Friday, April 30, 2010

Some comments on the difficulties of presenting technical information (forensics) to juries.

http://www.databreaches.net/?p=11453

Podcast: Inside the TJX/Heartland Investigations

April 29, 2010 by admin

Tom Field of BankInfoSecurity interviews Kim Peretti, former Senior Counsel in the Computer Crime and Intellectual Property Section of the Criminal Division of the United States Department of Justice, about the investigation of Albert Gonzalez and his co-conspirators, including

How the investigations unfolded from beginning to end;

The significance of the conspirators’ sentences;

Lessons learned from these cases.

[See also:

http://www.justice.gov/criminal/cybercrime/DataBreachesArticle.pdf

DATA BREACHES:WHAT THE UNDERGROUND WORLD OF “CARDING” REVEALS



Ethics again. Shouldn't the employers lawyers at least skim the emails to ensure there is no evidence of crimes being committed?

http://www.pogowasright.org/?p=9577

Use of Employer Systems for Personal Communications to Legal Counsel – How Should Employer Counsel Deal With “Hot” E-Mails?

April 29, 2010 by Dissent

Dan Michaluk writes:

I made a half-baked comment in response to Omar’s April 4th post on the procedural issues in dealing with the communications that employees have with their legal counsel through employer e-mail systems. This is a post based on some “more baked” thoughts that I plan to incorporate into a book chapter under development.

The thoughts I’ve included are strictly on the procedure for dealing with these “hot” e-mails. I’ll leave the substantive issue about the legitimacy of an employee privilege claim to another day, but will set up the thoughts below by noting that the issue is highly uncertain in Canadian law. The early case law seems to demonstrate a privilege-protective approach. In my view, however, it is still open to an employer to attack an employee privilege claim based on proof of the domain it exercises over its computer system, and that the strongest basis for attack is one which challenges the confidentiality on which the privilege claim is founded rather than one which relies on the doctrine of waiver. Employers may very well choose to attack, but can’t do so without thinking through the important duties described below.

This is pretty law-heavy for here, but I figure that this issue is Slaw-worthy and might draw debate. I welcome your critique!

Read his article on Slaw.



Privacy in Canada...

http://www.pogowasright.org/?p=9562

Patriot Act reality check and Canadian authorities’ similar powers

April 29, 2010 by Dissent

Canadian privacy lawyer David T.S. Fraser blogs:

I had the honour of being invited to speak to the Canadian Bar Association’s Alberta branch earlier this week about cross-border privacy issues.

We have had to deal with them rather acutely in Nova Scotia since the passage of the Personal Information International Disclosure Protection Act (PIIDPA), which prompted me to take a closer look at the different regimes for access to personal information by law enforcement and national security types on both sides of the border.

Most people are surprised to learn that some of the most “problematic” provisions of the USA Patriot Act are replicated in Canadian law in the Anti-Terrorism Act. We just don’t hear about it as much. People are also surprised to learn of huge amount of information sharing that takes place between agencies in Canada and their counterparts in the US.

You can read more and see the PowerPoint presentation on his blog.


(Related) Probably, they will only see the Table of Contents...

http://www.pogowasright.org/?p=9604

Contents of Canada’s secret no-fly list exposed

April 30, 2010 by Dissent

Colin Freeze reports:

For the first time Canadians are getting a peek into the top-secret binders containing various versions of the country’s no-fly list, thanks to an intelligence analyst who allegedly went AWOL and took the manual with her.

The details – including references to “data sheets” kept on potential terrorists and “emergency directions” to be followed if a suspected person boards a plane – surfaced in a legal case this week. More information may soon follow.

Read more in the Globe and Mail.



http://www.pogowasright.org/?p=9608

Observations on the Dept. of Commerce’s Privacy Inquiry

April 30, 2010 by Dissent

David Navetta comments:

Earlier in the week, I referenced the U.S. Department of Commerce’s Notice of Inquiry concerning “Information Privacy and Innovation in the Internet Economy” (the “Inquiry”). I have now had a chance to review the document in more detail and believe that this Inquiry and the report that it generates has the potential to usher a paradigm shift and radically reshape the privacy environment as it relates to commerce. It also has the potential to be a frustrating exercise involving entrenched special interests banging their heads against a wall in a political forum. Nonetheless, whether the Inquiry ends up yielding any legislation, industry standard, best practices or a strategic frame work, the document itself reflects some of key challenges faced at the intersection of privacy and commerce. This post outlines some of my observations after reading the Inquiry.

