Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, finance, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: New Privacy Badger Prevents Google From Mangling More of Your Links and Invading Your Privacy; Microsoft AI team accidentally leaks 38TB of private company data; California legislature passes ‘Delete Act’ to protect consumer data; and Starlink lost over 200 satellites in two months.
Manhattan grand jury votes to indict Donald Trump, showing he, like all other presidents, is not an imperial king
Following news that a Manhattan grand jury had voted to indict Donald Trump, CNN’s John Miller announced on Thursday evening March 30, 3023: “I am told by my sources that this is 34 counts of falsification of business records, which is probably a lot of charges involving each document, each thing that was submitted, as a separate count.” Prof. Shannon Bow O’Brien, a presidency scholar, takes on the concept of the imperial presidency: “Throughout history, many presidents have pushed the boundaries of power for their own personal preferences or political gain. However, Americans do have the right to push back and hold these leaders accountable to the country’s laws. Presidents have never been monarchs. If they ever act in that manner, I believe that the people have to remind them of who they are and whom they serve.”
This guide by Marcus P. Zillman is a selected list of free and fee based (some require subscriptions), people finding resources, from a range of providers. A significant number of free sources on this subject matter are sourced from public records obtained by a group of companies who initially offer free information to establish your interest, from which point a more extensive report requires a fee to obtain. It is important to note that can be many errors in these data, including the inability to correctly de-duplicated individuals with the same common names. Also note that each service targets a different mix of identifying data such as: name, address, date of birth, phone numbers, email addresses, relatives, education, employment, criminal records. social media accounts, income. As we conduct research throughout the day it is useful to employ both impromptu and planned searches about individuals that are referenced.
You don’t have to be a spy to violate the Espionage Act – and other crucial facts about the law Trump may have broken
Joseph Ferguson, Co-Director, National Security and Civil Rights Program, Loyola University Chicago and Thomas A. Durkin, Distinguished Practitioner in Residence, Loyola University Chicago are both attorneys who specialize in and teach national security law. While navigating the sound and fury over the Trump search, this article highlights important things to note about the Espionage Act.
What is RSS and how do federal courts use it? Rebecca Fordon informs us that courts vary in the types of documents they provide via RSS feeds – only about 70% of bankruptcy courts and 50% of district courts provide full feeds. The effort urging courts to fully enable RSS feeds has many advocates and would have a significant positive impact for legal researchers in all sectors.
Emily Donnellan updates readers on the lawsuit in the US Court of Appeals for the Federal Circuit over what essentially boils down to the question: are PACER fees too high? Donnellan includes resources to track and monitor changes and issues related to Pacer in addition to user objections to fees.
Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Four highlights from this week: Finland is winning the war on fake news. Other nations want the blueprint; Ari Mahairas and Peter Beshar on AI and 5G security risks; Age of fraud: Are seniors more vulnerable to financial scams?; Concern Growing Over ‘Nefarious’ Website Offering Individuals’ Personal Information, Reputation Rating.
At the beginning of this year, President Trump signed into law the Open, Public, Electronic and Necessary Government Data Act, requiring that nonsensitive government data be made available in machine-readable, open formats by default. As researchers who study data governance and cyber law [Anjanette Raymond, Beth Cate and Scott Shackelford] we are excited by the possibilities of the new act. But much effort is needed to fill in missing details – especially since these data can be used in unpredictable or unintended ways. The federal government would benefit from considering lessons learned from open government activities in other countries and at state and local levels.
Former CPA, writer and teacher Ken Boyd provides readers with an explanation of tax fraud that is clearly presented, instructive and relevant to the ongoing Mueller investigation. Boyd uses the extensive New York Times investigative report of November 2018 that documented a history of tax fraud allegedly committed by Donald Trump, his father and siblings, as the foundation for his lesson on various types of tax fraud. The allegations documented by the Times are under review by the New York State Department of Taxation and Finance.
This guide by Marcus Zillman focuses on selected free and fee based resources published by a range of reliable sources that researchers can use for tracking, monitoring and sector research discovery purposes, as well as on tools and techniques to leverage in their business intelligence work.