Pete Recommends – Weekly highlights on cyber security issues November 18 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: a new DHS report – Data Craft: The Manipulation of Social Media Metadata; Volunteer disaster response websites grow up; Firefox Quantum to Add Breached Site Alerts; and 10 tax scams you should watch for this season, and how to avoid them.

Subjects: Cybercrime, Cybersecurity, Education, Government Resources, KM, Privacy, Search Engines, Social Media

Pete Recommends – Weekly highlights on cyber security issues November 11 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: A Guide to Privacy Resources 2019; Billions of Robocalls – Industry & Regulatory Solution; Powerful Data Privacy Legislation Drafted by Oregon Senator Ron Wyden; and Midterms 2018: Who paid for that Facebook ad? It’s not always clear.

Subjects: Congress, Cybercrime, Cybersecurity, KM, Privacy, Social Media

Pete Recommends – Weekly highlights on cyber security issues November 3 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: As digital threats grow, will cyber insurance take off?; Twitter now lets you report accounts that you suspect are bots; Proper Disposal of Electronic Devices; and The Next Big Internet Threat.

Subjects: Cybersecurity, Gadgets/Gizmos, Healthcare, Social Media

Guide to Privacy Resources 2019

This guide by Marcus Zillman is a comprehensive listing of free privacy applications, tools and services that users may implement across multiple devices. These applications are from a range of sources that include small and large tech companies as well as subject matter specific websites, consumer industry groups and organizations. The focus of this article is on leveraging the latest technology and information that allows users to: (1) identify privacy issues and (2) implement privacy protections specific to their requirements, that span email, phone calls, chats, text messages, web browsing, computer drives and files, networks, collaboration spaces, and your photos.

Subjects: Computer Security, Cybersecurity, Email Security, Encryption, Privacy, Social Media, Viruses & Hoaxes

Pete Recommends – Weekly highlights on cyber security issues October 28 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: How Russian trolls manipulated American politics; How to Spot a Twitter Bot; Suspected explosive devices are hard for UPS, FedEx, USPS to detect; and Apple boss takes aim at ‘weaponization’ of customer data.

Subjects: Congress, Cybercrime, Cybersecurity, E-Commerce, Government Resources, Privacy, Social Media

Top Ten Tips from My Job Search

Kenny Ames shares his job search strategy, presented in a concise, focused and objective article that you can quickly apply to your own search. Ames offers readers a thoughtful and meaningful list of suggestions to help concentrate your energy on highlighting capabilities, strengths as well as colleagues and contacts, and the critical follow-up factor.

Subjects: KM

The Government Must Now Obtain A Warrant To Compel Disclosure of Cell Phone Location Records

Attorney Charles Holster discusses the ramifications of the June 22, 2018 Supreme Court decision, Carpenter v. United States that held a warrant is required before a wireless telephone service provider may be compelled by a governmental entity to turn over its customer’s “historical” Cell Site Location Information.

Subjects: Civil Liberties, Communications, Communications Law, Criminal Law, Legal Research, Privacy

Pete Recommends – Weekly highlights on cyber security issues October 21 2018

Privacy and security issues impact every aspect of our lives – home, work, travel, education, health and medical records – to name but a few. On a weekly basis Pete Weiss highlights articles and information that focus on the increasingly complex and wide ranging ways technology is used to compromise and diminish our privacy and security, often without our situational awareness. Note – four significant highlights of this week’s column: The Employer Surveillance State; How to Recover Google Contacts; How to delete your account with Facebook, Google, Amazon, Apple, and more; and last but certainly not least – ‘Do Not Track’ Privacy Tool Doesn’t Do Anything!

Subjects: Big Data, Civil Liberties, Congress, Cybercrime, Cybersecurity, E-Commerce, E-Government, Email, KM, Legal Research, Privacy, Social Media, Spyware

AI’s Third Wave: A Perspective From The World Of Law

Itai Gurari begins his article with a reference to DARPA’s recent announcement of interest in “researching and developing ‘third wave’ AI theory and applications that address the limitations of first and second wave technologies by making it possible for machines to contextually adapt to changing situations.” Gurari welcomes this acknowledgment of the limitations inherent in the machine learning techniques that dominate the field of Artificial Intelligence today – as he defines the subject of this article along with the objective of his company’s work: “While we won’t see significant advances in “third wave” AI for many years to come — or even a jelling around what precisely the “third wave” is — these next generation technologies will likely have a big impact on the field of law, which is a welcome prospect for a field severely in need. Understanding why requires an examination of the first two waves — AI’s past and present — and their critical shortcomings.”

Subjects: AI, Big Data, KM, Legal Profession, Legal Technology