‘against’ Tagged Posts

Egypt and Thailand: When the army turns in opposition to free speech

Ziad Reslan Contributor Extra posts by this contributor Elon Musk deserves harder love from the SEC Clear up, MIT’s tackle social innovation ch...

 

Wael Abbas, a human rights activist targeted on police brutality in Egypt has been underneath arrest since Could on prices of spreading pretend information and “misusing social media.” Andy Corridor, a labor rights researcher, has been combating prices underneath Thailand’s pc crime legal guidelines due to a report revealed on-line that recognized abuses of migrant employees.

You wouldn’t usually point out Egypt and Thailand in the identical breath. However each international locations underwent army coups inside the final 5 years, and even among the many many oppressive regimes on the earth, they’re going to further lengths right now to prosecute free speech. 

Abbas and Corridor are simply two examples of tons of of current prosecutions. In 2017 alone, Egyptian safety forces arrested a minimum of 240 individuals primarily based on on-line posts. Three years after the coup, Thai authorities had charged greater than 105 individuals only for posting commentsdeemed offensive to the monarchy. 

To be clear, neither nation has ever been a bastion of free speech. With one exception, Thailand has been ranked “not free” yearly that political-rights nonprofit Freedom Home has revealed its Freedom on the Internet Report. Egypt’s rating has steadily declined for the reason that peak of the Arab Spring, going from “partly free” to “not free” within the final three years.      

Sanja Kelly has been with Freedom Home for 14 years and has headed its Web Freedom division since 2010. She tells me that what’s particularly alarming is the extent to which authorities in each Egypt and Thailand have gone to silence on-line dissent. Activists and dissidents might effectively anticipate persecution world wide, however right now housewives, college students and even vacationers in Egypt and Thailand have turn into the goal of prosecutions for as little as posting a video or responding to a non-public message on social media.

Over the final 5 years each Egypt and Thailand have skilled an unprecedented crackdown on web freedom. “In 2015, the Egyptian authorities blocked solely two web sites. At present, they’re blocking over 500,” Kelly defined. “The scenario in Egypt and Thailand is now among the many most repressive on the earth.” 

Egypt

Since El-Sisi seized energy in 2013 in a coup, the Egyptian authorities has taken drastic steps to clamp down on-line. In its newest transfer, the federal government handed a legislation in September that makes any social media person with greater than 5,000 followers topic to regulation as a writer. So now in Egypt, when you have greater than 5,000 Twitter followers, for instance, you’re topic to the identical rules that the New York Occasions has on what it publishes.

It wasn’t all the time like this. Again in 2011, Fb and Twitter have been hailed as drivers behind the Arab Spring. The protests that resulted led to the toppling of Hosni Mubarak who had dominated the nation for practically 30 years. At their peak, many journalists even began calling the protests the “Twitter rebellion” and the “Fb revolution.”

Kelly tells me that freedom on the web in Egypt has been getting progressively worse since Sisi seized energy. Even underneath Mubarak, the authorities weren’t as involved with policing speech on the web. However that has fully modified since 2013.    

Kelly provides that the measures Egyptian authorities handed this 12 months have been meant to tighten their grip on social media and web use even additional. The outcome has been an increasing number of Egyptians being arrested, with the authorities utilizing a mix of legal guidelines to carry prices. 

Thailand

Thailand has lengthy been recognized for its strict software of its lèse majesté legal guidelines underneath which any criticism of the Thai king or his household can result in years in jail. However for the reason that 2014 army coup, the enforcement of those legal guidelines has gone into overdrive. The ruling army junta in Thailand has additionally beefed up pc crimes and defamation legal guidelines to make all of it however unattainable to specific dissent on-line.     

In line with Human Rights Watch, for the reason that coup in 2014, the junta has ramped up arrests underneath the 2007 Pc-Associated Crime Act (CCA). Final 12 months, the army amplified the 2007 legislation by offering grounds for the federal government to prosecute something they designate as “false,” “partially false,” or “distorted” data, a dedication that the federal government itself will get to make.

Even criticism of the adjustments to the legislation itself have been outlawed, with the Thai Military Cyber Middle warning that posting or sharing on-line commentary that criticizes the legislation may very well be thought of false data and lead to prosecution.

Kelly tells me that, whereas the CCA and lèse majesté legal guidelines have lengthy been used to stifle on-line dissent, the amendments final 12 months granted Thai authorities even broader powers. They closed down loopholes in earlier variations of the legislation, together with permitting authorities to jail individuals for vital messages they obtain on their cellphone even when they don’t share them. Which means that should you get a Fb message in Thailand right now criticizing the royal household, then you might be underneath an obligation to delete the message or face prosecution.

