decoration decoration
Stories

GROKLAW
When you want to know more...
decoration
For layout only
Home
Archives
Site Map
Search
About Groklaw
Awards
Legal Research
Timelines
ApplevSamsung
ApplevSamsung p.2
ArchiveExplorer
Autozone
Bilski
Cases
Cast: Lawyers
Comes v. MS
Contracts/Documents
Courts
DRM
Gordon v MS
GPL
Grokdoc
HTML How To
IPI v RH
IV v. Google
Legal Docs
Lodsys
MS Litigations
MSvB&N
News Picks
Novell v. MS
Novell-MS Deal
ODF/OOXML
OOXML Appeals
OraclevGoogle
Patents
ProjectMonterey
Psystar
Quote Database
Red Hat v SCO
Salus Book
SCEA v Hotz
SCO Appeals
SCO Bankruptcy
SCO Financials
SCO Overview
SCO v IBM
SCO v Novell
SCO:Soup2Nuts
SCOsource
Sean Daly
Software Patents
Switch to Linux
Transcripts
Unix Books

Gear

Groklaw Gear

Click here to send an email to the editor of this weblog.


You won't find me on Facebook


Donate

Donate Paypal


No Legal Advice

The information on Groklaw is not intended to constitute legal advice. While Mark is a lawyer and he has asked other lawyers and law students to contribute articles, all of these articles are offered to help educate, not to provide specific legal advice. They are not your lawyers.

Here's Groklaw's comments policy.


What's New

STORIES
No new stories

COMMENTS last 48 hrs
No new comments


Sponsors

Hosting:
hosted by ibiblio

On servers donated to ibiblio by AMD.

Webmaster
HP Hearings Live Now - Dunn: The Buck Didn't Stop with Her; Hurd: I Am Responsible for HP, but I'm a Busy Man
Thursday, September 28 2006 @ 01:51 PM EDT

If you wish to listen to the HP hearings before the House Energy and Commerce Committee, go here if you have Real Player. It's live. Patricia Dunn and Larry Sonsini are answering questions now.

Dunn, Sonsini, Adler Testimony

Fred Adler, an HP computer security investigator, has just testified that it was his idea to use the tracker email. HP has used it before, but never before in connection with internal leaks. He's been with HP around 3 years, and they've used it maybe two dozen times. Ms. Dunn testified that Adler's email about the matter was not sent to her, and she said, "It is surprising that it is legal."

Sonsini has now testified that when he wrote to Tom Perkins he was doing so after being asked to respond to him by Ann Baskins. When he wrote that HP's investigation was legal and well done, he was relying on HP's representations. He had done no investigation himself at that point. He's not an expert on pretexting. He didn't at that point know about the California statutes. Later, in August, when he did his own investigation, beginning August 9th, he reached a different conclusion.

Dunn says she was not in charge of the investigation. 7 of the 9 board members said to do it. She was briefed three times. She believes pretexting is wrong. She thinks the word pretexting is itself a pretext, meant to confuse. In April or May, she was informed that phone records were obtained by Mr. DeLia.

She is now being asked if she accepts any responsibility. Dunn says her statement says she deeply regrets. But does she accept culpability? Is she at fault? "If I knew then what I knew now, I would have done things differently." But she relied on reasonable representations of management. She says she does not accept responsibility for what happened. She was asked to resign, in her view because the intense press reaction made her a distraction.

There was an email from investigator Vince Nye warning that the tactics used were unethical if not illegal, and it is being read to her. She first heard about concerns from anyone only a week or so ago, she claims. You can read about the email and portions of it here in International Herald Tribune's coverage:

A senior investigator for the company was warning early this year, as the operation entered a crucial phase, that the pretexting techniques being used were "very unethical at the least, and quite likely illegal."

Saying that the practices, even if legal, "could damage our reputation or worse," the investigator, Vince Nye, said in an e-mail message,2 "I think we need to refocus our strategy and proceed on the high-ground course." Mr. Nye worked in the company's global security unit.

Adler knows of no other instance of pretexting. He went to Mr. O'Neill (Mr. Gentilucci wouldn't listen to him, I believe he started to try to say before being interrupted) with concerns when Adler found out.

Sonsini says the press got one thing wrong. He never said pretexting is legal. His email to Perkins was after getting two written reports, from Baskins and Hunsaker, and when he wrote that it "appears" it was legal, it was not his opinion he was offering.

Dunn says Mr. DeLia had worked almost exclusively for HP for 8 or 9 years, but neither she, Sonsini and Adler say they don't know if he ever used pretexting before.

