Chapter 97 – Cyber Hygiene Checklist

October is National Cyber Security Awareness Month in the United States and you can check out lots of great content by going to #CyberAware on Twitter or to my team’s #CyberAvengers content. As my contribution to #CyberAware, I hope you find the following checklist to be helpful and all I ask of you in return is […]

via Good Cyber Hygiene Checklist for #CyberAware National Cyber Security Awareness Month — Business Cyber Risk Blog

Advertisements

Chapter 96 – Hacking Into A Company You Sold Can Get You Jail Time

Business Cyber Risk Blog

A federal judge sentenced David Kent to a year and a day in prison and ordered him to pay $3.3 million in restitution and pay a $20,000 fine for accessing the computer network of Rigzone.com, an industry-specific networking website. Kent founded Rigzone.com, sold it for $51 million, and after the sale accessed the company’s network to obtain information to use for launching a competitor to Rigzone.com. The Complaint describes how Kent was able to do this by exploiting a source code vulnerability that he knew of from the original creation of the website. This is a big no-no. Under the Computer Fraud and Abuse Act, this type of unauthorized access is considered hacking just as if the Russians did it with super-secret James Bond-like gadgets and gizmos.

USA v. Kent, 1:16-cr-00385, U.S. District Court for the Southern District of New York

View original post

Chapter 95 – Two Year Statute of Limitations for Computer Fraud and Abuse Act Accrued When Plaintiff “Suspected” Wrongdoing

Business Cyber Risk Blog

SEE NEW POST UPDATING THIS CASE:  Computer Fraud and Abuse Act Limitations Accrued With Awareness of Unauthorized Access–Not Identity of Perpetrator

There have not been many Computer Fraud and Abuse Act cases where the statute of limitations has been a key issue in the case so there are not many cases that have analyzed the issue. A new one just came out on January 2, 2013. In the case Higgins v. NMI Enterprises, Inc., 2013 WL 27556 (E.D. La. Jan. 2, 2013), the court offers a fairly detailed analysis of the applicable two year statute of limitations and ultimately decides to grant a Motion to Dismiss based thereon.

The Computer Fraud and Abuse Act has a two year statute of limitations that runs from “the date of the act complained of or the date of the discovery of the damage.” In Higgins, the Plaintiffs claimed that, while they “suspected” some…

View original post 186 more words

Chapter 94 – Managing Third Party Cybersecurity Risk

Third-party risk (or nth-party risk) is a hot topic in cybersecurity. While it can mean many things, at its core third-party risk describes a situation in which an organization that does a good job of protecting its own network and data, within its environment, works with other organizations that do not do such a good […]

via Third-Party Risk in Cybersecurity Exemplified by North Korea’s Stealing of US War Plans — Business Cyber Risk Blog

Chapter 93- Inserting Facts to Fit a Legal Opinion

Introduction

My journey over the last five years has through some effort allowed me to gain enough knowledge of legal maneuvering to recognize an adjudicator’s first role of deceit, should he choose that path, which is to establish a record of fact. Then, even if that record of fact is completely unfounded based on the evidence, an opinion can be rendered rooted soundly in the law.

This analysis must also clearly identify areas of malpractice, topics that should have been identified and worthy of appeal to the 9th Circuit.

History

On October 2, 2003 an IT manager of a company I owned was fired shortly after he attempted to extort a raise by withholding data files from one of our clients. That data required processing and part of his leverage was refusing to do that processing unless he received that raise and his past transgressions were forgiven.

Once the data was processed and files transmitted he was terminated in writing and with enough notice (45 days) to allow him to start looking for a job. I felt it best to work with him for his future good and mutually for the good of the company. But there were conditions and those conditions were the documentation and training necessary to pass the torch to his successor.

Instead we found ourselves in a tug of war. His self-perceived task was to withhold our database and reporting programs so that he could use that to retain his job. Our task was to secure the programming and to ensure we would not be hurt any further. He succeeded. We did not.

Three week after his termination I received an email from this manager, let’s call him Max, purporting that he received an excel spreadsheet via email from another employee of an affiliated company from which he deduced that the company was over-billing clients. The amount of over-billing the spreadsheet documented was approximately $400. The amount of revenue for the affiliate that month was approximately $400,000.