Andy Corridor discovered himself in the course of this development in the direction of heavier handed enforcement. A labor rights activist, Corridor carried out analysis for a report for the group Finnwatch that discovered that the Pure Fruit Firm, Thailand’s largest producer of pineapples, mistreated its employees. Corridor then confronted legal prosecution underneath the CCA and cyber defamation legal guidelines for the report’s publication on-line and for an interview he later gave to Al-Jazeera concerning the report. 

Talking to me from an undisclosed location, Corridor tells me he has spent greater than $ 100,000 defending the legal prices in opposition to him — primarily fundraised from supporters — and the higher a part of the final 5 years coping with the fees and his appeals. He admits issues may have been a lot worse: “If I weren’t a British citizen and my case hadn’t gotten as a lot consideration because it has, then I’m undecided I’d be round right now to inform my story. Many Thai residents have misplaced their lives doing related work.”

Corridor didn’t got down to be a freedom of speech crusader, he had dropped out of his PhD program in 2005 to maneuver to Southeast Asia to turn into a labor rights investigator, solely to seek out himself within the crosshairs of the nation’s defamation legal guidelines in 2013. When he was first charged, the federal government requested him to make a public apology denouncing his analysis. When he refused, the prosecution continued together with his passport being confiscated at one level to stop him from leaving the nation.

Now having taken refuge in a 3rd nation, Corridor tells me that the actions of the federal government — particularly its elevated enforcement of cyber defamation legal guidelines during the last 12 months — has bred concern amongst activists and has had a chilling impact on the work of human rights advocates in Thailand.  

It’s Not Simply Activists

In line with Kelly, one particularly worrying pattern about Thailand and Egypt’s elevated prosecutions is that authorities have been more and more prepared to go after anybody they deem vital on-line, not simply seasoned activists. Housewives, college students and even vacationers.

Simply in September, a Lebanese vacationer was arrested on her means out of Egypt for posting a ten-minute video on Fb that had gone viral. Within the video, she’d complained of sexual harassment she’d skilled whereas within the nation. She was discovered responsible of intentionally spreading pretend information and public indecency for simply talking out about what had been performed to her. She now faces an eight year-sentence.

Over in Thailand, a housewife confronted as much as 15 years in jail for violating lèse-majesté legal guidelines as a result of she had responded to a Fb message vital of the federal government with one phrase, “ja” (roughly “yeah” in Thai). Whereas a legislation pupil was sentenced to 2.5 years final 12 months underneath the identical legal guidelines for sharing a BBC article profiling the brand new Thai king.

Function of Fb and Twitter

What position have social media platforms performed in all of this? To their credit score, firms like Fb and Twitter haven’t been silent bystanders who’ve merely utilized these draconian legal guidelines blindly. To start with, they implement international requirements for what can and may’t be posted on their platforms, and so they don’t modify these requirements primarily based on anybody nation’s repressive defamation legal guidelines.

Each Fb and Twitter additionally publish periodic transparency stories that combination the variety of requests they get from governments to take down posts or acquire data on customers. This week, Twitter introduced that it might let customers know when a tweet has been deleted on the premise of a authorities request.    

A evaluation of the transparency stories for every of Egypt and Thailand although reveals that the variety of requests are remarkably low given their respective populations and the extensive use of Fb in every of those international locations. Fb says that in 2017 it solely acquired seven requests from Thai authorities and only one from the Egyptians. In response, Fb offered 17% of knowledge requested by Thais and didn’t present any knowledge to the Egyptian authorities (in comparison with 32,000 requests by the US authorities with an 85% manufacturing price by Fb over the identical interval).

So how can the variety of prosecutions primarily based on social media posts be reconciled with the low variety of requests? Kelly tells me it’s seemingly as a result of Thai and Egyptian authorities have discovered methods to bypass platforms altogether understanding that their requests won’t be complied with.

What Freedom Home has documented as a substitute is arms of the federal government devoted to monitoring what’s posted on social media. Within the case of Twitter, Thai and Egyptian governments filter for sure phrases after which use the publicly accessible tweets as a foundation for prosecution. With non-public Fb posts, governments go one step additional. They create pretend profiles with footage of engaging women and men, ship a pal request to their goal and get entry to a profile when their pal request is accepted. They then use no matter non-public posts they discover to prosecute.   

In a single case in Egypt, Kelly tells me the federal government scanned footage on Fb from a live performance at which the rainbow flag was displayed. Egyptian authorities then went after the individuals it may establish from these footage on the foundation of violating morality legal guidelines. Utilizing on-line platforms to entrap members of the LGBTQ group has turn into a favourite instrument of repression by Egyptian authorities. In line with the Digital Frontier Basis, a minimum of 77 members of the LGBTQ group have been arrested for the reason that coup for his or her on-line expression.

Are Egypt and Thailand the Worst Offenders?

Although Egypt and Thailand have rung alarm bells this 12 months with the sheer variety of prosecutions of on-line speech, they’re nonetheless not the worst offenders in opposition to speech on-line. Kelly names Saudi Arabia, China, the UAE, North Korea, and Iran as just a few examples of worse offenders. The distinction, Kelly explains, is that the regimes in these international locations have turn into extraordinarily adept at combating on-line dissent.

The truth that there might have been extra prosecutions in Egypt and Thailand this 12 months doesn’t inform the entire story. Folks within the different international locations that Kelly names have simply given up on the power to specific dissent on-line. China’s clampdown doesn’t even must get to the person stage – as a substitute they’ve firms like Baidu and WeChat management and filter messages on the supplier stage earlier than they’re even revealed. Egypt and Thailand are working at a decrease stage of sophistication and have a powerful and energetic civil society – which implies individuals there nonetheless see an even bigger opening and haven’t turn into fully self-censoring.

The query then turns into, how lengthy will or not it’s earlier than Thailand and Egypt flip into the following China or Saudi Arabia? Will dictatorships be converging of their practices to stifle on-line speech? Social media might have turned the world into a world village, however evidently village can also be enabling dictators on reverse ends of the globe to raised be taught from one another’s repressive measures.

Right here is the SEC grievance in opposition to Elon Musk and Tesla

 

Replace: There’s a livestream of the SEC press convention detailing the grievance,

The Securities and Change Fee lodged a grievance as we speak in opposition to Elon Musk and Tesla following tweets despatched final month by the CEO involving a deliberate takeover of the electrical automotive firm at $ 420 a share.

The submitting from the Southern District of New York identifies the tweets as “false as deceptive,” including:

Musk’s statements, disseminated by way of Twitter, falsely indicated that, ought to he so select, it was nearly sure that he might take Tesla personal at a purchase order value that mirrored a considerable premium over Tesla inventory’s then-current share value, that funding for this multi-billion greenback transaction had been secured, and that the one contingency was a shareholder vote. In reality and actually, Musk had not even mentioned, a lot much less confirmed, key deal phrases, together with value, with any potential funding supply.

Along with the August 7 “funding secured” assertion, the doc identifies three extra tweets,

  1.  My hope is *all* present traders stay with Tesla even when we’re personal. Would create particular function fund enabling anybody to stick with Tesla.
  2. Shareholders might both to [sic] promote at 420 or maintain shares & go personal.”
  3. Investor assist is confirmed. Solely cause why this isn’t sure is that it’s contingent on a shareholder vote.

We’re awaiting a response from Tesla. The corporate’s inventory value simply took an enormous dip on the information. 

Researchers say Stuxnet was deployed against Iran in 2007

 

Researchers say Stuxnet was deployed against Iran in 2007
Researchers at Symantec Corp.

have discovered a computer virus Stuxnet version used for the nuclear program of Iran to attack in November 2007, two years earlier than previously thought.

Stuxnet, which is widely believed to have been developed by the United States and Israel, was discovered in 2010 after being used for a reprocessing uranium to attack Natanz, Iran. It was the first known example of the public that a virus is used to industrial machinery to attack.

Symantec researchers said Tuesday it is a piece of code, which they called “Stuxnet 0.5,” among the thousands of versions of the virus was discovered, she recovered from infected computers.

They found evidence Stuxnet 0.5 has been in development since 2005, when Iran is still setting up the uranium enrichment plant and the virus was deployed in 2007, the same year the Natanz plant went online.

“It’s really great that they thought such a project in 2005 to create,” Symantec researcher Liam O’Murchu told Reuters.

security experts who have examined

Symantec 18-page report on Stuxnet 0.5 has said he showed the cyber weapon was powerful enough to paralyze the production of fuels at Natanz where six years ago.

“This attack was the centrifuges have been damaged as a number without destroying the operator of the facility would be suspicious,” said a report by the Institute for Science and International Security, which is headed by former weapons inspector David Albright of the United Nations and closely monitors Iran’s nuclear program.