Did HP engage in corporate spying against competitors? None knows of any. Dunn knows nothing about any investigations outside of Kona I and II. Ann Baskins leaves with a $3.6 million umbrella. Here's the 8K. She is asked if HP's 8K filed yesterday1 is accurate. She says it is not and she's asked her attorney to so inform the company. Asked what the evidence against George Keyworth is, she says it's in Kevin Hunsaker's report. Asked to summarize, she says that there were 10 leaks, and 7 of them were eventually linked to Keyworth. So there appears to be a leaker still there, or leakers.

Adler says HP uses tracking email as standard practice. Mr. Sonsini gives his opinion that, given what he knows now, tracking email seems an inappropriate technique. He didn't know about tracking email. He also didn't know HP was investigating family members of board members. He feels it's wrong.

Dunn is shown emails cc'd to her about sending phony tips from a phony employee, "Jacob", and she says she regrets that she called Hunsaker's idea "clever". But she knew about this aspect of the investigation. But she felt she wasn't the right person to approve or not. The "it's not my job" defense. The Colorado Congresswoman, Diana DeGette, says she thinks that, while jail isn't likely in this instance, it could be later for another company, if everyone says, "I'm not responsible, because it's not in my chain of command."

Dunn did ask about the legality about obtaining phone records. But she claims she didn't know that the fraudulent use of identify was used to obtain those records. How did she think they got the records? She thought they were publicly available, due to the administrative sloppiness of the phone companies. Dunn testified that DeLia told her that it was legal. It was common practice in HP, she says she thought, to obtain the phone records. She and Sonsini disagree about whether she made that statement about sloppiness in the investigative interview done by Sonsini's firm. She says Hunsaker was in charge of Kona II, not her, and Ann Baskins was the final say. And Baskins reported to no one? She reported to Hurd, Dunn testifies.

In Sonsini's email to Perkins, who did he consult with in order to answer Perkins? Baskins. He got also a report from Hunsaker. He made no independent judgment, but relied on them. Outside counsell did not research as to whether pretexting was legal at that time. There was a crisis, because leaking from the board room is a crisis. But he wasn't giving his own legal opinion in that email. He was passing on information.

Dunn is asked about Kevin Hunsaker's email of Feb. 24, 2006 to Vincent Nye, Adler, Anthony, DeLia, and Gentilucci, in which he said he had just talked to her and she wanted to know all resources and techniques used by them. Did she have that conversation? She says she can't remember it, but she has no reason to doubt it happened. But in large corporations, sometimes people say things to give their agenda their own momentum. But she doesn't recall.

Dunn is now being asked, "Where does the buck stop in HP?" Where is the person who is saying, "I was in charge." Dunn says some of those people have just declined to testify and that is frustrating to us all."

Was Mr. Hurd aware of the phony tracking email? Did he "That doesn't feel like what happened," Dunn says. The team was devising methods to be confident they had identified the right person. "I don't know how Mark responded per se," she says. She declines to answer whether he was involved in approving the tracking email, because "it would be hearsay. That's a question for him to answer."

Adler says it's not contemporaneous, email tracking, so that's why it isn't like a wire tap. But he describes the system (readnotify.com.), that as soon as the email is opened, a report is sent to the agency that traces. Isn't that contemporaneous? He says no. Would HP send an email to a customer? It was and is HP policy to use this technology, he testifies. HP doesn't send such emails to customers. There is no information derived other than the IP address where the email is sent. They suspected CNET would have sent to Keyworth. The only information they would have gotten back, he says, would be his IP address. Is there an internal policy that prevents sending an email to a customers or partners? Adler says he would think it would violate HP's standards. Which one? He says he doesn't have them in front of him. Sonsini is asked if it is legal to track email like this? Sonsini says the law isn't as clear as it should be, but depending on how it is used, it might have state or federal implications. Should there be legislation? Sonsini believes so. It should be made more clear.

Dunn says becoming a director means you waive some privacy rights. But as to the privacy rights of journalists, she doesn't know who on her level or Hurd's level made the decision to include them, nonHP individuals, in the investigation. Adler is asked how often nonHP individuals have been investigated this way. Two occasions, he answers, one of them being Ms. Kawamoto at CNET. But he knows his coworkers have also used it on nonHP individuals. One or two dozen times, he thinks.

They read an email from Hunsaker in January of this year, in which he asks if they can lawfully get IM records, or whether it is like cell phones. Doesn't that imply that he already knew it was illegal to get cell records. Sonsini says it might mean that. Adler believes it is illegal right now.

Mark Hurd is now called as a witness.

Hurd Testimony

First he reads his opening statement [PDF], which was released yesterday. He is asked who was part of the investigative team in charge? The folks that have resigned. He says Dunn asked if she could use HP resources to investigate, and he said yes, and that is how Kona II came to be. He didn't paid attention to the details. He has to choose where he digs for detail. During his tenure, there weren't many significant leaks, so he wasn't as concerned as some with more history with HP.

