Feeds

Bloggers must reveal sources - judge

Tech scoops not in the public interest

  • alert
  • submit to reddit

SANS - Survey on application security programs

Apple won the green light to subpoena amateur publishers for their confidential sources, a Californian Judge ruled today. Apple Computer, which wants to discover who leaked product information to three web sites, can now proceed with its subpoena against one of the ISPs hosting two of the websites, Santa Clara county court Judge James Kleinberg has ruled, as well as the websites themselves.

"Unlike the whistleblower who discloses a health, safety or welfare hazard affecting all, or the government employee who reveals mismanagement or worse by our public officials, [the sites] are doing nothing more than feeding the public's insatiable desire for information," Kleinberg ruled.

A demand primarily stoked by the corporation itself, which wants as many members of the public as possible to buy its products - he failed to add.

Sidestepping the issue of whether amateurs deserved protection usually afforded to The Fourth Estate, Kleinberg wrote "Even if the movants are journalists, this is not the equivalent of a free pass." Kleinberg firmly defined the trade secret information as STOLEN property.

"The Court makes no findings as to the ultimate merits of Apple's claim, or any defenses to those claims," wrote the Judge. "Those issues remain for another day."

However the implications go far beyond the Swiftian debate of whether bloggers are journalists, an issue which exercises navel gazers in both fraternities.

"This is a broad-brush ruling that threatens journalists of all stripes," said Electronic Frontier Foundation legal director Cindy Cohn. The EFF is defending two of the sites, PowerPage and AppleInsider. ThinkSecret is being sued by Apple under trade secret legislation.

"Apple did not use this as a last resort, but did only a perfunctory investigation before going on to subpoena the journalists," said the EFF's Kurt Opsahl.

Writing at ZDNet Dan Farber warned that Apple founder Steve Jobs risked tarnishing his legacy by pursuing the confidential sources with such zeal. He has a point: journalists have longer memories than technophiliacs. Perhaps Jobs has given us something future historians will remember him by. ®

Related stories

Apple wins first round of 'secret' war
Apple founder urges company to drop bullying lawsuits
Apple suspends online hack subpoenas
Apple sues three journalists for emails
Casualties mount in Apple vs customers war
Mac rumour sites get it completely right

3 Big data security analytics techniques

More from The Register

next story
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Audio fans, prepare yourself for the Second Coming ... of Blu-ray
High Fidelity Pure Audio – is this what your ears have been waiting for?
Record labels sue Pandora over vintage song royalties
Companies want payout on recordings made before 1972
MtGox chief Karpelès refuses to come to US for g-men's grilling
Bitcoin baron says he needs another lawyer for FinCEN chat
Number crunching suggests Yahoo! US is worth less than nothing
China and Japan holdings worth more than entire company
Zucker punched: Google gobbles Facebook-wooed Titan Aerospace
Up, up and away in my beautiful balloon flying broadband-bot
Apple DOMINATES the Valley, rakes in more profit than Google, HP, Intel, Cisco COMBINED
Cook & Co. also pay more taxes than those four worthies PLUS eBay and Oracle
prev story

Whitepapers

Securing web applications made simple and scalable
In this whitepaper learn how automated security testing can provide a simple and scalable way to protect your web applications.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Top three mobile application threats
Learn about three of the top mobile application security threats facing businesses today and recommendations on how to mitigate the risk.
Combat fraud and increase customer satisfaction
Based on their experience using HP ArcSight Enterprise Security Manager for IT security operations, Finansbank moved to HP ArcSight ESM for fraud management.