ALTERNATIVE APPROACH

Although he did not know what damage Stuxnet could have caused 0.5, Symantec said it was designed to Natanz to attack by opening and closing valves hexafluoride gas supply of uranium in centrifuges, without the knowledge of the operators of the facility.

Earlier versions

decompose Stuxnet are believed to have been used for the enrichment process to sabotage by changing the speed of the gas centrifuges spinning the knowledge of their operators.

“The report provides evidence more concrete than the United States is the activity of trying to Iran’s nuclear program that derail it was revived in the government of President Mahmoud Ahmadinejad,” said John Bumgarner, an expert in cyber weapons that works as chief technology officer of the Cyber ​​Consequences Unit United States.

The Natanz was the subject of scrutiny by the United States, Israel and their allies, who accuse Iran wants to build a nuclear bomb.

The United States began a complex cyber weapon built during the administration of George W. Bush to prevent Tehran from acquiring nuclear weapons, U.S. officials familiar with the program told Reuters. The government has refused to comment on reports and investigations into the leak of the computer programs.

Since the discovery of Stuxnet

in 2010, security researchers have a handful of other pieces of advanced computer code discovered, according to them, were developed in tandem for espionage and war. These include flame Duqu and Gauss.

0.5

Stuxnet was written using much of the same code as the flame according to the Symantec report, which was published at the RSA Conference in San Francisco, an event attended by more than 20,000 security professionals.

Symantec said it is now four versions of Stuxnet discovered and there are probably others that have not been discovered. Researchers at Symantec and elsewhere still trying to get the full extent of the ability of the virus to understand.

“The number of filling holes,” said O’Murchu.

He said investigators found no evidence to prove who was behind Stuxnet.

later versions of Stuxnet, that industrial control software known as Step 7 from Siemens AG treats, more advanced methods used to infect computer systems, he said.

Siemens said previously connected security holes that allowed Stuxnet breached its software. A spokesman did not comment on the latest research from Symantec.

Analysis: The near impossible battle against hackers everywhere

 

Analysis: The near impossible battle against hackers everywhere
Warnings tell

Washington a “cyber Pearl atmosphere” consider a surprise attack from a formidable enemy that the power of the financial system of the country to disable or cripple the U.S. government could destroy.

But those on the front lines say it all not to government agencies and corporate networks to protect against a sudden attack. They say many infringements push both perhaps dozens of countries, as well as well-funded guerrillas and criminals qualified electronic.

security officers and consultants say they are overwhelmed. The attacks are not only China that Washington has long been accused of spying on U.S. companies, many come from Russia, Eastern Europe, the Middle East and the Western countries. The authors of elite military units organized criminal networks in adolescents militants.

“They spend more than us and they Outman in almost every way,” said an officer of Dell Inc. Chief Security Officer, John McClurg. “I can not remember in my life ‘adult, a difficult time.”

The big fear is that one day, a large corporation or a government agency will be a serious disturbance and very costly to their business to make when hackers to steal data or damage critical infrastructure sabotage or destroy consumer confidence in the safety of their data.

Elite security Mandiant Corp. Monday gave a 74-page report that a unit of Chinese soldiers steal data from more than 100 companies accused. While China was immediately denied these accusations, safety experts and others say Mandiant the hacker group is just one of more than 20 with origins in China.

Chinese pirates

tend to large companies and technology companies the most innovative thing using e-mails that appear to come from trusted colleagues focus, but bear attachments marred by viruses, spyware and other malicious software, according to researchers western cyber.

Eastern European crime rings, meanwhile, use “drive-by downloads” to undermine popular websites like NBC.com last week visitors to infect. Although malware can vary but often include software for recording keystrokes that computer users passwords for financial accounts.

Other

in the game are activists in the style of loosely affiliated group known as Anonymous, who are in favor of denial of service attacks and temporarily block websites from view and automated searches for common vulnerabilities a way to access information from the company.

An increasing number of countries weapons programs computer and electronic espionage finance, law enforcement officials said. The alleged involvement of the United States in the production of electronic direction, including Stuxnet, that the Iranian program to enrich uranium to hurt, is considered one of the most successful.

Iran is also blamed for a series of extraordinarily effective denial of service attacks against major U.S. banks over the past six months that stopped their online banking sites. Iran is suspected of introducing at least one American oil company, two people familiar with the ongoing investigation told Reuters.