He didn't know about digging in people's trash, pretexting family members. He knew about the Jacob plan. He agreed with it, that it was appropriate to find the leak. With the benefit of hindsight, he wouldn't do it again. He never saw any information about that. Dunn never brought any worries about ethics to him. He never got a senior management briefing on the techniques he is shown. Then he is asked about an Ann Baskins email about Jacob. Dunn testified that they'd need to get Hurd approval. Hurd says he possibly could have seen the emails about the Jacob strategy. He remembers the content and did agree with the content. Tab 72, the draft of the investigation report, which he didn't read because it was the day of his shareholder meeting. He didn't read it. He knows that Dunn was concerned about leaks. But Hurd says the leak was not the number one CEO priority.

He is asked if he's seen this kind of investigation before in corporate America. He says he's never seen anything like this. He didn't catch it, despite red flags. Part of it was attention to details. But there's another aspect. They have maybe 150,000 employees. The CEO can't be the backstop for everything that goes on.

Was it Ann Baskin? Hurd? Dunn indicated that. Hurd says he's responsible for the company. Dunn, he says, appropriately was concerned about the leak. She then was "the business owner" to go execute, after he gave her permission to go forward with HP resources.

Did he think anyone could get phone records, the way Dunn says she did? He can't comment, and he never really thought about it. He wouldn't want someone without his permission getting his cell phone records or bills. Then he is directed to Tab 77, where Perkins called him to ask how the investigation was going. Hurd at the time answered that there was a lot of circumstantial evidence but didn't know where it would go. Hurd doesn't remember that phone call. Did he ever ask how they got the information? "I should have." Who should have asked this question and didn't? Nye and Adler said it wasn't right. Hurd admits he should have been able to catch it, but he didn't. HP is now out that pretexting should be made illegal. It already is unethical.

He is asked about current corporate policy re email tracking of nonHP individuals. Hurd is not intimate with that tracer technology, but he's reviewing such matters now, to go through that in every investigation HP is behving appropriately going forward. He has no knowledge of it being used against any nonHP individuals outside of Kona. HP has been and is a leader in privacy. This was an aberration. The AT&T letter describing what happened was the first time he realized that it was wrong. He didn't know what pretexting was. As of now, no pretexting is permitted. Spyware ... he'll look at every use of send/receive technology to make sure nothing inappropriate happens. HP has terminated all contracts with the outside investigators.

Where did the reports on the investigation go? He says, to the team. He doesn't know of anyone higher. Asked about the tracking email, they knew the reporter would have to verify the false info in the email, so that was the plan. Yet Hurd says he doesn't remember knowing about the tracer aspect of the email. He doesn't recall any discussions.

On the original 8K, Hurd wasn't a party to the Perkins-Sonsini phone call about why he quit, he says. The 8K was based on what happened in the board room and the later phone call. Hurd was at the meeting, but he wasn't a party to the phone call. The 8K was based on those two things. He says HP is going to get this right.

Ed Whitfield, who chaired the hearing, praised Vince Nye, saying he should be rewarded, perhaps with at least the day off.

There will eventually be a transcript available here, in about two months, maybe three.

Update: The Washington Post has a partial transcript available now here.


Footnotes:

1The 8K reads like this:

Item 8.01. Other Events.

On September 6, 2006, HP filed a Current Report on Form 8-K to provide information relating to the investigation of leaks of confidential information from meetings of the HP Board of Directors and subsequent events. Since the filing of the September 6th Form 8-K, HP, with the assistance of outside counsel, has conducted an in-depth review of the events surrounding the investigation of the board leaks in order to obtain a more comprehensive understanding of the underlying facts. HP is filing this Form 8-K in order to supplement the disclosures included in the September 6th Form 8-K.

Kona I

* The first phase of the leak investigation, referred to as Kona I, was commenced in early 2005 in response to a series of leaks of confidential company information. HP Chairman Patricia Dunn contacted Security Outsourcing Solutions, Inc. (“SOS”) to perform investigative work. HP had a longstanding contractual relationship with SOS.

* For the first month or so of the investigation, Ms. Dunn worked directly with Ron DeLia from SOS. The investigation focused on attempting to find the source of the leaks to various Business Week, Wall Street Journal and New York Times journalists.

* Two months after the commencement of Kona I, HP Global Security was brought in to assist with the investigation.

* On June 15, 2005, Ms. Dunn and Ann Baskins, HP General Counsel, attended a telephonic meeting with Mr. DeLia where the term “pretext” was mentioned.