Max refused to provide the email from which he claimed to receive that spreadsheet. He did encourage an attorney in Albany Oregon to file a complaint on his behalf to the Oregon Department of Justice. That attorney, James Egan, is now an Oregon Appeals Court Judge. The ODJ requested evidence. None was provided. I was contacted and conveyed the context and termination of Max. The ODJ file was closed.

The complaint did not work but Max was resolved. He withheld our programming and after his last day the company had to shut down just before thanksgiving resulting in 150 employees being laid-off. A third party was hired to come in, look for the programming and if necessary recreate it with instruction. Took about 10 days and cost the affiliated companies just over $100,000.

Make no mistake about it. This was a criminal act perpetrated by Max and his co-conspirators. Today, given the greater attention given these cybercrimes, Max may well have been prosecuted. In 2003, no law enforcement agency wanted to touch it.

 

The District Court’s Assumption of Facts

  1. “NDT asserts that it terminated Zweizig with 45 days’ notice, via an email message dated October 2, 2003. In support of this assertion, NDT relied at arbitration on a hard copy of theemail message purportedly effecting Zweizig’s termination, bearing the date October 2, 2003.”

 Not True.  NDT provided the digital copy of the email and the computer on which it was transmitted for evaluation by forensic experts. All forensic experts agreed that the email was sent on October 2, 2003, well before the complaint.

  1. “It is undisputed that on October 23, 2003, Zweizig contacted Rote to advise him that he had received via email a spreadsheet suggesting that NDT was systematically over-billing some of its clients. Zweizig requested that Rote investigate the matter, which he characterized as potentially illegal conduct. Zweizig retained Oregon counsel in connection with the matter on October 28, 2003. That same day, Zweizig’s counsel referred the matter to the Oregon Department of Justice by letter, setting forth all of the underlying facts, and providing a copy of the letter to Rote.

Not True. There was no evidence of systematic over-billing. In fact the arbitrator opined on the record that there was no evidence of wrong doing by NDT. This fails to state that the ODJ requested evidence supporting Zweizig’s claims, that the letter did not outline all the facts and that the ODJ shut the file down a few days after it opened it, once it determined that Zweizig was fired before the complaint and that he had no evidence to provide. In fact, the spreadsheet was never corroborated and NDT denied ownership.  

  1. “It is further undisputed that on October 29, 2003, the day after Rote received the letter from Zweizig’s counsel, Rote began reassigning Zweizig’s employment duties. Rote ultimately terminated Zweizig’s employment effective November 14, 2003, although (as noted above) the parties dispute whether Rote noticed the termination prior or subsequent to his receipt of the ODOJ letter.”

Not true. Zweizig’s duties were being moved well before his termination of October 2, 2003 to the person identified as his replacement. The move was accelerated after September in response to Zweizig’s attempt to extort a raise.

   4.  “It is NDT’s position that, at the time of his termination, Zweizig reformatted two company computers that he had been using to perform his employment duties, effectively destroying certain work product proprietary to NDT. NDT further takes the position that the reformatting constituted spoliation of evidence, specifically the provenance of the spreadsheet reflecting the purported over-billing.

True and not true.

Zweizig withheld his email account from May 2003 through his last day of employment. The email account prior to that was on a discontinued hard drive, which Zweizig had claimed did not work. In order to cover up that this 120 gig hard drive had been working, he reformatted it and in that process of doing so destroyed his emails and FoxPro programs.

Zweizig’s email from May 2003 thru November 2003, and spreadsheet, should have been on the 60 gig hard drive he returned with his Sony Vaio computer, but no Zweizig email account was on that 60 gig hard drive. He testified that it was. He must have had a third hard drive where he maintained his email account, since he did provide hard copies of the emails (those he wanted to provide). At no time did he provide the email by which he claimed to receive the spreadsheet. That email and spreadsheet were never corroborated. The 60 gig hard drive should have also contained the active Foxpro programs, but were never found there nor on any of the other servers Max identified.

      5.  Crow made several representative conclusions that the court embraced:

A. “The parties are in disagreement about when the October 2, 2003, email was prepared and sent. The testimony of the experts leaves questions open about that controversy, but to the arbitrator it is difficult to harmonize this email with …one written by Mr. Rote just 80-90 hours earlier.”