“There is a battle looming in every direction you look,” said Jeff Moss, chief information security ICANN, a group that is part of the critical infrastructure manages Internet.

‘personal goals Everybody goes to the door when it’s just fire after fire, “said Moss, who also advises the U.S. Department of Homeland Security.

HUNDREDS unreported cases

Industry veterans say that the growth in the number of hackers, software tools at their disposal, and the part thriving underground economy to have any network connected to the Internet is impossible to perfectly defend.

“Your average engineer operational safety feels somewhat under fire, “said Bruce Murphy, director of Deloitte & Touche LLP, the study of labor safety.” It feels like Sisyphus rolling a stone on the hill and the hill keeps steeper. “

Three major U.S. newspapers, Apple Inc., Facebook Inc., Twitter and Microsoft Corp. have all admitted in February they had hacked. Inserted the malware on the computers of employees in technology has been detected in hundreds of other companies who have chosen to remain silent about the incident , two people familiar with the situation told Reuters.

ownership “I can not be a time when many companies were so clearly remember” “and were so unprepared,” says Adam O’Donnell, an officer of the company Security Sourcefire Inc., using slang for hackers access.

Instead of hype, cyber intrusion remain under-public â € leaks fear the attacks will spook investors?? head of the new attempt FBI cybercrime, Deputy Executive Director Richard McFeely said that the secret has become a major challenge.

“Our biggest problem at the moment is to the private sector to a level of comfort where they can report defects, malware, effects within their networks” said McFeely. ” It was very difficult with many large companies to get them to cooperate fully. “

McFeely said the FBI plans to open a deposit malware for sharing information between companies in the same sector to encourage. Obama also recently issued a decision on cybersecurity promotes cooperation.

former head of the National Security Agency, Michael Hayden, supports the use of commercial and diplomatic channels to put pressure on countries of piracy as early a White House strategy announced Wednesday new

“The Chinese, with some legitimacy, will say: “.. you spying on us as the former Director of the NSA, I will say:” Yes, and we are better than you, “said Hayden, now director of security within the Chertoff Group, consultant

He said what worries him, moreover, c .. is the Chinese presence on networks that do not value intelligence as systems that infrastructure such as power plants and water have “There is no intellectual property there to be stolen, not trade secrets, not negotiating positions. So that scares you, because it seems to be preparing attacks, “said Hayden.

middle of the growing fear, many top professionals in the field in San Francisco on Monday to meet the conference’s most famous American industry security, the name of the host company EMC Corp. and RSA unit.

Several experts said they were convinced that companies spend money on the wrong things, such as antivirus subscriptions can not detect new attacks or directed.

RSA executive chairman Art Coviello and Francis de Souza, director of products with high provider Symantec Corp., Both have said they will be speeches calling for a focus on more advanced analysis instruments seeking unusual behavior the network?? seems expensive.

a more fundamental approach to the limitation of computer privileges for users, installing software updates quickly, and allowing only trusted applications to function correctly.

Some security companies are zero with new models, such as forcing all programs to their customers to carry on the wall of virtual machines to stop.

With these perspectives, so much money at stake, and the problems both years, may only two points of agreement.

Most people in the industry and the government thinks that things will get worse. Coviello, for its part, has predicted that the first genre – but relatively easy -. virus removed all data on tens of thousands of PCs to the company of national oil of Saudi Arabia last year was a harbinger of things to come

And more

say that public attention on cybersecurity, even if it solves uncomfortable on the failure of the industry and stubborn opponents, will lead to a debate desperately need doing internationally and at home.

Einhorn case against Apple rests on unusual legal tactic

 

Einhorn case against Apple rests on unusual legal tactic

Hedge Fund Star of David Einhorn would force Apple Inc. to be a part of their huge cash reserves with investors to share, but his trial was based on a U.S. securities rule that there is little jurisprudence.

Einhorn Greenlight Capital sued the manufacturer of the iPad and the iPhone in the U.S. District Court in Manhattan on Thursday to try to get Apple to prevent the elimination of preference shares in the charter. The suit is part of the offer Einhorn pressure on Apple to be a part of its $ 137 billion in cash to be used for perpetual preferred shares to the existing shareholders that dividends payable to spend.

The Crown argued

Apple violated the Securities and Exchange Commission rules that prohibit companies from “clustering” of unrelated subjects in a proposal for a shareholder vote.

setting that Apple has violated the rules can be tricky. Little or no case law exists on the issue and own SEC rule is relatively little general guidance, legal experts said.

Still, James Cox, a professor at Duke University School of Law, Einhorn thinks “is a hell of a good deal.”