* At a July 22, 2005, meeting, SOS reported on the findings of the investigation. We believe that meeting was attended by Ms. Dunn; Ms. Baskins; Jim Fairbaugh, Tony Gentilucci, and Kevin Huska from HP Global Security; and Mr. DeLia. Mark Hurd, HP CEO and President, also briefly attended a portion of the meeting.

* Kona I concluded in the late summer of 2005 without uncovering the source of the leaks.

Kona II

* In late January of 2006, there were leaks of confidential information from a January 2006 board meeting that appeared in a January 23, 2006 CNET story. The investigation resumed following these additional leaks.

* The core investigative team behind Kona II was Mr. DeLia, Mr. Gentilucci, Vincent Nye of HP Global Security, Fred Adler of the HP IT Security Team, and Kevin Hunsaker, HP Senior Counsel.

* Mr. Hunsaker directed the Kona II investigation for HP.

* Ms. Dunn, Mr. Hurd, Ms. Baskins and Mr. Fairbaugh were made aware that the Kona II team was assembled and was beginning to identify the source of the leaks.

* Over the next three months, regular updates were provided by members of the investigation team to Ms. Dunn and, to a lesser extent, to Ms. Baskins.

* During the course of Kona II, certain members of the investigation team provided assurances that the techniques being used in the investigation were legal. Those assurances came from, among others, Mr. Hunsaker, SOS and SOS’s outside legal counsel in Massachusetts.

* In March 2006, the Kona II team prepared a draft report of the investigation that was addressed to Ms. Dunn, Mr. Hurd and Ms. Baskins. The report identified the source of the leaking and outlined the investigative techniques employed – including “pretexting” – with assurances that those techniques were lawful.

* In April 2006, HP provided a copy of the draft report to its outside corporate counsel for review and comment. The results of the investigation were reported at the May 18, 2006, board meeting. On May 24th, Mr. Hunsaker produced a final report of the investigation.

Investigative techniques used

* Four principal methods were used to conduct the investigation: obtaining telephone and facsimile call information through “pretexting;” the use of social security numbers to obtain phone call information through “pretexting;” sending an e-mail that had an attached tracing mechanism; and the surveillance of individuals.

* These techniques were used in addition to traditional investigatory techniques, such as the review of other articles written by the journalists with access to the source of the leak and a search of HP internal records.

Obtaining telephone call information through “pretexting”

* Information regarding hundreds of telephone calls was obtained through “pretexting.”

* We believe that SOS, directly or indirectly, obtained telephone (landline or cell) or facsimile call information through “pretexting” for two current HP employees, seven former or current HP board members (or their family members), and nine journalists (or their family members of some journalists). We believe that this activity was conducted by an outside investigator.

Use of social security numbers in order to obtain records and the involvement of HP employees in the “pretexting”

* In January 2006, a member of the core investigation team -– Tony Gentilucci –- provided an HP employee’s social security number to SOS. We believe this was done for the purpose of obtaining telephone call information through “pretexting.”

* In addition, in January 2006, SOS obtained and transmitted social security numbers to Action Research Group (ARG), the subcontractor SOS used to assist it in the investigation. We believe this was done for the purpose of obtaining telephone call information through “pretexting.” We have not yet ascertained what involvement, if any, HP employees had in obtaining and/or transmitting these social security numbers to SOS.

* At this point in our investigation, we believe that social security numbers were used for three journalists, three current or former HP board members, and one HP employee.

* We believe that, in March of 2006, SOS obtained and transmitted the social security number of one other journalist for the express purpose of obtaining telephone call information. We have not yet ascertained what involvement, if any, HP employees had in obtaining and/or transmitting this information to SOS.

Tracer

* In January 2006, the investigation team created an e-mail account with a fictitious name and used that e-mail account to send an e-mail containing a “tracer” to a journalist (a tracer can be used to obtain other information, such as IP addresses, of persons who download the tracer). The objective of the investigation team was to determine whether the journalist would forward the e-mail to her source and ultimately to determine the source of the leaks of HP confidential information.

* The investigation team prepared the e-mail account and message so that the message appeared to be coming from a disgruntled senior executive who was willing to share information with the journalist. The e-mail to the journalist provided what appeared to be confidential information.

* At this point in our investigation, we believe the evidence suggests that the investigation team never received any confirmation that the tracer was activated, even though it did receive e-mail messages from the journalist.

* The concept of sending the misinformation to the reporter and the content of the misinformation to be contained in the message of the e-mail was approved by Mr. Hurd, but we do not believe that Mr. Hurd approved the use of the tracer.

Surveillance

* Members of SOS engaged in physical surveillance.

* In January 2006, SOS had an investigator conduct surveillance of a board meeting to determine if any journalists were seen at or around the site of the board meeting.

* In late January into early February of 2006, SOS had an investigator conduct surveillance of an HP Board member. These efforts included conducting surveillance of the Board member during his trip to Boulder, Colorado, where he was a keynote speaker at an event. SOS also conducted surveillance of him, his spouse and potentially other family members who were at the Board member’s residence in California at the time.

* In February 2006, SOS had an investigator conduct surveillance of a journalist and her residence.

* We also believe that, in February 2006, third party investigators may have conducted a search of individuals’ trash. However, at this time, we have been unable to identify the individuals targeted by these efforts.

2 "HP Whistelblower Foresaw Scandal," AP's Michael Liedtke, on Chron.com :

"This could be a 'smoking-gun' memo," said James Post, a Boston University professor specializing in corporate governance and business ethics. "There are red flags being raised all over it."

The next big question that needs to be answered is whether Nye's concerns were ever passed along to HP's leadership, Post said. HP's now-deposed Chairwoman Patricia Dunn and Chief Executive Officer Mark Hurd have maintained they didn't learn about the extreme measures that the company's detectives were deploying until recently.

Nye, a senior investigator for HP's Boston-based security unit, could help criminal investigators connect the dots as they try to figure out how much HP's leadership knew about the skullduggery, said Todd Bailey, a business law professor specializing in ethics at Miami University in Ohio.

"As sure as night follows day, the investigators are going to be lining up to talk to this guy," Bailey predicted.


  


HP Hearings Live Now - Dunn: The Buck Didn't Stop with Her; Hurd: I Am Responsible for HP, but I'm a Busy Man | 173 comments | Create New Account
Comments belong to whoever posts them. Please notify us of inappropriate comments.
OT here
Authored by: SpaceLifeForm on Thursday, September 28 2006 @ 02:19 PM EDT
Make any links clickable please.


---

You are being MICROattacked, from various angles, in a SOFT manner.

[ Reply to This | # ]

Minor correction...
Authored by: nlewis on Thursday, September 28 2006 @ 02:33 PM EDT
In the second paragraph: "...it was his idea to use the tracker
emai."

That should be "email", of course.

[ Reply to This | # ]

The CEO dichotomy
Authored by: Anonymous on Thursday, September 28 2006 @ 02:40 PM EDT
I usually don't generalize, but I've seen this story so many times (even before
Kenneth Lay) that I can't avoid being extremely frustrated and enraged...

CEOs are happy to accept the millions of dollars and all the credit when things
are done right (by others), but when they are not, we get this:

"She says she does not accept responsibility for what happened."

If I could say something to Ms. Dunn, it would be this:

You took the job, you took the money, you took credit for good things others did
under your command. Now it's time to be consistent and take the fall for this
debacle.

Well, let me dream...

[ Reply to This | # ]

NO idea it was illegal to pretext for phone records?
Authored by: thombone on Thursday, September 28 2006 @ 03:16 PM EDT
WOW, she's not a very good liar, is she!

I love how Mr. Walden is raking her over the coals right now.

[ Reply to This | # ]

Corrections Here
Authored by: rc on Thursday, September 28 2006 @ 03:38 PM EDT
Well, unless everybody goes to the 'minor correction' message above, in which case ignore this one...

rc

[ Reply to This | # ]

HP Hearings Live Now
Authored by: eric76 on Thursday, September 28 2006 @ 04:04 PM EDT

For tracking e-mail, they mentioned a website ReadNotify.com.

This is rather interesting as well: About.c om: ReadNotify

ReadNotify.com has a free trial. I'm tempted to sign up for the free trial and send e-mails to my own e-mail addresses to see what is actually there and whether or not they do anything on Linux and OpenBSD.

I wonder if this will impact ReadNotify's business. After this hearing, any major corporation has got to be on notice that using such systems may be questionable.

[ Reply to This | # ]

  • HP Hearings Live Now - Authored by: eric76 on Thursday, September 28 2006 @ 04:22 PM EDT
    • please... - Authored by: rc on Thursday, September 28 2006 @ 04:28 PM EDT
      • please... - Authored by: eric76 on Thursday, September 28 2006 @ 05:31 PM EDT
    • heh (n/t) - Authored by: Anonymous on Thursday, September 28 2006 @ 04:28 PM EDT
  • sounds like web-bugs - Authored by: Anonymous on Thursday, September 28 2006 @ 05:56 PM EDT
The 10 "leaks".
Authored by: Brian S. on Thursday, September 28 2006 @ 04:24 PM EDT

Only one has been identified.

What are the details of the other nine?

Which story in which publication?

I don't believe the only "leak" so far identified warrants that label.

George Keyworth was just doing his HP PR job as he understood it to be, backed by their active encouragement.

Were the pretexting and spying little more than part of a board power play?

Brian S.