Not true. All three experts agreed that the email was sent on October 2, 2003. There was no controversy. My email to Max, who wanted to walk out on his job before he processed 5 months of data and transmitted that to our client, was that he could walk if he wanted but I was not going to fire him at that time. He had hidden the files. No one knew where the data was but him. The police were called in. I did not fire him until after he processed & transmitted the data to our client and then only after I completed my investigation of responsibility for the delay in processing. Thereafter he was fired, on October 2, 2003. This is all part of the record.

          B. “The regular exchange of emails from October 2, 2003, do not suggest that [Zweizig] has been terminated, but rather are consistent with the expectation of continued employment. As late as October 23, 3003, Mr. Rote sent an email to [Zweizig]: “Hope all is OK Max. let me know if I can help.”

Not true. If you are not civil to employees, you are indicted for being abusive. If you understand and are supportive of the stress a termination causes, someone uses that to fit a narrative that he was not fired. This arbitrator used that to jump to an unfounded conclusion that the termination did not happen. That is an intellectually dishonest conclusion.

         C. “Only after the report by [Zweizig] of his concerns over the possibility of over charging and correspondence with the State of Oregon to that effect did Mr. Kawiuk start his search for emails trying to discredit [Zweizig] and did the correspondence between [Zweizig] and Mr. Rote take on the hint that termination was imminent.”

Not true. Mr. Kawiuk was the employee who notified me in 2002 that Zweizig and Bower were setting up a competing business and were prepared to solicit our clients. Zweizig and his attorney girlfriend had threatened to sue Kawiuk if he published that. Zweizig specifically alleged that the suggested over-billing scheme was the effort of Kawiuk, another untruth intended by Zweizig to resurrect his character at the cost of Kawiuk. Naturally, my email to everyone to preserve email involving Zweizig triggered a strong response in Kawiuk. That is not an indictment on the company, the employer.

 Again, an intellectually dishonest conclusion by arbitrator Crow to use Kawiuk’s emails to set a time of termination.  This was a spoon fed conclusion by Marshall.

 

The Narrative

While I was concerned about Crow during the arbitration, on being influenced by his former partner Marshall, I had little evidence other than (1) his failure to disclose the relationship, (2) his opening remarks to Marshall every day asking her to explain where they were in the process and (3) his interest in the Judge Jones hearing 10 years earlier (and related challenges to judicial activity). However, after he summarily dismissed our evidence there was no doubt that this was an act of retribution, supported by at least some belief in his former partner.

What do you say about an arbitrator, someone who is respected by his colleagues for his high moral character, who is falling asleep at the wheel? You respect him but you must not waive an appeal right just because you believe that his cognitive skills have seen better days. Moreover, when Marshall, his former partner, is committing one count of perjury after another, you have to call them out.

One of the more important elements to the case was Max’s considerable destruction to the companies programming infrastructure. Our programs were gone. That was confirmed by three witnesses and three forensic experts. And this crime by law terminated Max’s claims. Of all the actions taken by Crow in concert with Marshall, nothing is more stunning than Crow concluding that we did not preserve the evidence and therefore could not prove Max’s acts of destruction. Sure we did. Three witnesses were there when it happened in 2003, one of those the IT programmer who came in and regenerated the programs. One of our clients testified as a witness and confirmed that we did shut down over our inability to produce daily reports. The three Forensic experts concluded that not only were Foxpro programs form May 2003 through November 15, 2003 not there, but that the FoxPro software was not even loaded to Max’s computer until the day before he returned the computer to me. Zweizig’s testimony that he processed files from this computer and that the programming code was there was refuted in its totality.

The District Court skirted this question. Could they have looked at it? Certainly this damage should have been explored in detail, especially given our argument of bias. However, our attorney did not present this with the strength that I wanted and now looking back it seems clear this was a serious mistake. I would be reticent however to not point out that the District Court could have vacated the arbitration on this matter alone.

So what assumptions or conclusions by the District Court influenced their thinking on this case?

Well, first and foremost the arbitrator was a respected member of the legal community and it was hard for the court to see his cognitive deterioration. It was not hard for Marshall, who exploited it. The court gave him the benefit of evidenciary review, when in fact it did not happen.

