private spy network, the so called private intelligence community.  Among the disclosures of the Stratfor emails shed light upon was something called trapwire – facial recognition software already in place in major American cities that can track you as you go about your daily routine.

Jeremy Hammond Barrett Brown

Jay Leiderman addresses the crowd at a fundraiser for journalist Barrett Brown and hacktivist Jeremy Hammond in New York City

Trapwire was one of the many items that journalist Barrett Brown was investigating at the time of his arrest.  Barrett pends trial on charges that could add up to over 100 years of custody time.  Principal among the charges he faces are allegations that he shared a link to the Stratfotr hack wherein there were credit card numbers.  Assuming arguendo he did so, he shared a link to a newsworthy event.  He did something journalists do every day all day long.  But because of his investigations into these private intelligence firms, including Booz Allen Hamilton, the company in the news because they were the NSA contractor who employed NSA whistleblower Edward Snowden, Barrett was charged and stands to lose his freedom for all of his days.  He’s 32 and they could give him 100 years.  It’s obscene.

Let me read some Jefferson once more to buttress the historic importance of these acts:

Rightful liberty is unobstructed action according to our will within limits drawn around us by the equal rights of others.  I do not add ‘within the limits of the law’ because law is often the tyrants will, and always so when it violates the rights of the individual. 

Indeed, Jefferson would be in the lockup today, perhaps sharing a cell with Jeremy or Barrett.  What dangerous times are these indeed when personal liberty is constantly under threat of incarceration.

Jeremy and Barrett acted not for fame or for financial gain.  They didn’t think that one day we would gather together like this to support them and their actions.  They did what they did because of their unyielding principles.  Because they understood that freedom, liberty and independence come from that simple concept; privacy for the individual and transparency for the state.  Based upon that, they have acted heroically.

They remembered the American ideals that were lost to time.  They remembered their past as they forged ahead to make a better future for us all.  These are indeed the times that try man’s souls, but if we follow the lead set by Jeremy and Barrett, I’ve no doubt that it will be the American people that have a glorious triumph over the American government and the corporatocracy’s private surveillance state.

Donating to the causes of Jeremy Hammond and Barrett Brown is important for the foregoing reasons. We ask you to stand up for freedom, to stand against the surveillance state, to stand for the true ideals of the American experiment and help us protect and fight for these prophets of the digital age.

Jeremy and Barrett put themselves on the line for your freedom. Please help secure theirs. We do not forgive the transgressions of the surveillance state.  We do not forget our heroes.

 

twitter Facebooktwittergoogle_pluslinkedinmail

Why We Can Stop Missiles But Not Hackers

Hackers present both the public and private sector with some very unique challenges. Unlike traditional threats, which are often presented in very black and white terms, hackers are notoriously adaptable to new security measures and tend to discover vulnerabilities as fast as developers can fix them.

Their tools vary; sometimes hackers author malware to commandeer a victim’s system or computer, while other times they brute force their way in by guessing passwords or stealing account information. Other times they exploit users’ trust with phishing; failure to update software is another major cause of a security breach.

Stories about the mock pentagon hacks leave us with the burning question: just how vulnerable are we to hackers?

Hackers

Private Enterprises

Large corporations and small businesses frequently have good door security; they know who’s going in and out of their building and there is usually some kind of monitoring, be it live or recorded.

Private surveillance has made it considerably easier for law enforcement because physical evidence of a crime on tape is subject to less bias and provides a solid narrative of what happened. The threat of surveillance is also a great deterrent to would-be criminals.  In other words, it is considerably more difficult to dispute a criminal charge when one is caught on tape.

But digitally speaking, things are very different. Major data breaches, such as with Seagate and LinkedIn, show us that hackers are undeterred by the private sector’s security advances. They demonstrate that our businesses haven’t made much progress since the Target or Yahoo breaches, that hackers are still finding their way into servers and stealing customer information.

Much of this has to do with human error. Some of the largest hacks, including the iCloud celebrity photo “leaks” of 2014 [note 1] and the Seagate breach of 2016 stem from very basic phishing scams. Thus far, security services offer little in the way of handling scams, focusing mainly on encryption and malware elimination.

That’s not to say that said services aren’t useful; they just can’t stop everything. More often than not, businesses fall victim to internal sabotage or basic scams because that may be the only way for hackers to get in.

Public Services

Thus far, damage from hackers in the public sector appears to be minimal; no bombs have been dropped, no missiles launched, and no secret operations (that we’ve been told about) foiled. But the government has been hacked—and not just once.

no bombs have been dropped, no missiles launched, but the government has been hacked—and not just once.

In 2016, both the Internal Revenue Service and the Federal Bureau of Investigation were hit by hacks, with the former exposing the Social Security numbers and personal information of hundreds of thousands of private parties, and the latter information about public agents in the Department of Homeland Security and the FBI. [Note 2]

While not all details of the hacks have been made public, it is suspected that information gained by hacking private sector businesses led to the IRS hack. Yet these hacks may be the least of our concerns in the public sector.