[ Reply to This | # ]

"Tracking Email"?
Authored by: jmchugh on Thursday, September 28 2006 @ 04:25 PM EDT
I'm a little annoyed that no one is being specific about the "tracking
email" or "email tracer". I realize that Congress isn't elected
based on their understanding of technological matters, but if this is what it's
starting to sound like, I don't think it is that uncommon. This doesn't imply
that it is ethical or legal, but I would be suprised if it's not.

I'm by no means an expert, computers are merely a hobby, but I think this sort
of thing has been commonly used for years.

The first I heard of this was the insertion of a URL to a 1 pixel by 1 pixel
image file (usually 1x1.gif, so that it was transparent) in an email. The image
was placed on a server in a directory unique to that email. (That is to say
that the directory had a unique name that was only ever used in that one email.
An ID number if you will.)

When the email was opened (and if image downloading was enabled, and it usually
was by default 5 years ago) the image would be downloaded and the hit recorded
(w/ IP address) in the server logs. The end user wouldn't see a 1x1 transparent
image and would not know that there was a record of the email being opened. Not
only would a hit be recorded every time it was opened, the IP address would be
able to identify if the email was being opened from different locations (you
could tell if the email was forwarded).

This sounds exactly like what is currently being described.

About 2 years ago I signed up for a course at the MIT professional Institute.
Yes, that MIT; no, I don't have a degree from there, not even close.

The acceptance email and invoice both contained URLs in the following format:

http://professional.mit.edu/ApplicationFiles/admin/apps/email/email_viewed_actio
n.cfm?espid=xxxx

(Where xxx is a unique ID number, each email I received had a different
number.)

I only noticed because I had my email set to "plain text only". Upon
enabling images, there was no refrence to this URL anywhere in the email.

While I can see the value in them knowing that I received the email, and the 4
digit number implies that they have to recycle numbers occasionally, I was still
more than a little annoyed. Suffice to say that I resisted the temptation to
write a script to wget each of the 10,000 potential URLs every 3 hours for a
month (~1 URL/second).


If anyone knows more about this, please correct me/add more details.

John

[ Reply to This | # ]

Question about the workings of government
Authored by: tiger99 on Thursday, September 28 2006 @ 04:36 PM EDT
I don't want to get into party politics (anyway this seems not to be a one party thing), but don't know much about how the US government works, and am wondering why they are involved with the HP stuff so quickly, while the festering sore called software patents has been left for years. Any why, for that matter, does the SCO business not attract their attention? Or will it, once the trial is over?

It just seems to me to be a bit strange that things can move so fast, but only occasionally. It would be good if they could react as fast to various other important things too. Or can they, if they are prodded in the right place? It would be nice to see constructive interest, and maybe sensible action, on other issues....

[ Reply to This | # ]

Sonsini explained away his lies
Authored by: _Arthur on Thursday, September 28 2006 @ 04:40 PM EDT
Sonsini explained about 8 times how he came to provide Mr. Perkins to
entirely inaccurate (and false) information.

He told Perkins he would investigate, and came back to him 8 days later,
saying that "the practice appears to be legal", that only HP
employees were affected, and that Perkins fears were unfounded.

Sonsini now say that he was merely conveying the results of an internal HP
investigation as they were given to him, he wasn't giving legal advice or his
own opinions on the legalities.

Perkins was right to consider him deceiful, and his or HP's assurances
worthless.

_Arthur

[ Reply to This | # ]

Tracking emails
Authored by: Jude on Thursday, September 28 2006 @ 04:51 PM EDT
... There is no information derived other than the IP address where the email is sent. ...

OK, and how exactly do they make use of that information? Do they perhaps use
a little more "pretexting" to find out who it belongs to?

Heh. I can see it now:

Hello, ISP? I am the current user of IP address xxx.xxx.xxx.xxx. ... Yes, I swear
this is really me ... I really need you to tell me who I am.

[ Reply to This | # ]

Smoking Gun
Authored by: SilverWave on Thursday, September 28 2006 @ 05:36 PM EDT
Oh Dear...

Use of social security numbers in order to obtain records and the involvement of
HP employees in the “pretexting”

* In January 2006, a member of the core investigation team -– Tony Gentilucci –-
provided an HP employee’s social security number to SOS. We believe this was
done for the purpose of obtaining telephone call information through
“pretexting.”

* In addition, in January 2006, SOS obtained and transmitted social security
numbers to Action Research Group (ARG), the subcontractor SOS used to assist it
in the investigation. We believe this was done for the purpose of obtaining
telephone call information through “pretexting.” We have not yet ascertained
what involvement, if any, HP employees had in obtaining and/or transmitting
these social security numbers to SOS.

* At this point in our investigation, we believe that social security numbers
were used for three journalists, three current or former HP board members, and
one HP employee.