Second, the court’s assumption that Max’s termination email was provided only in hard copy form was untrue and attributed to us what Max actually engaged in. We turned over my computer with the email in its native digital form. Three forensic experts examined the computer and email and determined it had been sent prior to the time Max filed his complaint. Three witnesses, plus three experts, all agreeing with the October 2, 2003 termination date. When evaluating bias, or in this case an inability by the arbitrator to evaluate the evidence, the aforementioned was material.

Third, the court did not adequately consider that Max engaged in a host of discovery violations designed to hide the truth. He kept his email account on a different hard drive and did not turn that over for review. There were two material issues there. First, the email terminating him and second, the email by which he claimed to receive the spreadsheet. His destruction of that email evidence should have allowed us an inference in our favor as to his receipt of the termination email.

Fourth, he did not turn over the email by which he claimed to have received the spreadsheet. Therefore, the spreadsheet was not corroborated and cannot be used as evidence. He had no proof. He had no justified reliance. Moreover, it looks to me that he broke into one of our servers and took an admin sheet tracking the write-down of time and used it to create write-ups to support his position.  The unauthorized access to our network searching for something to support his claim shows that he was already fired and seeking some leverage to reverse that conclusion.

Fifth and final point is that while the ASP did decide that Crow could continue as arbitrator, the District Court could review that decision because we preserved it. The ASP’s decision necessitated Crow continuing as arbitrator and the court could reverse that with or without considering Crow’s punitive behavior. Crow dismissing all of our evidence certainly supports a decision of apparent bias, since Crow had found all of these witnesses credible. Max’s own forensic expert testified in our favor!

Legal Malpractice

The most glaring of our attorney’s failures was allowing the “assumption” by the District Court, that the evidence of Max’s termination was only a hard copy of a termination email and letter, to go unchallenged. We covered the forensic conclusions extensively in our memorandum of support. Neither did Marshall skirt the existence of forensic reports in her Opposition to our Motion to Vacate. It is an unusual error to make and suggests to me that this was an act of reverse engineering of facts to support the confirmation of the award. The assumption itself negates even Crow’s statement that the forensic experts did not resolve this issue in his mind. And in so far as all three forensic experts agreed that the email was sent October 2, 2003, why this remained a point of confusion for Crow points to his incompetence or his bias. Ultimately, Crow would have needed to make a finding that we spoliated this evidence, which is not a position supported by law. Counsel should have challenged that assumption in a motion for reconsideration and/or through appeal to the 9th Circuit.

The second specific failure was allowing the arbitrator to dance around the question of spoliation in all its forms. Not only did this go to bias of the arbitrator but also to a manifest disregard of the law.

The arbitrator, without reference to spoliation, disallowed our losses from the shutdown, arguing that we did not preserve the evidence on the Sony Vaio, but of course that was not true. We looked for and could not find the Foxpro programs within hours of securing the computer. We hired an outside consultant who within days concluded the FoxPro programs were not there and flew out from Chicago to rewrite the programs. We did not pretend to shut down. We did and supplemented the evidence by testimony of five witnesses. Three forensic experts confirmed that there were no FoxPro reporting, database programs or processed files on that 60 gig hard drive. Moreover, they testified that the FoxPro program itself was not installed until the day before Max returned the computer. There were two points of interest to us on this point. The first is our damage claim for the loss and costs to rewrite programs and the second is that this action by Max cutoff his damages. Counsel failed to separate the two important components to destroying the FoxPro programs. Counsel failed to properly attack the arbitrator for essentially dismissing all the witness testimony and forensic evaluations on this issue. Even if the forensic experts were dismissed, the other witnesses provided absolute confirmation that the company’s owned programs were no where to be found. This was not just a question of manifest disregard for the law. It absolutely showed bias. Counsel failed to take this issue to the 9th Circuit.

Crow, without reference to spoliation, nonetheless decided to dismiss the forensic expert opinions about what they found even though none of them argued that evidence had been destroyed. He dismissed them after going on the record as to how important they were going to be. And so under an unstated theory of destruction of evidence, Crow found against us but allowed Max to get away with it. Max refused to provide an email by which he claimed he received the spreadsheet. He admitted to destroying his personal computer. He admitted to saving emails from May 2003 through November 2003, but refused to turn over the email file itself, choosing instead to provide scanned copies. All three experts agreed that he did not have an email account on the 60 gig hard drive. The abuse of this decision making was that we were tainted with a dismissal for not destroying evidence and Max was allowed to destroy evidence ad nauseam without an equal dismissal. He provided no proof. Counsel should have appealed and done a much better job of raising this issue in the District Court. Not only do we have bias and a manifest disregard of the law, but have a violation of public policy. Max engaged in cybercrime, computer fraud and violated the CFAA by destroying his email account.

