Monthly archives: August, 2022

LLRX August 2022 Issue

Articles and Columns for August 2022

  • Data Mining Resources 2022 – Data mining and knowledge discovery is a quickly evolving field that is part of the portfolio of CI, BI and KM professionals, law librarians, research analysts, infopros, data scientists, data journalists and students in college and graduate programs. This expansive bibliography by Marcus P. Zillman comprises a wealth of information, resources, tools, techniques and applications, as well as links to many open datasets. The subject matter includes data mining, data scrapping, data aggregation, big data and big analytics. The resources include: ebooks and glossaries, research papers, video tutorials and online training, APIs, open source web data extraction tools, datasets, bibliographies, case studies, scientific and academic papers and substantive articles, as well as training and certifications on data mining and open source code.
  • Pitching the Difficult Case: Working With ProsecutorsJerry Lawson provides ideas and examples showing how investigators can successfully pitch difficult cases—ones that look unattractive on the surface. Lawson approaches the topic from his perspective as a former federal prosecutor and counsel to federal criminal investigators, but most of the ideas apply just as well to state and local law enforcement agencies.
  • A new US data privacy bill aims to give you more control over information collected about you – and make businesses change how they handle data – With rare bipartisan support, the American Data and Privacy Protection Act moved out of the U.S. House of Representatives Committee on Energy and Commerce by a vote of 53-2 on July 20, 2022. The bill still needs to pass the full House and the Senate, and negotiations are ongoing. Given the Biden administration’s responsible data practices strategy, White House support is likely if a version of the bill passes. Legal scholar and attorney Professor Anne Toomey McKenna, who studies and practices technology and data privacy law, has been closely following the act, known as ADPPA. McKenna contends that if passed this legislation will fundamentally alter U.S. data privacy law.
  • You don’t have to be a spy to violate the Espionage Act – and other crucial facts about the law Trump may have brokenJoseph Ferguson, Co-Director, National Security and Civil Rights Program, Loyola University Chicago and Thomas A. Durkin, Distinguished Practitioner in Residence, Loyola University Chicago are both attorneys who specialize in and teach national security law. While navigating the sound and fury over the Trump search, this article highlights important things to note about the Espionage Act.
  • The highest performing teams have rules – Patrick J. McKenna is a highly respected lecturer, strategist and advisor to law firms. McKenna’s experience has taught him that the best performing teams have discovered to operate effectively they need to formalize what they should specifically be able to expect of each other as members. He calls these expectations the group’s ‘Rules of Engagement’, and in this article he articulates that to be effective, these rules of engagement must be clear, consistent, agreed to and followed. A challenging endeavor in any workplace, but critical to high performing and innovative law firms.
  • Don’t be too quick to blame social media for America’s polarization – cable news has a bigger effect, study findsHoma Hosseinmardi and a group of researchers from Stanford University, the University of Pennsylvania and Microsoft Research tracked the TV news consumption habits of tens of thousands of American adults each month from 2016 through 2019. They discovered four aspects of news consumption that, when taken together, paint an unsettling picture of the TV news ecosystem.
  • Pete Recommends – Weekly highlights on cyber security issues, August 27, 2022Five highlights from this week: Video scans of students’ rooms during online tests ruled unconstitutional; TikTok’s In-App Browser Includes Code That Can Monitor Your Keystrokes, Researcher Says; Google Flagged Parents’ Photos of Sick Children as Sexual Abuse; Third-party app attacks: Lessons for the next cybersecurity frontier; and Russia’s ‘Oculus’ to use AI to scan sites for banned information.
  • Pete Recommends – Weekly highlights on cyber security issues, August 20, 2022 – Four highlights from this week: Google blocks largest HTTPS DDoS attack ‘reported to date’; Spy group abuses Microsoft OneDrive to steal credentials in hack-and-leak campaigns; Reps. Nadler, Thompson Send Letter to FBI, DHS on Personal Data; and Digital Medical Companies Funnel Patient Data To Facebook For Advertising.
  • Pete Recommends – Weekly highlights on cyber security issues, August 13, 2022Four highlights from this week: Hospital and Drugmaker Move to Build Vast Database of New Yorkers’ DNA; Your iPhone’s deleted voicemails aren’t actually deleted; FTC Contemplates Rules to Protect Against Commercial Surveillance and Lax Data Privacy; North Korean hackers target crypto experts with fake Coinbase job offers.
  • Pete Recommends – Weekly highlights on cyber security issues, August 6, 2022 – Four highlights from this week: Report – Hidden Harms: The Misleading Promise of Monitoring Students Online; Meta, US hospitals sued for using healthcare data to target ads; All software is guilty until proven innocent; and Twitter Faces A Surge In Account Data Requests By Governments.
LLRX.com® – the free web journal on law, technology, knowledge discovery and research for Librarians, Lawyers, Researchers, Academics, and Journalists. Founded in 1996.
Subjects: KM

Pete Recommends – Weekly highlights on cyber security issues, August 27, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: Video scans of students’ rooms during online tests ruled unconstitutional; TikTok’s In-App Browser Includes Code That Can Monitor Your Keystrokes, Researcher Says; Google Flagged Parents’ Photos of Sick Children as Sexual Abuse; Third-party app attacks: Lessons for the next cybersecurity frontier; and Russia’s ‘Oculus’ to use AI to scan sites for banned information.

