1.Max Farrand,ed.,The Records of the Federal Convention of 1787(New Haven,CT:Yale University Press,1911),3∶85.
2.我们招募调查员和前检察官的初衷是进行防伪打假,处理涉及新技术的犯罪活动,而反数字犯罪部门(DCU)则是我们在打假的基础上向外迈出的第一步。从此,DCU的发展几乎从未停歇。一个关键的转折点出现在21世纪初,当时多伦多警察局局长来到雷德蒙德。他当时的任务是说服我们做出重大投资,帮助警方打击世界各地的儿童色情和性犯罪。下楼去会议室与他会面的时候,我还很笃定地认为我们的预算没有足够的余量来承担这个新任务。但在90分钟后我们结束会面时,我确信我们已别无选择,只能帮助减少网络性犯罪这个迄今为止仍然是互联网时代最可怕的产物。我们削减了其他地方的开支,成立了新的DCU团队,从那时起,这个团队就运用科技和法律手段相结合的方法来帮助保护儿童。
2008年,我们中的一些人访问了首尔,韩国政府人员带我参观了韩国打击网络犯罪指挥总部。他们的团队给我们留下了深刻的印象,更让我们印象深刻的是他们先进的设施,比我们总部的所有设备都好。我们回来后,决定为DCU创建一个专门的网络犯罪中心,为我们在雷德蒙德园区的工作提供世界一流的工具和资源。我们还提供了单独的专用办公空间,当DCU与执法部门或其他团体开展联合行动时,来访的调查员和律师可以使用这些办公空间。
到2012年,DCU创新了许多新方法来应对网络罪犯利用“僵尸网络”感染和控制全球个人电脑的问题。Nick Wingfield and Nicole Perlroth,“Microsoft Raids Tackle Internet Crime,”New York Times,2012年3月26日,https://www.nytimes.com/2012/03/26/technology/microsoft-raids-tackle-onlinecrime.html。DCU的律师理查德·博斯科维奇率先发展出控制这些组织指挥和控制服务器的法律技术,其依据来自商标侵权的论点和更古老的防止“侵犯动产”的法律概念。我一直觉得这有点好笑。我们对计算机的保护源于英国首先形成的法律原则,而这项原则的部分初衷是为了保护牛。
就在前不久,DCU又接受了一项挑战,打击欺诈和骚扰电话以及其他科技诈骗行为,这些人试图让居家生活的人们相信,他们的个人电脑或智能手机受到感染,需要花钱安装新的安全软件来修复。微软助理总法律顾问考特尼·格雷戈领导了一项创新性的工作,将我们带到了印度和世界其他地方,从源头上解决了这些问题。Courtney Gregoire,“New Breakthroughs in Combatting Tech Support Scams,”Microsoft on the Issues(blog),Microsoft,2018年11月28日,https://blogs.microsoft.com/on-the-issues/2018/11/29/new-breakthroughs-incombatting-tech-support-scams/。
3.Brandi Buchman,“Microsoft Turns to Court to Break Hacker Ring,”Courthouse News Service,August 10,2016,https://www.courthousenews.com/microsoft-turns-to-court-to-break-hacker-ring/.
4.April Glaser,“Here Is What We Know About Russia and the DNC Hack,”Wired,July 27,2016,https://www.wired.com/2016/07/heres-know-russiadnc-hack/.
5.Alex Hern,“Macron Hackers Linked to Russian-Affiliated Group Behind US Attack,”Guardian,May 8,2017,https://www.theguardian.com/world/2017/may/08/macron-hackers-linked-to-russian-affiliated-group-behind-us-attack.(www.xing528.com)
6.Kevin Poulsen and Andrew Desiderio,“Russian Hackers'New Target:A Vulnerable Democratic Senator,”Daily Beast,July 26,2018,https://www.thedailybeast.corn/russian-hackers-new-target-a-vulnerable-democraticsenator?ref=scroll.
7.Griffin Connolly,“Claire McCaskill Hackers Left Behind Clumsy Evidence That They Were Russian,”Roll Call,August 23,2018,https://www.rollcall.com/news/politics/mccaskill-hackers-evidence-russian.
8.Tom Burt,“Protecting Democracy with Microsoft Account Guard,”Microsoft on the Issues(blog),Microsoft,August 20,2018,https://blogs.microsoft.com/on-the-issues/2018/08/20/protecting-democracy-with-microsoftaccountguard/.
9.Brad Smith,“We Are Taking New Steps Against Broadening Threats to Democracy,”Microsoft on the Issues(blog),Microsoft,August 20,2018,https://blogs.microsoft.com/on-the-issues/2018/08/20/we-are-taking-newsteps-against-broadening-threats-to-democracy/.
10.Brad Smith,“Microsoft Sounds Alarm on Russian Hacking Attempts,”interview by AmnaNawaz,PBS News Hour,August 22,2018,https://www.pbs.org/newshour/show/microsoft-sounds-alarm-on-russian-hackingattempts.
11.“Moscow:Microsoft's Claim of Russian Meddling Designed to Exert Political Effect,”Sputnik International,August 21,2018,https://sputniknews.com/us/201808211067354346-us-microsoft-hackers/.
12.Tom Burt,“Protecting Democratic Elections Through Secure,Verifiable Voting,”Microsoft onthe Issues(blog),May 6,2019,https://blogs.microsoft.com/on-the-issues/2019/05/06/protecting-democratic-elections-throughsecure-verifiable-voting/.
免责声明:以上内容源自网络,版权归原作者所有,如有侵犯您的原创版权请告知,我们将尽快删除相关内容。