More than anything else, counsel failed to make an appropriate amount of noise over what they knew was a breach of the public trust. The trust was first violated by the arbitrator, a former OR STATE BAR President and current Chair of the Discipline Board. Counsel was afraid to attack the decisions out of fear of retribution. I removed Scott Cliff over his failure to be aggressive on these issues while in the arbitration and not seeking a new arbitrator when he had reason to know that Crow was not up to the effort. Counsel’s failure on the motion to vacate however rests on the shoulder of Jeff Hasson, who should have challenged the facts introduced by the court to justify a decision to confirm. A motion for reconsideration was appropriate as was an appeal to the 9th Circuit.

 

Conclusion

It is decidedly difficult to reconcile the great faith one places in our federal court with a Judges casual introduction of facts not in evidence, the purpose of which appears to be to support a legal opinion. I have seen this in Denver and Clackamas County. The arbitrator’s decision was replete with some version of it. Our attorney should have attacked it, filing motions for reconsideration and otherwise creating a record for appeal. He did not.

The arbitrator’s version of this same tactic was to build an opinion around a few emails–rejecting all other emails, rejecting all witness testimony, rejecting forensic evidence and testimony, rejecting the former employee’s crimes—so he could provide an award beneficial to his former partner and friend. During the arbitration the arbitrator and his former partner were updating each other on their children, family health past and present, reminiscing about firm Christmas parties, their old firm, etc. The arbitrator’s duty to disclose this past relationship was ignored even when the issue was raised and preserved.

The court touched on this issue as we asked them to but ultimately decided that we had in our pleadings believed the arbitrator was an honest and fair man. And so we did before the opinion. After the opinion, not so much anymore.

What’s going on here Portland?

Until next time.

Chapter 92 – Sexual Harassment On Campus at University of Rochester

I’d like to believe that this just does not happen anymore, but then a case comes up and it just sets you back. For those engaged in meritorious claims let me just say you have my full and moral support.

There has been some reporting on this recent case and the University of Rochester appears to be taking a position that they have evaluated it and one must presume from their public statements found the internal complaints inconsistent.

Not long ago a sexual crime case was reported in Rolling Stone Magazine with statements by the victim about the assault leaving the reader wondering how that University could have been so incompetent in its investigation. Of course the report filed by the victim or victims with the University is private, at least until litigation begins. But that Rolling Stones story unraveled. The article was inaccurate, biased and shoddy journalism. It set back concerns for sexual assault on campuses, some considering the failed reporting of these crimes to be a national disgrace.

The University of Rochester intimated lack of support for the victims complaints, alluding to this Rolling Stones fiasco, meaning that the victim’s statements could not be corroborated or were otherwise inconsistent with other evidence. I suspect the victim’s complaint will be revealed in due time. It’s hard to reconcile the UR’s conclusion but neither do I believe they are being cavalier.

It’s early yet. The compliant to the EEOC is linked here 358502273-University-of-Rochester-Eeoc. Read on. It’s a very strong complaint.

CHAPTER 91 – A FORMER IT MANAGER FROM COLUMBIA SPORTSWEAR PLEADS GUILTY TO CYBER CRIMES

Michael Leeper of Tigard plead guilty to accessing Columbia Sportswear’s computer network some 700 times over a two year period after he resigned from Columbia and took a job with a Redmond Washington company. He was able to do this by creating a fictitious employee account in Columbia’s computer network, which he used to access Columbia’s network. He admitted to reviewing highly sensitive and confidential information.

“Unauthorized computer intrusion is a serious crime, and those that unlawfully gain sensitive or proprietary information must be held accountable for their illegal conduct,” said Billy J. Williams, U.S. attorney for the District of Oregon.

I have reached out to Billy Williams, but he has not returned my call or email. Naturally, the credibility that Columbia had with the FBI and U.S. Attorneys Office appears to be greater than most small businesses do. Here law enforcement investigated the crime even knowing that Columbia had filed a lawsuit against Leeper and his new employer.  That has not in my experience been the case. On more than one occasion the filing of a civil lawsuit has resulted in law enforcement in not wishing to spend resources on criminal prosecution. Thankfully, cyber crime is getting the exposure it needs and these out of control IT people are quickly being educated.

Leeper could face a fine of $250,000 and up to ten years in prison for this cyber crime. He will sentences in December by The Honorable Robert E. Jones. Hey Linda do you think I should send a letter of support to Judge Jones and referencing my companies like experience with Max?

Believe it or not, Leeper actually responded to the Civil case against him by claiming that Columbia knew he was illegally accessing and that he did no harm. Max claimed he did no harm. Well except for destroying evidence, computer programs, ruining thanksgiving for 150 people, forcing a shutdown, costing his employer hundreds of thousands of dollars,  compiling thousands of client records and saving them to his computer for re-sale, etc., yes Max like Leeper you and your comrade Chris did no harm. Where’s that emoji that’s a wink.

Within the context of illegal activity we have also addressed in this blog the destruction of emails and company owned computer programs, violations of the Computer Fraud and Abuse Act, and so much more. Max did so much more to hurt my company than Leeper did to Columbia. I wonder that the statute of limitation is? On new evidence?

“Corporate hacking has become big business — estimated to have cost the global economy $445 billion in 2016 alone. The hyper-competitive apparel and footwear world is particularly zealous about guarding its intellectual property, and senior employees are routinely required to sign non-disclosure and non-compete agreements” so says Oregonlive. Sandra I have to give you credit. Filing the fake wrongful discharge claim was a stroke of genius, based I presume on as assumption that the Oregon attorneys would exploit it and that the U.S. Attorneys would not pursue it. Things have changed.

Until next time.

 

CHAPTER 90 – THE SUMMARY OF EVIDENCE, PERJURY AND CYBER CRIME

And so we are off to a jury trial soon to determine if publishing the acts of a mad IT manager is protected because he made a fake whistle blower claim. I trust that in the absence of the perjury, destruction of evidence, cyber crime and fraud that a jury would decide that even a fake whistle blower deserves some protection. But in the case where there is 17 counts of perjury, where 150 people were laid off because of software destruction perpetrated by this mad man, where evidence was destroyed, etc., as outlined in detail here (CHAPTER 90) , I think the jury will think differently.

Cybercrime, also called computer crime, is any illegal activity that involves a computer or network-connected device, such as a mobile phone. The Department of Justice divides cybercrime into three categories: crimes in which the computing device is the target, for example, to gain network access; crimes in which the computer is used as a weapon, for example, to launch a denial of service (DoS) attack; and crimes in which the computer is used as an accessory to a crime, for example, using a computer to store illegally-obtained data.

Lets see where this takes us. It has all lead to the trial.

Until next time.

 

Chapter 89 – The Judge Says “Lets get a trial for this guilty bastard.”

I want to credit the Yale Law Journal and author Stratos Pahis for his article “Corruption in Our Courts: What It Looks Like and Where It Is Hidden.” You can find that article here Stratos-Pahis-Yale-2009.

However, the brazen abuses identified by Pahis is not what I want to address here today. Yes they are serious. Yes we need more oversight. No, the BAR Association will not play a role in protecting your interests in a credible judiciary. All true.

Exposure is necessary as is a call for recourse. The opportunity for judicial abuse is real.

What I want to address today are issues of bias and in particular bias by the judiciary against business. Why is it more frequent? Because most of our Judges do not ascend to judiciary positions through private practice. Most ascend through government service and most of these candidates through a District Attorney’s or U.S. Attorneys office. They have little experience with how difficult it is to build and sustain a business. They are not learned in economics, marketing, sales and finance.

While the DA office experience may be particularly relevant and in deed helpful in criminal trials, it does little to prepare the Judge for adjudicating business contract and wrongful termination lawsuits. In fact Judges coming through a DA’s office often see business executives as unjustly enriched through their business relationship and a worthy target to redistribute the wealth to those less fortunate. Not only is the enrichment assumption often invalid, but is patently irrelevant. And yet irrelevant is alive and well.

I was in a court room one time observing a case and heard one of my county Judges take a position contrary to the way a statute was interpreted and applied by the department of justice. The Judge claimed she knew the legislator who sponsored the bill and his intent in writing it. Now a lot happens to a bill before it becomes law. It is revised in committee, passed with testimony as to its meaning and intent, regulations issued on how to implement and case law on how to interpret it. This Judge set all of that aside to assist someone with whom she identified. That was 20 years ago and I have seen it many times since.

The American Bar Association Canon on Judicial Ethics can be found here. Consider this Canon that “Courts exist to promote justice, and thus to serve the public interest. Their administration should be speedy and careful. Every judge should at all times be alert in his rulings and in the conduct of the business of the court, so far as he can, to make it useful to litigants and to the community. He should avoid unconsciously falling into the attitude of mind that the litigants are made for the courts instead of the courts for the litigants. ”

Judges are human. They do not always filter their own bias and prejudices. Unexposed and given our attention to other threats to our society, we forget to look at our courts history of bias. As a layman it is difficult to get to know the historical bias of a Judge or arbitrator. Your attorney will not be helpful. You’ll need professional help and its out there. See here.

Business is under attack. And the trial has not started. Be active in your community. Judges run for re-election in most of our states. It’s a political process and as business owners we need to support candidates that have business experience. We aren’t looking for our own version of bias, but rather looking for balance.

This blog is an ongoing, revised and edited account of an arbitration experience this author had over a period of seven years. The arbitrator referred the defendant to his former partner. Neither disclosed this. The arbitrator, then a partner with Schwabe, is a former Oregon State Bar President and former Chairman of the Ethics Committee. His former partner and the defendant’s attorney is Linda Marshall.

Although the defendant destroyed a number of computer programs resulting in the companies shutdown, and layoff of 175 employees a week before thanksgiving. he prevailed.

Although the defendant was terminated a month before he fabricated a complaint, and that evidence was validated through forensic evaluation and witness testimony, he prevailed.

Although the defendant’s fabricated claim was based on a spreadsheet he claimed to have received in an email, he did not provide the email. His evidence was not corroborated. He destroyed his email account. He destroyed his computer. He prevailed.

Although the defendant asked us to investigate the evidence, he would not identify who sent the email to him. No evidence was found. He prevailed.

Although the defendant reformatted a hard drive on which computer programs were maintained, destruction constituting a Computer Fraud and Abuse Act Crime, law enforcement was reticent to pursue because litigation was initiated by both parties. The statute expired before the litigation ended. The defendant prevailed.

Although the defendant committed 13 counts of perjury, destroyed thousands of documents and dozens of computer programs, he prevailed.

I have been sued for bringing this story to you. What’s wrong with you Portland?

Chapter 88 – Why Can’t The Oregon State Bar Be Civil?

Over the course of  my thirty plus years in business as an owner of several companies, having been engaged in litigation defending those companies, I thought that the unethical behavior and decisions of some attorneys with whom I came in contact was their separate and unique behavior. It is not.

Moreover I believed that the written body of a code of ethics by the Oregon State Bar and the American Bar Association, would curtail the brazen violation of honestly in court. But it does not.

I believed that the BAR having a committee dedicated to evaluating complaints and removing those unethical ingrates from practicing law in our state would by way of exposure curtail common and material breaches of the same code of ethics. But it does not.

I believed that the Professional Liability Fund, a separate corporation owned by the BAR, would necessarily require that those law firms hired by the PLF to defend attorneys engaged in malpractice represent the highest ideals of the professional as outlined in the code of ethics. But it does not.

In my appeal of the dismissal of he defamation case against Marshall and Christiansen, a new reality is apparent…at least to me. The foremost is that in representing an attorney the PLF is willing to play in the gutter. While we are indoctrinated to believe that unrelated facts, both personal and transactional, should be excluded from consideration in a case, it is not so.

Consider this for example. I found out that Christiansen and Marshall contacted a Judge that I had applauded for his adeptness and concern for fairness some 15 years ago and in a case involving one of my companies. These two knuckleheads claimed I intended to hurt this Judge. As support for that position these two claimed I had been arrested for domestic violence and was otherwise unstable. The inference being that the Judge was in danger.