“I think the Apple in sight,” he added, saying it “seems to be a case quite dramatic consolidation.”

The hedge fund manager for a ban on a vote of the shareholders on 27 February to block the proposal, saying Apple violated Article 14 of the Securities Exchange Act of 1934. arguments must be heard U.S. District Judge Richard Sullivan on 22 February. Apple until February 15 to file a response with the court.

proxy proposal, Proposition No. 2 is intended to amend the articles of the three Apple ways: by providing a majority of the directors, establishing a nominal value of stock of Apple and the elimination of the possibility to issue preference shares <. / P> Einhorn is represented by the firm of Akin Gump Strauss Hauer & lawyers Feld, Greenlight prolonged outside counsel. No lawyer Apple is not the role of the judge and a representative would not tell what to represent in the case of Apple.

On Friday, the California Public Employees Retirement System, the largest U.S. public pension fund and owns 2,700,000 shares of Apple, and the most influential proxy voting permanent ISS Proxy Advisory services repeatedly urged investors to vote in the benefit of the shareholder proposal in question.

“All shareholders should have the right to vote,” Anne Simpson, CalPERS Senior Portfolio Manager and Director of Corporate Governance said on CNBC. “We do not want the board to do a deal on the side with a hedge fund for fear of a lawsuit that the annual meeting will cancel.

” This is a major problem that must be carefully considered and We want the council to come to all shareholders and give them a chance to make their voices heard.

ISS, which makes recommendations on how shareholders should vote on the proposed proxy, usually believes the “clustering” of the proposals was not in the best interest of the shareholders, but supported the removal of the “blank check “preference shares because of their potential to be misused as a takeover defense.

“While many investors saw Apple cash as excessive and I wanted more of her return for shareholders to see, this view can not be universal: investors may prefer other money (or at least most of it) was used for investments and acquisitions, “said in a statement Friday.

APPLE HOW TO RESPOND?

It is not clear how Apple will respond to its official response to these lawsuits. On Thursday, Apple said Einhorn trial was incorrect and that the approval of Proposal No. 2 would not prevent the issuance of preference shares in the future.

“At this time, Apple statutes provide for the issuance of preferred shares” blank check “by the board of directors without shareholder approval,” said Apple. “If the proposal # 2 is adopted, our shareholders have the right to the issue of preference shares to approve.”

Einhorn, a famous short seller and the Apple gadget fan, said in an interview with CNBC now housed a “depression” mentality that led to the treasury cash and only invest in safer, lower interest rates.

Apple almost went bankrupt in the 1990s before Steve Jobs returned and created a sensational turnaround, with products like the iPhone and iPad has become a must for consumers around the world. Near-death experience, the company has led Apple to be particularly conservative with his money.

Greenlight

said in its complaint that two proposals support, but do not get rid of the preference shares. Judge Einhorn preference shares superior to dividends or share buybacks and a separate proposal for issuance of preference shares of Apple with a constant 4 percent dividend.

But Apple proxy proposal is structured, Greenlight said shareholders “no other choice than two votes in favor of an amendment that they oppose, or against an amendment they support.”

Few prosecutions

was never submitted proposals difficult in the rules, a situation that some legal experts normally attributed to the nature of passive shareholders.

“In most cases you will not have much to complain consolidation to get,” said Brian Slipakoff, special advisor to the firm Duane Morris in Philadelphia.

In a trial a few partners, the 2nd U.S. Circuit Court of Appeals in New York in 1999 approved an implicit claim of the shareholder litigation alleging violations of the anti-group.

This precedent would

Einhorn store in the legal status of the case to court. The decision of the Court of Appeal was quoted by Greenlight in court documents filed Thursday added.

Francis Vasquez, an attorney with the law firm White & Case is not involved in the case, said that Apple could argue that because shareholder proposals in the proposal are two changes to the charter, they are well connected.

The Californian company has five proposals for a vote which is not disputed by Einhorn and requires no modification of the Statutes of Apple. These measures focus on issues such as the election of directors and executive compensation.

“first argument Apple will probably be:” Look, these are all the amendments that we have in place, they do not have to deal with other things, “said Vasquez.

date anti-consolidation rules in 1992 . John Coffee, a professor at Columbia Law School, said the idea was “to prevent corrupt directions shareholders with a sweetener to vote for a proposal they would otherwise reject. “

case Greenlight Capital LP, et al. V. Apple Inc, U.S. District Court, Southern District of New York, 13-900.