REFERENCE ......though the intel memos were sent under Blumenthals name, the reports appear to have been gathered and prepared by Tyler Drumheller, a former chief of the CIAs clandestine service in Europe who left the agency in 2005. Since then, he has established a consulting firm called Tyler Drumheller, LLC.
Tyler Drumheller has also been affiliated with a firm called DMC Worldwide, which he co-founded with Washington, D.C., attorney Danny Murray and former general counsel to the U.S. Capitol Police John Caulfield.
DMC Worldwides now-defunct website describes it at as offering innovative security and intelligence solutions to global risks in a changing world.
Likely because of TD and DMC principals’ former IC connections they may have trafficked in classified information or knew of it as being classified. Their former clearance requirements about disclosure and knowledge still remained in effect, as well as Herr Clinton’s duties.
In an apolitical intelligence context, these people would be prosecuted
If not, why not?
======================================
REFERENCE Computer Crime, E-Crime, Hi-Tech Crime or Electronic Crime is a crime in which a computer plays an essential part. Computer crime is a felony violation of section 1030 of the United States Code. Computer crime also violates copyright laws and property rights in some cases.
This type of crime is the illegal exploitation of computer technologies, usually to support crimes such as fraud, identity theft, sharing of information, and embezzlement. A link to the U.S. Department of Justice's website about e-crime and the DOJ's computer forensics activities is at their web site.
Examples of computer crime are:
<><> * Fraud achieved by the manipulation of computer records.
<><>* Spamming wherever outlawed completely or where regulations controlling it are violated.
<><> * Deliberate circumvention of computer security systems.
<><>>* Unauthorised access to or modification of programs (see software cracking and hacking).
<><>* Intellectual property theft, including software piracy.
<><* Industrial espionage by means of access to or theft of computer materials.
<><>* Identity theft where this is accomplished by use of fraudulent computer transactions.
<><>>* Writing or spreading computer viruses or worms. <>* "Salami slicing" is the practice of stealing money repeatedly in extremely small quantities
<><>* Denial-of-service attack, where company websites are flooded with service requests and their website is overloaded and either slowed or crashes completely
<><>* Making and digitally distributing child pornography
==================================================
United States Code, Title 17 - Copyrights,January 1, 1998,
1.Chapter 1 - Subject Matter And Scope Of Copyright
2.Chapter 2 - Copyright Ownership And Transfer
3.Chapter 3 - Duration Of Copyright
4.Chapter 4 - Copyright Notice, Deposit, And Registration
5.Chapter 5 - Copyright Infringement And Remedies
6.Chapter 6 - Manufacturing Requirements And Importation
7.Chapter 7 - Copyright Office
8.Chapter 8 - Copyright Arbitration Royalty Panels
9.Chapter 9 - Protection Of Semiconductor Chip Products
10.Chapter 10 - Digital Audio Recording Devices And Media
11.Chapter 11 - Sound Recordings And Music Videos
==============================================
United States Code, Title 18 - Crimes And Criminal Procedure (Part I - Crimes),January 1, 1998, Chapter 25 - Counterfeiting And Forgery
Alabama Computer Crime Act, Computer Crime Statutes, May 1, 1995, Chapter 25 - Counterfeiting And Forgery
Federal Guidelines For Searching And Seizing Computers
Communications Privacy Act Of 1986, Chapter 119. Wire And Electronic Communications Interception And Interception Of Oral Communications
Electronic Communications Privacy Act Of 1986, Chapter 121--Stored Wire And Electronic Communications And Transactional Records Access
Research Needs For Computer Crime
Privacy Protection Act Of 1980, Chapter 21a - Privacy Protection Subchapter I--First Amendment Privacy Protection
Preparation Of Search Warrants For Computer-Related Evidence
Excerpts From Computer Search Warrants
Code Of Virginia, Title 18.2, Chap. 5 Crimes Against Property, Article 7.1. Computer Crimes
2004 CSI/FBI Computer Crime And Security Survey
2005 CSI/FBI Computer Crime And Security Survey
Computer Crime Research Center
http://www.crime-research.org/news/26.11.2005/1661/