Between 2015 and 2016, the US government accused both China and later Russia of hacking into public systems. These demonstrations of cyberespionage are evidence that foreign intrusions are evolving into something beyond moving around warships, staging blockades, or declaring no-fly zones. In some ways, they are much more akin to Cold War tactics.

More importantly, these sorts of hacks are unprecedented. Concerns that Russia may have interfered in the US elections give concerns as to just how safe our public systems really are and if they can be relied upon for accuracy.

You and I

Back at home, individual users face new problems from the hacker menace because our devices carry increasingly valuable information and are often far less secure than larger companies or databases.

Practically speaking, there are a few basic things you can do to keep yourself safe from intrusions. Protecting yourself is valuable both to you and to any companies you associate with, as a single unsafe device can have a cascading effect as companies move towards BYOD (Bring Your Own Device) models.

The standard anti-malware service is a given on any device, mobile or otherwise. What’s less commonly utilized but equally valuable is a Virtual Private Network (VPN) service. It works as a form of private encryption, protecting your internet connection and securing you from hackers, particularly while on public networks. For entry level users, I recommend this guide by Secure Thoughts to learn about the details and if a VPN suits your needs.

password

Change your passwords every six months to ensure continued security

Other useful apps and software include password management services and backup programs. The former can aid in managing the large number of passwords we as private users are required to juggle each day, while the latter can help recover from losses.

Hackers also have a particular affinity for outdated services, so just make sure anything you have installed is running on the most recent version. Old versions often contain security loopholes or bugs that hackers can exploit. It’s one other reason to beware of older programs that are no longer supported by their respective authors.

Looking Forward

Hackers are a serious threat, both public and private, that aren’t likely to go away anytime soon. They may not be as devastating as a single bomb or missile, but they’re considerably more difficult to stop and much more tenacious.

Chances are you or someone you know has already been hacked as a result of so many breaches and may not even know about it. This is the era of eternal vigilance, and if we’re going to keep up with hackers, that means remaining on alert and monitoring our accounts. Keep an eye out for suspicious activity; it’s one of the best ways to prevent damage from getting out of control. And if you don’t, who will?

About the Author: Cassie is a writer and blogger who focuses on internet security and technology. The constant stream of identity theft and public data breaches keeps her very busy writing about how individuals and businesses can be better prepared for future incursions.

Web: www.securethoughts.com
Twitter: @securethoughtsc

[note 1: Jay Leiderman worked on one of these cases but he did not write this post]

[Note 2: Likewise, Jay Leiderman represents a defendant charged in some of these cases]

twitter Facebooktwittergoogle_pluslinkedinmail

22 April 2013

Jay Leiderman on HuffPostLive

Jay Leiderman

AP Story

 Reuters editor charged with hacking: I was fired

A Reuters deputy social media editor accused of conspiring with hackers to deface a story on a news website says he has been fired.

His dismissal came the day before 26-year-old Matthew Keys was scheduled to appear in US federal court for the first time on the felony charges. His attorneys said he plans to plead not guilty.

 Jay Leiderman

US federal prosecutors allege Keys provided the hacking group Anonymous with login information to access the computer system of The Tribune, the parent company of The Los Angeles Times.

According to a federal indictment handed down last month, a hacker identified only as “Sharpie” used information Keys supplied in an internet chat room to alter a headline on a December 2010 Los Angeles Times story to reference another hacking group.

Tribune also owns a Sacramento television station Keys had been fired from months earlier.

Keys has said he did not commit the crimes he’s accused of. He did not immediately respond to a telephone message seeking comment, but he did post several online messages saying Reuters had not fired him as a result of the indictment.

“Just got off the phone. Reuters has fired me, effective today. Our union will be filing a grievance. More soon,” he tweeted to his more than 35,000 followers.

 Jay Leiderman

He later tweeted a copy of a “final written warning” he said he received from Reuters in October, which admonished Keys for mocking a Google executive from a fake Twitter account he had created, saying the action demonstrated a “serious lapse of judgement and professionalism that is unbecoming of a Reuters journalist”.

His attorney Jay Leiderman confirmed the firing, but said he would not comment on it because the Newspaper Guild was representing him on the matter. He added that “there is an appeals process that I will have to let play out”.

The Guild did not immediately return a phone message seeking additional details.

Reuters hired Keys in 2012 and suspended him from his New York social media job on March 14. Thomson Reuters spokesman David Girardin declined to elaborate on why Keys was no longer employed.

Keys is scheduled to be arraigned on Tuesday (US time) in federal court in Sacramento. He is charged with one count each of conspiracy to transmit information to damage a protected computer, as well as transmitting and attempting to transmit that information.

If convicted and sentenced to the maximum for each count, the Secaucus, New Jersey, resident faces a combined 25 years prison and a $US500,000 fine, prosecutors say. But experts say first-time offenders with no criminal history typically spend much less time in prison than the maximum term.

twitter Facebooktwittergoogle_pluslinkedinmail