Category «Legal Research»

Pete Recommends – Weekly highlights on cyber security issues, April 2, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Almost 50M US Residents Lost Health Data in Breaches Last Year; FCC Adds Kaspersky and Chinese Telecom Firms to National Security Threat List; Why digital ID for airport check-in is taking so long; and Hackers Are Impersonating Police to Subpoena People’s Data.

Subjects: Criminal Law, Cybercrime, Cybersecurity, Financial System, Legal Research, Open Source, Privacy, Travel

Truth to Power

Robert McKay discusses his appreciation of the important function of the House of Butter blog, established and run by Sean Hocking. This publication has been continuously engaged in addressing wide reaching and impactful issues concerning the environment and law, the defence and protection of rule of law and in support of those in legal practice who stand up for human rights and equality, rather than simply being focused on profit.

Subjects: KM, Legal Research, Legal Technology

Ukraine doomscrolling can harm your cognition as well as your mood – here’s what to do about it

What use are we in helping to solve difficult global challenges if we’re so depressed and cognitively depleted that we can’t think of the best actions to take? Ukraine doomscrolling can harm your cognition as well as your mood. Professors Barbara Jacquelyn Sahakian, Christelle Langley, Chun Shen and Jianfeng Feng describe their research findings on what to do about it.

Subjects: Healthcare, KM, Social Media

Pete Recommends – Weekly highlights on cyber security issues, March 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to secure your home and office network: FBI: Americans lost $7B in 2021 to Internet crime; The best DNS blockers and firewalls; Bank’s Machine Learning Systems Are Ripe for Sabotage; Blockchain: Financial and Non-Financial Uses and Challenges; and DHS seeks to automate video surveillance on ‘soft targets’ like transit systems, schools.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, Economy, Privacy, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, March 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: 2022 Guide to Internet Privacy Resources and Tools; Russia creates its own TLS certificate authority to bypass sanctions; Twitter quietly launches Tor service in the face of Russian censorship; Decentralized identity using blockchain.

Subjects: Blockchain, Cybersecurity, Economy, Financial System, Health, Healthcare, Legal Research, Privacy, Social Media

Pete Recommends Weekly highlights on cyber security issues, March 6, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to make software supply chains resilient to cyber attacks; Russian Invasion Highlights Growing Importance of Open Source Intelligence; Cybersecurity: Internet Architecture is Considered Resilient, but Federal Agencies Continue to Address Risks; and Senate passes major cybersecurity legislation to force reporting of cyberattacks and ransomware.

Subjects: Cybercrime, Cybersecurity, Open Source, Social Media

Offense v. Defense

The goal of this paper by Andrew Pittman, MSU Law-3L, is a call for a new strategy on cybersecurity. Pittman’s paper begins with real life incidents of cybercrime attacks on critical infrastructures abroad and in the U.S. Second, it defines what is offensive cybersecurity vs defensive cybersecurity and the U.S. strategies. Third, it explores the potential reasoning behind the discrepancy and some lasting effects. Finally, it explores the pre-mentioned combination of solutions to implement a more defensive approach on cybersecurity.

Subjects: Computer Security, Cybercrime, Cybersecurity, Email Security, Encryption, Financial System, Firewalls, Information Management, KM, Legal Research, Privacy, Spyware

2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software

International law says Putin’s war against Ukraine is illegal. Does that matter?

Hurst Hannum, Professor of International Law, Fletcher School of Law & Diplomacy, Tufts University acknowledges that International laws are in place to prevent war and help protect civilians and combatants alike. But he further states that these laws are challenging to enforce and are unlikely to stop the unfolding Russia-Ukraine war.

Subjects: International Legal Research, Legal Research