---
GPLv3: Eben Moglen explalined this well the new DRM clause just says that you
can't use technology to add restrictions that the licence doesn't allow.
coriorda

[ Reply to This | # ]

Reruns tonight
Authored by: eric76 on Thursday, September 28 2006 @ 06:29 PM EDT
C-SPAN 2 has reruns of the hearings tarting at 8 pm and again at 12:50 pm
eastern time.

Tomorrow's coverage on C-SPAN 3 is at 11 am eastern.

[ Reply to This | # ]

DeLia said he had a conversation with Dunn about "impersonation". Dunn denies it.
Authored by: Brian S. on Thursday, September 28 2006 @ 07:43 PM EDT

The former Hewlett-Packard chairwoman, Patricia C. Dunn, testified before a House panel today that she did not remember conversations in which a detective says he told her about the use of illegal tactics in pursuit of a leaker on the company’s board.....

When confronted by Representative Ed Whitfield of Kentucky, the chairman of the oversight and investigations subcommittee, with documents showing Mr. DeLia saying he had discussed “impersonation” with her, Ms. Dunn responded, “I have no recollection of a conversation with Mr. DeLia that included the word pretexting.” She later added, “I don’t agree with Mr. DeLia’s testimony.”...... New York Times


My emphasis.

It is also apparent that although Ronald Delia declined to give testimony today, he is however talking to important people behind the scenes. ISTM that Mr. Delia is a PI who "overstepped the mark", and as a result of these hearings his trade will find itself under greater regulation. However, it can be of no interest to him to involve himself in the HP plot.

He can walk away from this with little more than a slapped hand.



Brian S.

[ Reply to This | # ]

Verizon sues data brokers linked to HP
Authored by: Anonymous on Thursday, September 28 2006 @ 09:12 PM EDT
ZDNet
Verizon sues data brokers linked to HP
http://news.zdnet.com/2100-9584_22-6121056.html?tag=zdfd.newsfeed

Verizon Wireless sued 20 unnamed data brokers for
fraudulently obtaining private telephone records belonging
to Hewlett-Packard board members and journalists as part of
an HP investigation into boardroom leaks.
The lawsuit was filed in federal district court in
Trenton, N.J. on the same day current and former HP
executives were questioned by a congressional committee
about the techniques used in the investigation.

......

The president and vice chairman of Verizon, Larry Babbio,
is also a member of the HP board of directors.

[ Reply to This | # ]

How "Pretexting" is Done - A News Example
Authored by: Anonymous on Thursday, September 28 2006 @ 10:08 PM EDT
See the following link on how "pretexting" is done. The story is a news magazine's investigation into the subject last year (2005). In the story, the magazine obtained the records of Canada's Privacy Commissioner and dropped them on her desk.

MacLean's Magazine - You are exposed

The story states that the records are bought and sold through "data brokers". The "data brokers" in question operate in the US (and so are beyond the reach of Canadian law). The data broker which this story mentions was shut down earlier this year, but there are plenty more still in business.

Oh - and irony of ironies - when I viewed this article just now I saw an ad for an HP computer.

[ Reply to This | # ]

Mark Hurd's time at HP.
Authored by: Brian S. on Thursday, September 28 2006 @ 10:08 PM EDT

Just search on "HURD" on this page, default settings brings up about 50 stories charting the time of Mark Hurd at HP The Inquirer



A few caught my attention:

18 July 2005 Channel ‘safe’ as HP readies reorg

HP IS making reassuring noises to partners worried about their future as the vendor plans to cut thousands from its payroll...... Link


02 August 2005 HP axes Omaha

WORD HAS REACHED my tender ears that HP's first round of the 15K cuts will hit Omaha. The jobs will be shipped to Mexico, and as usual, customer service will go down the pan....This is the strategy that Carly used so effectively to run the company into the ground... Link


05 August 2005 HP cuts detailed

Well, actually, not all is going to Costa Rica, some is going to Guadalahara, a little more to Canada, and some to India, backlash be damned. The customer support knifings were announced by Mary Ellen Smith last week, but people were forced to shut up about it. Over the next year all customer service reps will go on permanent vacation, partner being first, followed by SMB, GEM and then Enterprise..... Link


20 October 2005 Hurd indicates HP direction, sort of

It looks like HP is not about to spin off its cash cow printer business. Nor is it to follow IBM’s lead and dump PC manufacture, however poor the margins..... Link


23 January 2006HP 'not buying' CSC after all

But now it looks like it was all media spin, with HP execs denying the whole thing. Shares in consulting firm CSC jumped following the rumour..... Link


03 March 2006Why Sun wants HP source

McNealy is coming over nice, suggesting in an open letter to HP’s new boss Mark Hurd that the firms merge Unixes to create a single operating system from Solaris and HP-UX...he starts out all smiles: "HP and Sun share a common history of innovation. We've both delivered terrific products over the years." then...the stiletto comes out.