It’s bad enough that frick and frack did this. What has disappointed me beyond belief is that the PLF has picked up the torch and essentially took the same tactic. They accused me just as their clients did citing grossly misleading  intimations of behavior some 15 years ago. Presumably this is for bringing the lawsuit.

But there is a greater reason to be alarmed. While frick and frack may just be idiot practitioners, the PLF attorneys are not. Counsel’s decision to pursue this strategy simply means that they too believe the average Judge will retaliate if one of his colleagues is challenged. They believe that we have already lost the battle of good sense, of morality and that the expectation of sound judgment can be displaced with the right emotional rhetoric.

Fake news is often lauded as targeting the uneducated, to exploit emotional weaknesses and to discourage thoughtful consideration. When the Bar lies, we all lose. When the Bar places winning above civil behavior it’s time to acknowledge that we are as a society spiraling now to the floor, to the baseness of our existence.

I don’t know how we defeat it except through exposure. And if exposure does not work then its simply time to acknowledge that a once noble profession has been reduced to being employment as a carpetbagger.

The partner leading the PLF defense is Matt Kalmanson . He’s good and for those that do not care about the way a case is won, he might be the right lawyer for you. He just won a big case for Portland Adventist, which you can find here. But knowing your clients are engaging in perjury and doing nothing about it, when the ethical rues requires notifying the court of that dishonesty, is endemic now it would seem. I’ve let the PLF know through many an email to PLF president  Carol Bernick. She does not care. The Board does not care.

The Oregon Department of Justice wont process a complaint against an attorney. They refer to the Oregon State Bar. But in this case the Oregon State Bar owns the PLF. The circle allows attorneys representing other attorneys and the PLF to be fairly certain they wont lose an investigation on an ethics complaint. You can file a complain against an attorney here.

My Appeal Reply is Rote Amended Appeals Court Reply Brief.

The actions taken by Marshall and Christiansen were designed to discredit me, to promulgate defamatory misinformation about me because I had published a 70,000 word analysis of an arbitration corrupted by cronyism, perjury and the destruction of evidence. My attack was on the attorney, and her client, who manipulated an arbitrator, namely Bill Crow.

In 2010 William B. Crow was the Mult. County Chairman of the disciplinary board. He had been president of the BAR. In 2011 he was the state Chairman. dbr24. In 2009 Bill Crow referred the defendant in the arbitration to one of his former partners, who ( Linda Marshall) was then engaged to represent the defendant. It was an ethical violation to do so. Linda Marshall and her client then engaged in 13 counts of perjury and destruction of thousands of documentary evidence. In a movie, book or TV the perpetrators of this crime would have been caught, exposed and action would have been taken to right the wrong. In real life, too often that is not true. In real life, the Bar, Judges who review the case and the media are often helpless to right the wrong.

Under the American Bar’s Code of Ethics, “The obligation to disclose interests or relationships described in paragraph A is a continuing duty which requires a person who accepts appointment as an arbitrator to disclose, as soon as practicable, at any stage of the arbitration, any such interests or relationships which may arise, or which are recalled or discovered.” That was not done. Moreover, it made Bill mad when he was challenged on this. I blame Marshall for this. She soft pedaled her past relationship with Bill even saying that they crossed paths only. Actually she was a partner when Bill was a partner. The fact that neither Marshall nor Bill Crow informed us accurately is important, because we did not endorse it. See ABA rules here Code_Annotated_Final_Jan_2014_update.authcheckdam.

Now, I would be remiss if I left you with the impression that I think Bill Crow is inherently evil, dishonest or unethical. I do not. In fact I like Bill a lot. I think it is far more likely that his cognitive skills were deteriorating  and he was manipulated by Linda Marshall. It’s a shame that there is no recourse for this. It could have been avoided had he not referred the case to Linda Marshall, his first violation. And the truth is that there is no value to hiding this. I’m sure his friends would like to sweep this under the rug.

The value to the public lies in revealing it. The caring part of me reveals it with empathy for the attorneys, arbitrators and Judges who continue to practice well into their senior years. You still have your moments of great clarity and insight, but lack the stamina and discernment to eliminate the irrelevant information designed to influence you…which leads to very bad decisions and a violation of the public trust.