Subjects: AI, Cybercrime, Cybersecurity, Free Speech, Freedom of Information, KM, Privacy, Social Media

Data Mining Resources 2022

Data mining and knowledge discovery is a quickly evolving field that is part of the portfolio of CI, BI and KM professionals, law librarians, research analysts, infopros, data scientists, data journalists and students in college and graduate programs. This expansive bibliography by Marcus P. Zillman comprises a wealth of information, resources, tools, techniques and applications, as well as links to many open datasets. The subject matter includes data mining, data scrapping, data aggregation, big data and big analytics. The resources include: ebooks and glossaries, research papers, video tutorials and online training, APIs, open source web data extraction tools, datasets, bibliographies, case studies, scientific and academic papers and substantive articles, as well as training and certifications on data mining, and open source code.

Subjects: Big Data, Information Architecture, Information Mapping, KM, Legal Research, Legal Technology, Open Source, Technology Trends

A new US data privacy bill aims to give you more control over information collected about you – and make businesses change how they handle data

With rare bipartisan support, the American Data and Privacy Protection Act moved out of the U.S. House of Representatives Committee on Energy and Commerce by a vote of 53-2 on July 20, 2022. The bill still needs to pass the full House and the Senate, and negotiations are ongoing. Given the Biden administration’s responsible data practices strategy, White House support is likely if a version of the bill passes. Legal scholar and attorney Professor Anne Toomey McKenna, who studies and practices technology and data privacy law, has been closely following the act, known as ADPPA. McKenna contends that if passed this legislation will fundamentally alter U.S. data privacy law.

Subjects: Congress, Cyberlaw, Cyberlaw Legislation, Cybersecurity, Federal Legislative Research, Legal Research, Legislative, Privacy, United States Law

Pitching the Difficult Case: Working With Prosecutors

Jerry Lawson provides ideas and examples showing how investigators can successfully pitch difficult cases—ones that look unattractive on the surface. Lawson approaches the topic from his perspective as a former federal prosecutor and counsel to federal criminal investigators, but most of the ideas apply just as well to state and local law enforcement agencies.

Subjects: Criminal Law, Legal Profession, Legal Research

You don’t have to be a spy to violate the Espionage Act – and other crucial facts about the law Trump may have broken

Joseph Ferguson, Co-Director, National Security and Civil Rights Program, Loyola University Chicago and Thomas A. Durkin, Distinguished Practitioner in Residence, Loyola University Chicago are both attorneys who specialize in and teach national security law. While navigating the sound and fury over the Trump search, this article highlights important things to note about the Espionage Act.

Subjects: Criminal Law, Digital Archives, Government Resources, Legal Research, Public Records, United States Law

The highest performing teams have rules

Patrick J. McKenna is a highly respected lecturer, strategist and advisor to law firms. McKenna’s experience has taught him that the best performing teams have discovered to operate effectively they need to formalize what they should specifically be able to expect of each other as members. He calls these expectations the group’s ‘Rules of Engagement’, and in this article he articulates that to be effective, these rules of engagement must be clear, consistent, agreed to and followed. A challenging endeavor in any workplace, but critical to high performing and innovative law firms.

Subjects: Communications, Leadership, Legal Profession, Management

Pete Recommends – Weekly highlights on cyber security issues, August 20, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Google blocks largest HTTPS DDoS attack ‘reported to date’; Spy group abuses Microsoft OneDrive to steal credentials in hack-and-leak campaigns; Reps. Nadler, Thompson Send Letter to FBI, DHS on Personal Data; and Digital Medical Companies Funnel Patient Data To Facebook For Advertising.

Subjects: Big Data, Cybercrime, Cybersecurity, Economy, Financial System, Healthcare, Legal Research, Privacy, Social Media

Don’t be too quick to blame social media for America’s polarization – cable news has a bigger effect, study finds

Homa Hosseinmardi and a group of researchers from Stanford University, the University of Pennsylvania and Microsoft Research tracked the TV news consumption habits of tens of thousands of American adults each month from 2016 through 2019. They discovered four aspects of news consumption that, when taken together, paint an unsettling picture of the TV news ecosystem.

Subjects: Communications, Internet Trends, KM, Social Media

Pete Recommends – Weekly highlights on cyber security issues, August 13, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Hospital and Drugmaker Move to Build Vast Database of New Yorkers’ DNA; Your iPhone’s deleted voicemails aren’t actually deleted; FTC Contemplates Rules to Protect Against Commercial Surveillance and Lax Data Privacy; North Korean hackers target crypto experts with fake Coinbase job offers.

Subjects: Big Data, Cryptocurrency, Cybercrime, Cybersecurity, Healthcare, Privacy, Social Media