"But HP has also made strategic decisions that compel its customers, developers and partners to change: ending development of your enterprise servers based on PA-RISC, and relegating your operating system, HP-UX, to Itanium."...... Link


04 April 2006 AMD gets boost from Steve Ballmer, Mark Hurd

Microsoft's Steve Ballmer and HP's Mark Hurd are participating in an AMD web event which shows how to increase capacity in data centres while keeping power consumption down..... Link



18 August 2006Carly Fiorina helped save HP

HP Chief Executive Mark Hurd is getting praise for the outfit’s recent successes, but analysts reckon some of it is to do with the Fiorina factor....After they got rid of her, Hurd continued to slash staff numbers, although in a slightly more understated way.... Link


A chip off the old block?

ISTM that Mark Hurd has carried on where Carly Fiorina left off.

I can't see the change in policy.

The leaks stopped and things went quiet whilst Mark Hurd was given a chance.

But it was more of the same, Perkins and Keyworth were still in the way and that lead to the events of earlier this year.



Brian S.

[ Reply to This | # ]

"Who's the Daddy?"
Authored by: cybervegan on Friday, September 29 2006 @ 05:30 AM EDT
Are HP exceptional in this regard, or do they just reflect the status quo?

That's what worries me the most - are these sorts of activities just
"business as usual" in large multinationals?

To me, this demonstrates that HP (and probably other companies like them)
consider their employees, and everyone that interacts nicates with them -
reporters, customers, partners - to be their "property", to be done
with as they wish.

I'm reminded of a Levellers song, "Who's the Daddy?" (aren't I always
;-)...

"Who's the Daddy,
Who's really in control?
Who's got your number?
And who owns your soul?"

regards,
-cybervegan

---
Software source code is a bit like underwear - you only want to show it off in
public if it's clean and tidy. Refusal could be due to embarrassment or shame...

[ Reply to This | # ]

HP - proud of breaking the rules ?
Authored by: Nigel on Friday, September 29 2006 @ 06:00 AM EDT
I've just had a flyer in the mail from a supplier pushing HP notebooks. The
title :

"HP Business notebooks - breaking all the rules!"

You couldn't make this up...

[ Reply to This | # ]

Why call it "pretexting"?
Authored by: rsmith on Friday, September 29 2006 @ 07:09 AM EDT
Pretending to be someone else to get at their private records sounds more like
"identity theft" to me.

---
Intellectual Property is an oxymoron.

[ Reply to This | # ]

Responsibility
Authored by: shiptar on Friday, September 29 2006 @ 08:47 AM EDT
It's amazing how absolutely no one is responsible for this. Lots of regret.
Ignorance of what is going on doesn't suddenly make you not responsible for the
things you ordered.

What is with america? This is prevalent throughout every part of its society.
It's not my fault should probably become the next amendment.

[ Reply to This | # ]

  • Responsibility - Authored by: Anonymous on Friday, September 29 2006 @ 12:05 PM EDT
  • Responsibility - Authored by: Anonymous on Friday, September 29 2006 @ 12:59 PM EDT
HP people take the Bart Simpson oath: "I didn't do it"................
Authored by: Anonymous on Friday, September 29 2006 @ 09:35 AM EDT
.........nobody saw it, you can't prove a thing."

Or perhaps the Gabbo defence, "I'm a bad widdew boy"

[ Reply to This | # ]

HP Hearings Live Now - Dunn: The Buck Didn't Stop with Her; Hurd: I Am Responsible for HP, but I
Authored by: Anonymous on Friday, September 29 2006 @ 10:45 AM EDT
I don't understand. Is the ordinary police being bypassed by these hearings? Not
many criminals are interrogated by Congress first.

Is this just because HP is a huge company that they get first-class treatment?



[ Reply to This | # ]

HP Hearings Live Now - Dunn: The Buck Didn't Stop with Her; Hurd: I Am Responsible for HP, but I
Authored by: Anonymous on Friday, September 29 2006 @ 11:11 AM EDT
Part of the testimony yesterday referred to a footnote in a report saying that
pretexting was among the legal methods used by law firms and others to obtain
phone records.

The question I would liked to have asked the lawyer is, "Short of subpoena
and the help of a court, what in your opinion are the legal methods law firms
and private investigators can use to obtain phone records?"

I suspect that there are none. Is that right?

[ Reply to This | # ]

Groklaw © Copyright 2003-2013 Pamela Jones.
All trademarks and copyrights on this page are owned by their respective owners.
Comments are owned by the individual posters.

PJ's articles are licensed under a Creative Commons License. ( Details )