Read more on InformationLawGroup.



I can speak for animals because I am one.” If true, could you ask my cat to lick himself somewhere else? It's embarrassing the dogs.

http://www.pogowasright.org/?p=9602

Animals need ‘right to privacy’ from wildlife films

April 30, 2010 by Dissent

Sean Coughlan reports:

Animals’ right to privacy needs to be taken more seriously by wildlife documentary makers, suggests research.

The ethics of the media and privacy should be extended beyond humans to the animal world, suggests Brett Mills at the University of East Anglia.

He says it might be acceptable to film “public events” such as animals hunting – but questions more intrusive recording.

Dr Mills says animals should not be seen as “fair game” for filmmakers.

Read more on the BBC. FOXNews also covers the story.



I suppose it's faster than reverse engineering the code, but I am kind of surprised that they don't build the hardware themselves...

http://yro.slashdot.org/story/10/04/29/1830221/India-China-Try-Import-Regulations-As-Security-Tools?from=rss&utm_source=feedburner&utm_medium=feed&utm_campaign=Feed%3A+Slashdot%2Fslashdot+%28Slashdot%29

India, China Try Import Regulations As Security Tools

Posted by timothy on Thursday April 29, @03:22PM

An anonymous reader writes

"The Register reports that the Chinese government is forcing vendors to cough up the source code to their encryption alogrithms before they can sell their equipment to the Chinese government. The EU doesn't seem to like it, but if I were in their position I'd want the same thing."

China's biggest neighbor goes further; another anonymous reader writes

"Telco equipment from China could have spyware that gives access to telcom networks in India. The Indian government has officially told mobile operators not to import any equipment manufactured by Chinese vendors, including Huawei and ZTE. The ban order follows concerns raised by the Home Ministry that telecom equipment from some countries could have spyware or malware that gives intelligence agencies across the border access to telecom networks in India. The biggest gainers from the move could be Ericsson, Nokia, and Siemens, which have been losing market share to aggressive Chinese equipment-makers in India."



Some interesting titles...

http://www.slaw.ca/2010/04/28/european-journal-of-law-and-technology/

European Journal of Law and Technology

by Simon Fodden April 28, 2010

The venerable Journal of Information, Law & Technology (JILT) is reborn as the European Journal of Law and Technology. Volume 1, Number 1, available free online, is a special issue, “A History of Legal Informatics”:

  • Let there Be Lite: A Brief History of Legal Information Retrieval (Jon Bing)

  • The Global Development of Free Access To Legal Information (Graham Greenleaf)

  • How Structural Features of the U.S. Judicial System Have Affected the Take-Up of Digital Technology by Courts (Peter W Martin)

  • Legal Informatics – A Personal Appraisal of Context and Progress (Richard Susskind)

  • Jurimetrics Please! (Richard De Mulder)

  • The Rise and Fall of the Legal Expert System (Philip Leith)

  • From Legal Thesaurus to E-Signatures (Fernando Galindo)

  • Socrates and Confucius: A Long History of Information Technology In Legal Education (Abdul Paliwala)

As you might imagine, Canada’s LexUM, CanLII, and Quicklaw are mentioned but are not, in my view, given enough emphasis in the historical essays.

The essay by Susskind (he was a general editor of the predecessor JILT) is in effect the first chapter of his book The End of Lawyers?, and is well worth reading even if “legal informatics” is not of special interest to you.



A better tool for visual searchers?

http://www.makeuseof.com/dir/locpdf-preview-pdf-files/

LocPDF: Search & Preview PDF Files

There are a lot of specialized search engines that let you find and download PDF files online. These search engines are especially useful for finding academic papers, training manuals, journals, paper forms and ebooks. However, they can be hard to use if all you see are lists to linked PDFs without any visual recognition to check if you are downloading the correct file that you need.

One app that solves this is LocPDF. This website is a visual search engine for PDF files. It lets you view thumbnails of PDFs, read a preview, and then download them easily.

www.locpdf.com

Similar Tools: PDF Search Engine, Data-Sheet, and LivePDF.

No comments: