2022 Guide to Internet Privacy Resources and Tools

The implementation and maintenance of reliable applications in all sectors to secure and protect against cybercrime and security breaches is increasingly important as we move toward a return to an onsite work posture. This comprehensive guide by Marcus P. Zillman identifies a wide swath of privacy resources from which you can choose to apply to secure online and mobile activities in personal, academic, government or corporate environments. It includes best practices resources as well as online privacy applications, tools and strategies including: email, search and browsing, mobile phone calls, and enterprise wide data security.

Subjects: AI, Big Data, Blockchain, Communications, Criminal Law, Cybercrime, Cyberlaw, Cybersecurity, Email Security, Encryption, Financial System, Legal Research, Legal Technology, Search Engines, Search Strategies, Software

Using News and Social Media for Finding Financial Assets – 5 Top Tips

Private investigator Marcy Phelps searches social media and online news for clients on a daily basis and recommends specific sources as useful for asset investigations. Phelps notes that not everything will show up in public records, and news and social media research helps fill in the gaps. Phelps shares a few examples of useful sources and strategies that made a difference for clients.

Subjects: Business Research, Competitive Intelligence, Search Strategies, Social Media

International law says Putin’s war against Ukraine is illegal. Does that matter?

Hurst Hannum, Professor of International Law, Fletcher School of Law & Diplomacy, Tufts University acknowledges that International laws are in place to prevent war and help protect civilians and combatants alike. But he further states that these laws are challenging to enforce and are unlikely to stop the unfolding Russia-Ukraine war.

Subjects: International Legal Research, Legal Research

Pete Recommends Weekly highlights on cyber security issues, February 26, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: Meet The Secretive Surveillance Wizards Helping The FBI And ICE Wiretap Facebook And Google Users; Humans Find AI-Generated Faces More Trustworthy Than the Real Thing; The Advantages And Risks Of Biometric Security; and Agencies underscore software vulnerabilities in supply chain assessments.

Subjects: AI, Cybercrime, Cybersecurity, Data Mining, Economy, Education, Email Security, Financial System, Government Resources, Legal Research, Privacy, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 19, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Four highlights from this week: How to stop those annoying spam texts; Missouri ends effort to prosecute ‘view source’ journalist; Researcher ‘reverses’ redaction, extracts words from pixelated image; and FBI warns of Business Email Compromise attackers impersonating CEOs in virtual meetings.

Subjects: Computer Security, Criminal Law, Cybercrime, Cybersecurity, Email Security, Government Resources, Legal Research, Privacy, Social Media, Spyware, Technology Trends

Pete Recommends Weekly highlights on cyber security issues, February 12, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: The MY2022 app is a required download for Olympians and looks like a security nightmare; The country inoculating against disinformation; The IRS Says It Will Ditch ID.me’s Facial Recognition; How Phishers Are Slinking Their Links Into LinkedIn; and Health Sites Let Ads Track Visitors Without Telling Them.

Subjects: AI, Big Data, Blockchain, Cybercrime, Cybersecurity, E-Government, Government Resources, Healthcare, Legal Research, Privacy, Social Media, Spyware

Pete Recommends Weekly highlights on cyber security issues, February 5, 2022

Privacy and cybersecurity issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and online security, often without our situational awareness. Five highlights from this week: The modern workplace: Will remote tech workers tolerate being monitored?; How to Protect Yourself From Common Scams; Academic Journal Claims it Fingerprints PDFs for ‘Ransomware,’ Not Surveillance; Security agency director urges governors to teach cybersecurity basics; Best Password Manager Reviews; and Democratic Lawmakers Call for Ban of Surveillance Advertising.

Subjects: AI, Congress, Cybercrime, Cybersecurity, Economy, Education, Financial System, KM, Legal Research, Legislative, Privacy

LLRX January 2022 Issue

Articles and Columns for January 2022 A bit about PURLs – Ed Summers, librarian, metadata expert, teacher, and computational expert, delivers an insightful lesson on the Persistent Uniform Resource Locator. PURLs were developed to make URLs more resilient and persistent over time. You could put a PURL into a catalog record and if the URL …

Subjects: KM